WorldWideScience

Sample records for bispectral index-guided protocol

  1. Protocol for the BAG-RECALL clinical trial: a prospective, multi-center, randomized, controlled trial to determine whether a bispectral index-guided protocol is superior to an anesthesia gas-guided protocol in reducing intraoperative awareness with explicit recall in high risk surgical patients

    Directory of Open Access Journals (Sweden)

    Villafranca Alex

    2009-11-01

    Full Text Available Abstract Background Awareness with explicit recall of intra-operative events is a rare and distressing complication that may lead to severe psychological symptoms. Candidate depth of anesthesia monitors have been developed, partly with the aim of preventing this complication. Despite conflicting results from clinical trials and the lack of incisive validation, such monitors have enjoyed widespread clinical adoption, in particular the bispectral index. The American Society of Anesthesiologists has called for adequately powered and rigorously designed clinical trials to determine whether the use of such monitors decreases the incidence of awareness in various settings. The aim of this study is to determine with increased precision whether incorporating the bispectral index into a structured general anesthesia protocol decreases the incidence of awareness with explicit recall among a subset of surgical patients at increased risk for awareness and scheduled to receive an inhalation gas-based general anesthetic. Methods/Design BAG-RECALL is a multi-center, randomized, controlled clinical trial, in which 6,000 patients are being assigned to bispectral index-guided anesthesia (target range, 40 to 60 or end-tidal anesthetic gas-guided anesthesia (target range, 0.7 to 1.3 age-adjusted minimum alveolar concentration. Postoperatively, patients are being assessed for explicit recall at two intervals (0 to 72 hours, and 30 days after extubation. The primary outcome of the trial is awareness with explicit recall. Secondary outcomes include postoperative mortality, psychological symptoms, intensive care and hospital length of stay, average anesthetic gas administration, postoperative pain and nausea and vomiting, duration of stay in the recovery area, intra-operative dreaming, and postoperative delirium. Discussion This trial has been designed to complement two other clinical trials: B-Unaware and MACS (ClinicalTrials.gov numbers, NCT00281489 and NCT00689091

  2. Comparison of Intravenous Dexmedetomidine and Midazolam for Bispectral Index-Guided Sedation During Spinal Anesthesia.

    Science.gov (United States)

    Jo, Youn Yi; Lee, Dongchul; Jung, Wol Seon; Cho, Noo Ree; Kwak, Hyun Jeong

    2016-10-04

    BACKGROUND Despite the high frequency of hypotension during spinal anesthesia with proper sedation, no previous report has compared the hemodynamic effects of dexmedetomidine and midazolam sedation during spinal anesthesia. We compared the effects of bispectral index (BIS)-guided intravenous sedation using midazolam or dexmedetomidine on hemodynamics and recovery profiles in patients who underwent spinal anesthesia. MATERIAL AND METHODS One hundred and sixteen adult patients were randomly assigned to receive either midazolam (midazolam group; n=58) or dexmedetomidine (dexmedetomidine group; n=58) during spinal anesthesia. Systolic, diastolic, and mean arterial pressures; heart rates; peripheral oxygen saturations; and bispectral index scores were recorded during surgery, and Ramsay sedation scores and postanesthesia care unit (PACU) stay were monitored. RESULTS Hypotension occurred more frequently in the midazolam group (Pmidazolam sedation.

  3. Clinical vs. bispectral index-guided propofol induction of anesthesia: A comparative study

    Directory of Open Access Journals (Sweden)

    Snehdeep Arya

    2013-01-01

    Full Text Available Background: Clinically optimized focusing of drug administration to specific need of patient with bispectral index (BIS monitoring results in reduced dose and faster recovery of consciousness. This study was planned with an aim to study and compare the conventional clinical end point or BIS on the requirement of dosage of propofol, hemodynamic effects, and BIS alterations following propofol induction. Methods: 70 patients, ASA I and II, 20-60 years undergoing elective surgical procedure under general anesthesia with endotracheal intubation were selected and divided into two groups. Group A received (inj. fentanyl (2 μg/kg, followed 3 min later by inj. propofol at the rate of 30 mg/kg/hr infusion till the loss of response to verbal command while group B received inj. fentanyl (2 μg/kg, followed 3 min later by inj. propofol at the rate of 30 mg/kg/hr infusion. The end point of hypnosis was when the BIS value was sustained for 1 min at 48±2. The patients were intubated. Total induction dose of propofol was noted in each group. The value of BIS and hemodynamic parameters (heart rate, systolic/diastolic blood pressure were noted at the time of loss of consciousness, at the time of intubation, and 1 min after intubation, thereafter every minute for first 10 min and thereafter every 10 min till end of surgery. Any involuntary muscle activity such as jerky movements, dystonic posturing, and opisthotonos were also recorded. Results: The mean dose of propofol used in groups A and B were 1.85±0.48 mg/kg and 1.79±0.41 mg/kg, respectively. The dosage used in group B were less but not clinically significant (P=0.575. On comparing the dosage of propofol in males among the groups there was a significantly lower dosage of propofol required in group B (2.06±0.45 mg/kg and 1.83±0.32 mg/kg, respectively, P=0.016. This decrease however was not seen in female patients dosage being 1.65±0.44 mg/kg and 1.75±0.49 mg/kg, respectively (P=0.372. The hemodynamic

  4. Bispectral index-guided intraoperative sedation with dexmedetomidine and midazolam infusion in orthopaedic surgery of lower limbs%脑电双频指数引导下右美托咪啶和咪达唑仑用于下肢手术镇静的比较

    Institute of Scientific and Technical Information of China (English)

    赵一凡; 陈倩茹; 胡楚文; 曹铭辉

    2011-01-01

    Objective To compare and evaluate the effect and safety of dexmedetomidine(DEX) and midazolam sedation in lower limbs orthopaedic surgery. Methods Fifty-two patients undergoing lower limbs surgery were randomly assigned to group D (n=27,DEX, 0.5 μg·kg-1·h-1, loading dose 0.5 μg/kg) and group M(n=25, midazolam, 50 μg·kg-1·h-1, loading dose 30 μg/kg). An infusion was administered after mounting a bispectral index (BIS) monitor under combined spinal-epidural anesthesia. The target BIS level was≤85. An additional bolus dose of the study drug or cessation of the infusion was adjusted according to the BIS level, and the change should be recorded. Respiratory rates (RR), heart rate (HR), pulse oxygen saturation (SpO2), mean arterial blood pressure (MAP) were continually monitored. Sedation should be evaluated according to the Ramsay sedation scale(RSS) before the drug withdrawal. Results HR was lower in group D (72±7) bpm than that in group M (83±8) bpm (P0.05).两组的停药前RSS评分差异无统计学意义(P>0.05).D组有6例、M组有7例需要进行剂量调整.另外,M组有5例因舌后坠致SpO2下降需托下颌处理,D组无类似情况.结论 DEX用于骨科下肢手术镇静可引起HR减慢但对血压无明显影响;在相同的镇静程度下,DEX比咪达唑仑更有利丁维持呼吸道通畅,可能更适用于该类手术的镇静.

  5. Intravenous lidocaine infusion reduces bispectral index-guided requirements of propofol only during surgical stimulation(dagger)

    NARCIS (Netherlands)

    Hans, G. A.; Lauwick, S. M.; Kaba, A.; Bonhomme, V.; Struys, M. M. R. F.; Hans, P. C.; Lamy, M. L.; Joris, J. L.

    2010-01-01

    I.V. lidocaine reduces volatile anaesthetics requirements during surgery. We hypothesized that lidocaine would also reduce propofol requirements during i.v. anaesthesia. A randomized controlled study of 40 patients tested the effect of i.v. lidocaine (1.5 mg kg(-1) then 2 mg kg(-1) h(-1)) on propofo

  6. Drug-Induced Sleep Endoscopy (DISE) with Target Controlled Infusion (TCI) and Bispectral Analysis in Obstructive Sleep Apnea.

    Science.gov (United States)

    Traxdorf, Maximilian; Tschaikowsky, Klaus; Scherl, Claudia; Bauer, Judith; Iro, Heinrich; Angerer, Florian

    2016-12-06

    The aim of this study was to establish a standardized protocol for drug-induced sleep endoscopy (DISE) to differentiate obstruction patterns in obstructive sleep apnea (OSA). Target-controlled infusion (TCI) of the sedative propofol was combined with real-time monitoring of the depth of sedation using bispectral analysis. In an observational study 57 patients (mean age 44.8 years, ± SD 10.5; mean apnea hypopnea Index (AHI) 30.8/hr, ± SD 21.6, mean BMI 28.2 kg/m(2), ± SD 5.3) underwent cardiorespiratory polysomnography followed by DISE with TCI and bispectral analysis. Sleep was induced solely by the intravenous infusion of propofol with a TCI-pump, with an initial target plasma level of 2.0 µg/ml. Under continuous monitoring of the patient's respiration, state of consciousness and value of the bispectral analysis, the target plasma propofol level was raised in steps of 0.2 µg/ml/2 min until the desired depth of sedation was reached. The mean value of the bispectral analysis at the target depth of sedation was determined and the obstruction patterns during DISE-TCI-bispectral analysis then classified according to the VOTE-system. Subsequently the results were analyzed according to polysomnographic and anthropometric data. The occurrence of multilevel obstruction sites across all degrees of severity of OSA clarifies the need for sleep endoscopy prior to upper airway surgery. The advantage of this technique is the reproducibility of the protocol even for heterogeneous groups of patients. In addition, the gradual controlled and standardized increase of the plasma level of propofol with real-time control of the bispectral index leads to a precisely controllable depth of sedation. The DISE-TCI-bispectral analysis procedure is a step towards a required reproducible protocol of sleep endoscopy - capable of standardization. However it is not yet known whether these observed obstruction patterns also correspond to findings in natural sleep.

  7. A NOVEL METHOD ON DESIGNING BISPECTRAL WINDOWS

    Institute of Scientific and Technical Information of China (English)

    YaoWenbing; YaoTianren; 等

    2002-01-01

    A novel method on designing bispectral windows is proposed in this letter.Com-pound functions based on a function with binary quadric form,starting from the symmetry characteristic of three-order moments are used as the 2-D window functions.Two approaches on how to find the expressions of the compound functions are discussed in detail.One is to approxi-mate the compound function after being Taylor expanded under the MinimumMean Square Error (MMSE)criteria.Another is to compound the hyperbolic secant function and the binary quadric function directly.According to theoretical analysis,the first type new windows have been proved as slightly better than the conventional ones,the second type new windows are much better than the conventional ones ,and the bispectral estimation mean square error approximates to 0.

  8. MONITORING DEPTH OF ANAESTHESIA USING PRST SCORE AND BISPECTRAL INDEX

    Directory of Open Access Journals (Sweden)

    Rahul

    2015-03-01

    Full Text Available BACKGROUND : Intraoperative awareness is a frightening experience for any patient for it has long term psychological consequences. Among the various tools available for monitoring depth of anaesthesia, Bispectral index monitoring (BIS is one of the recent and widely accepted techniques. AIMS AND OBJECTIVES : The present study was carried out to evaluate and correlate the efficacy of BIS monitoring along with PRST score in assessment of depth of anaesthesia. MATERIALS AND METHODS : A prospective clinical study was conducted on 160 patients undergoing surgery in various specialties, in the department of Anaesthesiology at Rajarajeswari Medical College and Hospital which included adult patients between the ages of 18 and 65 years and of ASA I/II posted for elective surgeries under general anaesthesia. Conditions and drugs likely to interfere with BIS values were excluded. Anaesthesia protocol was kept uniform. These patients were divided into two groups of 80 patients each by consecutive selection. In Group 1 - depth of anaesthesia was assessed by PRST score, in Group 2 - by BIS monitoring and PRST score. Statistical analysis was performed by descriptive statistics to calculate the mean and standard deviation, the t - test, χ² test s for calculating the materiality for establishing the results. RESULTS: We saw that the Bispectral index varied with various stages of anaesthesia, almost simultaneous changes in systolic, diastolic and mean arterial blood pressures occurred in both groups in T1 and T2. On intubation, both blood pressure and heart rate increased but BIS showed a very minimal increase, which was because of adequate depth of anaesthesia and analgesia . There was a statistically significant difference in PRST scores between the two groups. There was no incidence of awareness among our study population. CONCLUSION : Evaluation of intraoperative depth of anaesthesia is one of the major tasks of anaesthesiologist. In patients with higher

  9. Bispectral Operators of Rank $1$ and Dual Isomonodromic Deformations

    CERN Document Server

    Harnad, J

    1996-01-01

    A comparison is made between bispectral operator pairs and dual pairs of isomonodromic deformation equations. Through examples, it is shown how operators belonging to rank one bispectral algebras may be viewed equivalently as defining 1-parameter families of rational first order differential operators with matricial coefficients on the Riemann sphere, whose monodromy is trivial. By interchanging the rôles of the two variables entering in the bispectral pair, a second 1-parameter family of operators with trivial monodromy is obtained, which may be viewed as the dual isomonodromic deformation system.

  10. Some Noncommutative Matrix Algebras Arising in the Bispectral Problem

    Science.gov (United States)

    Grünbaum, F. Alberto

    2014-07-01

    I revisit the so called ''bispectral problem'' introduced in a joint paper with Hans Duistermaat a long time ago, allowing now for the differential operators to have matrix coefficients and for the eigenfunctions, and one of the eigenvalues, to be matrix valued too. In the last example we go beyond this and allow both eigenvalues to be matrix valued.

  11. Improved analytical model for the field of index-guiding microstructured optical fibers

    Science.gov (United States)

    Sharma, Dinesh Kumar; Sharma, Anurag

    2016-05-01

    We present an improved version of our earlier developed analytical field model for the fundamental mode of index-guiding microstructured optical fibers (MOFs), to obtain better accuracy in the simulated results. Using this improved field model, we have studied the splice losses between an MOF and a traditional step-index single-mode fiber (SMF). Comparisons with available experimental and numerical simulation results have also been included.

  12. Nonlinear damage detection in composite structures using bispectral analysis

    Science.gov (United States)

    Ciampa, Francesco; Pickering, Simon; Scarselli, Gennaro; Meo, Michele

    2014-03-01

    Literature offers a quantitative number of diagnostic methods that can continuously provide detailed information of the material defects and damages in aerospace and civil engineering applications. Indeed, low velocity impact damages can considerably degrade the integrity of structural components and, if not detected, they can result in catastrophic failure conditions. This paper presents a nonlinear Structural Health Monitoring (SHM) method, based on ultrasonic guided waves (GW), for the detection of the nonlinear signature in a damaged composite structure. The proposed technique, based on a bispectral analysis of ultrasonic input waveforms, allows for the evaluation of the nonlinear response due to the presence of cracks and delaminations. Indeed, such a methodology was used to characterize the nonlinear behaviour of the structure, by exploiting the frequency mixing of the original waveform acquired from a sparse array of sensors. The robustness of bispectral analysis was experimentally demonstrated on a damaged carbon fibre reinforce plastic (CFRP) composite panel, and the nonlinear source was retrieved with a high level of accuracy. Unlike other linear and nonlinear ultrasonic methods for damage detection, this methodology does not require any baseline with the undamaged structure for the evaluation of the nonlinear source, nor a priori knowledge of the mechanical properties of the specimen. Moreover, bispectral analysis can be considered as a nonlinear elastic wave spectroscopy (NEWS) technique for materials showing either classical or non-classical nonlinear behaviour.

  13. The Utility of Bispectral Index for Titration of Propofol Dosages and Recovery from Anaesthesia

    Directory of Open Access Journals (Sweden)

    Heena Parikh

    2012-08-01

    Full Text Available Background: The use of clinical signs may not be reliable to measure the hypnotic component of anaesthesia. Bispectral Index monitoring provides a direct measurement of the hypnotic effect of the anaesthetic agent used and it may have certain clinical advantages over clinical signs. Objective: This study consists of dose requirement of propofol with bispectral Index monitoring and without bispectral Index monitoring. Material and Methods: In the present study, 100 patients were randomly divided into two groups (50 in each group, one group received Standard dose of propofol while the other received propofol infusion with BIS monitoring. Results: Mean amount of propofol for induction used was 1.6 vs 2.24 mg/kg in bispectral index group and standard group respectively. The inference was that the induction dose of propofol by Bispectral index and by standard practice was statistically highly significant with P<0.001. Similarly mean amount of propofol for maintenance used was 5.70 vs 8.88 mg/kg/hr in bispectral index group and standard group respectively. The inference was that the maintenance dose of propofol by Bispectral index and by standard practice was statistically highly significant with P<0.001. Conclusion: Dose requirement of propofol was less and early recovery from anesthesia with bispectral Index monitoring. [Natl J of Med Res 2012; 2(4.000: 484-487

  14. Bi-spectral extraction through elliptic neutron guides

    Energy Technology Data Exchange (ETDEWEB)

    Jacobsen, Henrik, E-mail: hjacobse@fys.ku.dk [Nanoscience center and eScience center, Niels Bohr Institute, University of Copenhagen (Denmark); ESS design update program (Denmark); Lieutenant, Klaus; Zendler, Carolin [Helmholtz-Zentrum Berlin, Hahn-Meitner-Platz 1, D-14109 Berlin (Germany); ESS design update program (Germany); Lefmann, Kim [Nanoscience center and eScience center, Niels Bohr Institute, University of Copenhagen (Denmark); ESS design update program (Denmark)

    2013-07-21

    In this paper we present the results of investigating a suggested guide extraction system utilizing both a thermal and a cold moderator at the same time, the so-called bi-spectral extraction. Here, the thermal moderator has line of sight to the sample position, and the neutrons from the cold source are reflected by a supermirror towards the sample. The work is motivated by the construction of the European Spallation Source (ESS) but the results are general and can be used at any neutron source. Due to the long pulse structure, most instruments at ESS will be long, often exceeding 50 m from moderator to detector. We therefore investigate the performance of bi-spectral extraction for instrument lengths of 30 m, 56 m, 81 m and 156 m. In all these cases, our results show that we can utilize both moderators (and thus high intensity in a wide wavelength band) in the same instrument at a cost of flux of 5–30% for neutrons with wavelength larger than 1 Å. In general, the divergence distribution is smooth at the sample position for all wavelengths. -- Highlights: • We simulate bi-spectral neutron beam extraction through elliptic guides. • Two independent ray-tracing tools (McStas and VITESS) give similar results. • Brilliance transfers of 70–95% for λ>1Å are achieved for guide lengths of 30–156 m. • The beam profile is smooth at the sample position. • The simulations are performed with ESS in mind, but have general validity.

  15. Efficient generation of broad Raman sidebands in an index-guided photonic crystal fiber.

    Science.gov (United States)

    Li, Ying; Hou, Jing; Jiang, Zongfu; Leng, Jinyong

    2013-04-01

    The efficient generation of broad Raman sidebands is experimentally demonstrated in a short piece of index-guided photonic crystal fiber, which is pumped by a high-peak-power pulse near the zero-dispersion wavelength and seeded by a continuous-wave Stokes signal centered at 1117 nm. The Raman sidebands generated via stimulated Raman scattering and cascaded four-wave mixing contain five Stokes and six anti-Stokes peaks and span from 827 to 1398 nm, and the 3 dB linewidth for each peak is smaller than 1 nm. However, the pure Raman sidebands are largely dependent on the pulse pump power as well as the fiber length.

  16. Auditory information processing during adequate propofol anesthesia monitored by electroencephalogram bispectral index

    NARCIS (Netherlands)

    C. Kerssens (Chantal); J. Klein (Jan); A. van der Woerd; B. Bonke (Benno)

    2001-01-01

    textabstractMemory for intraoperative events may arise from inadequate anesthesia when the hypnotic state is not continuously monitored. Electroencephalogram bispectral index (BIS) enables monitoring of the hypnotic state and titration of anesthesia to an adequate level

  17. Bispectral Index Monitoring: validity and utility in pediatric dentistry.

    Science.gov (United States)

    Goyal, Ashima; Mittal, Neeti; Mittal, Parteek; Gauba, K

    2014-01-01

    Reliable and safe provision of sedation and general anesthesia is dependent on continuous vigilance of patient's sedation depth. Failure to do so may result in unintended oversedation or undersedation. It is a common practice to observe sedation depth by applying subjective sedation scales and in case of general anesthesia, practitioner is dependent on vital sign assessment. The Bispectral Index System (BIS) is a recently introduced objective, quantitative, easy to use, and free from observer bias, and clinically useful tool to assess sedation depth and it precludes the need to stimulate the patient to assess his sedation level. The present article is an attempt to orient the readers towards utility and validity of BIS for sedation and general anesthesia in pediatric dentistry. In this article, we attempt to make the readers understand the principle of BIS, its variation across sedation continuum, its validity across different age groups and for a variety of sedative drugs.

  18. Evaluation of bispectral LIDAR data for urban vegetation mapping

    Science.gov (United States)

    Nabucet, Jean; Hubert-Moy, Laurence; Corpetti, Thomas; Launeau, Patrick; Lague, Dimitri; Michon, Cyril; Quenol, Herve

    2016-10-01

    Because of the large increase of urban population in the last decades, the question of sustainable development in urban areas is crucial. In this context, vegetation plays a significant role in urban planning, environmental protecting, and sustainable development policy making, heating and cooling requirements of buildings, displacement of animals dispersion, concentration of pollutants, and well-being. In numerous cities, vegetation is limited to public areas using GPS surveys or aerial remote sensing data. Recently, very high-resolution sensors as Light Detection and Ranging (LiDAR) data have permitted significant improvements in vegetation mapping in urban areas. This paper presents an evaluation of a new generation of airborne LIDAR bi-spectral discrete point (Optech titan) for mapping and characterizing urban vegetation. The methodology is based on a four-step approach: 1) the analysis of the quality of data in order to estimate noise between the green and near-infrared LIDAR point clouds; 2) this enables to remove the topographic effects and 3) a first classification, devoted to the elimination of the non-vegetation class, is performed based on the intensity value of the two channels; finally, in 4), the tree coverage is classified into seven categories of strata combination. To this end specific descriptors related to the organization of the point clouds are used. These first results show that compared to monospectral LiDAR data, bi-spectral LiDAR enables to improve significantly both the extraction and the characterization of urban objects. This reveals new perspectives for mapping and characterizing urban patterns and other complex structures.

  19. IV ATP potentiates midazolam sedation as assessed by bispectral index.

    Science.gov (United States)

    Sakurai, Satoru; Fukunaga, Atsuo; Ichinohe, Tatsuya; Kaneko, Yuzuru

    2014-01-01

    In this study, by measuring bispectral index (BIS), we tested the hypothesis that intravenous adenosine 5'-triphosphate (ATP) infusion would deepen the level of midazolam-induced sedation. Ten healthy volunteers underwent 2 experiments with at least 2 weeks' interval: immediately after intravenous bolus administration of midazolam (0.04 mg/kg), they received continuous infusion of either ATP infusion (100 μg/kg/min) or placebo (saline) for 40 minutes in a double-blind, randomized, crossover manner. Changes in BIS values and responsiveness to verbal command as well as cardiorespiratory variables were observed throughout the study periods. Administration of midazolam alone reduced BIS value from control: 97 ± 1 to 68 ± 18 at 25 minutes, which was accompanied by significant cardiopulmonary depressant effects, while maintaining responsiveness to verbal command (consciousness) throughout the study period. Coadministration of ATP with midazolam further reduced BIS value to 51 ± 13, associated with complete loss of consciousness without adverse effect on the cardiorespiratory systems. We conclude that the addition of ATP infusion to midazolam significantly enhances midazolam sedation without disturbing cardiorespiratory functions.

  20. Optimization of Deep Sedation with Spontaneous Respiration for Therapeutic Endoscopy Combining Propofol and Bispectral Index Monitoring

    Directory of Open Access Journals (Sweden)

    Kohei Matsumoto

    2015-01-01

    Full Text Available Background/Aims. This study aimed to establish optimal propofol anesthesia for therapeutic endoscopy, which has not been established. Methodology. We retrospectively investigated data on 89 patients who underwent upper-GI endoscopic submucosal dissection or endoscopic mucosal resection under anesthesia with propofol. Examined doses of propofol were changed according to efficacy and/or adverse events and classified into 5 periods. A bispectral index (BIS monitor was used at Period 5 to decrease the incidence of adverse events caused by oversedation. The initial dose of propofol was administered after bolus injection of pethidine hydrochloride (0.5 mg/kg, and 1.0 mL of propofol was added every minute until the patients fell asleep. Continuous and bolus infusion were performed to maintain sedation. When the patient moved or an adverse event occurred, the maintenance dose examined was increased or decreased by 5 mL/h regardless of body weight. Results. Dose combinations (introduction : maintenance and patient numbers for each period were as follows: Period 1 (n=27, 0.5 mg/kg : 5 mg/kg/h; Period 2 (n=11, 0.33 mg/kg : 3.3 mg/kg/h; Period 3 (n=7, 0.5 mg/kg : 3.3 mg/kg/h; Period 4 (n=14, 0.5 mg/kg : 2.5 mg/kg/h; Period 5 (n=30, 0.5 mg/kg : 2.5 mg/kg/h, using BIS monitor. During Period 5, an adverse event occurred in 10.0% of patients, which was lower than that for Periods 1–4. Conclusions. Period 5 propofol anesthesia with BIS protocol could be safe and useful for therapeutic endoscopy under deep sedation with spontaneous respiration.

  1. Patient state index vs bispectral index as measures of the electroencephalographic effects of propofol.

    NARCIS (Netherlands)

    Soehle, M.; Kuech, M.; Grube, M.; Wirz, S.; Kreuer, S.; Hoeft, A.; Bruhn, J.; Ellerkmann, R.K.

    2010-01-01

    BACKGROUND: The patient state index (PSI) and the bispectral index (BIS) quantify anaesthetic depth based on the EEG using different algorithms. We compared both indices with regard to the prediction of the depth of propofol anaesthesia. METHODS: In 17 patients, propofol was infused until burst supp

  2. Reduction in anaesthetic drug consumption is correlated with mean titrated intra-operative Bispectral Index values.

    NARCIS (Netherlands)

    Ellerkmann, R.K.; Kreuer, S.; Wilhelm, W.; Ropcke, H.; Hoeft, A.; Bruhn, J.

    2006-01-01

    BACKGROUND: Several studies have shown a reduction in anaesthetic drug consumption with Bispectral Index (BIS) titration compared with standard clinical practice. However, the amount of reduction varied widely between 1% and 40%. We investigated the correlation between reduction in anaesthetic drug

  3. Influence of intravenous clonidine pretreatment on anesthetic requirements during bispectral EEG-guided sevoflurane anesthesia

    NARCIS (Netherlands)

    De Deyne, C; Struys, M; Heylen, R; De Jongh, R; Vander Laenen, M; Buyse, L; Deghislage, J; Rolly, G

    2000-01-01

    Study Objective: To assess the anaesthetic effects of clonidine during sevoflurane anaesthesia guided by the bispectral index (BIS), which is a processed EEG variable correlated with anaesthetic-hypnotic depth. Design: Placebo-controlled, double-blind clinical trial Settings: Elective laparoscopic s

  4. Bispectral methods of signal processing applications in radar, telecommunications and digital image restoration

    CERN Document Server

    Totsky, Alexander V; Kravchenko, Victor F

    2015-01-01

    By studying applications in radar, telecommunications and digital image restoration, this monograph discusses signal processing techniques based on bispectral methods. Improved robustness against different forms of noise as well as preservation of phase information render this method a valuable alternative to common power-spectrum analysis used in radar object recognition, digital wireless communications, and jitter removal in images.

  5. Comparison of relative oxycodone consumption in surgical pleth index-guided analgesia versus conventional analgesia during sevoflurane anesthesia

    Science.gov (United States)

    Won, Young Ju; Lim, Byung Gun; Lee, So Hyun; Park, Sangwoo; Kim, Heezoo; Lee, Il Ok; Kong, Myoung Hoon

    2016-01-01

    Abstract Background: The surgical pleth index (SPI) is proposed for titration of analgesic drugs during general anesthesia. Several reports have investigated the effect of SPI on the consumption of opioids including remifentanil, fentanyl, and sufentanil during anesthesia, but there are no reports about oxycodone. We aimed to investigate intravenous oxycodone consumption between SPI-guided analgesia and conventional analgesia practices during sevoflurane anesthesia in patients undergoing thyroidectomy. Methods: Forty-five patients undergoing elective thyroidectomy were randomly assigned to an SPI group (SPI-guided analgesia group, n = 23) or a control group (conventional analgesia group, n = 22). Anesthesia was maintained with sevoflurane to achieve bispectral index values between 40 and 60. In the SPI group, oxycodone 1 mg was administered intravenously at SPI values over 50; in the control group, oxycodone 1 mg was administered intravenously at the occurrence of tachycardia or hypertension event. Intraoperative oxycodone consumption and extubation time were recorded. The number of hemodynamic and somatic movement events was recorded, as were postoperative pain and recovery scores. Results: Patients’ characteristics were comparable between the groups. Intraoperative oxycodone consumption in the SPI group was significantly lower than the control group (3.5 ± 2.4 vs 5.1 ± 2.4 mg; P = 0.012). Extubation time was significantly shorter in the SPI group (10.6 ± 3.5 vs 13.4 ± 4.6 min; P = 0.026). Hemodynamic and somatic movement events during anesthesia were comparable between the groups, as were numeric rating scales for pain and modified Aldrete scores at postanesthesia care unit. Conclusions: SPI-guided analgesia reduces intravenous oxycodone consumption and extubation time compared with conventional analgesia based on clinical parameters during sevoflurane anesthesia in patients undergoing thyroidectomy. PMID:27583920

  6. The effect of aging on bispectral index before and after sedation: a prospective study

    Directory of Open Access Journals (Sweden)

    Mahoori A

    2010-08-01

    Full Text Available "nBackground: The Bispectral Index (BIS is an EEG-derived value that measures the sedative and hypnotic component of the anesthetic state. The effects of age on the bispectral index have not been well documented. The objective of the present study was to determine the influence of age on hypnotic requirement and bispectral index in awake and in patients with sedation induced by midazolam. "n"nMethods: Eighty patients were enrolled in this prospective observational study. The patients in study group were aged more than 70 years, and the age in control group ranged 20-40 years. Baseline recording of BIS was taken in awake patients in two groups for few minutes. Five minutes after administration of 0.02 mg/kg IV midazolam the BIS value also was taken and recorded. "n"nResults: In the study group, patients had a mean base BIS 94±3 compared with 97.3±1 in the control group (p< 0.0001. Five minutes after administration of 0.02 mg/kg midazolam the value were 80.9±6 and 90.4±3 respectively (p< 0.0001. "n"nConclusion: When BIS is used as a monitor of hypnosis in the elderly, we recommend that a baseline recording be taken before induction for a few minutes to alert the anesthesia provider to the possibility of low initial values. Further studies are needed to verify if the recommended range of 50-60 of BIS during clinical anesthesia is also adequate in the elderly with low initial baseline BIS or if this range needs adjusting in view of reduced initial BIS value.

  7. Quando o índice bispectral (BIS pode fornecer valores espúrios Cuando el índice bispectral (BIS puede suministrar valores falsos When the bispectral index (Bis can give false results

    Directory of Open Access Journals (Sweden)

    Leonardo Teixeira Domingues Duarte

    2009-02-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: O índice bispectral (BIS é um parâmetro multifatorial derivado do eletroencefalograma (EEG que permite a monitorização do componente hipnótico da anestesia. Foi obtido a partir de algoritmo derivado da análise de grande número de EEGs de voluntários e pacientes submetidos a sedações e anestesia geral com diferentes agentes anestésicos. Além de outros benefícios, o uso do BIS para monitorização da profundidade da anestesia reduz a ocorrência de despertar e memória intra-operatória. Esta revisão teve o objetivo de apresentar situações clínicas em que o BIS aponta valores espúrios, falsamente elevados ou reduzidos, em decorrência de condições do paciente ou ações de anestésicos não-previstos quando da elaboração do seu algoritmo. CONTEÚDO: Os valores do BIS podem sofrer alteração e influência em variadas situações clínicas em que há padrões anormais do EEG; efeito de diferentes anestésicos e outros fármacos não-incluídos na elaboração de seu algoritmo; interferência de equipamentos elétricos; bem como decorrentes de peculiaridades do monitor. CONCLUSÃO: Apesar de o algoritmo do BIS ter sofrido diversas alterações desde a sua primeira versão, essas situações que determinam variações espúrias dos valores do BIS devem ser reconhecidas pelo anestesiologista a fim de evitar complicações, sejam conseqüentes à sobredose anestésica, sejam por subdoses que poderão causar despertar e memória intra-operatória.JUSTIFICATIVA Y OBJETIVOS: El índice bispectral (BIS es un parámetro multifactorial derivado del electroencefalograma (EEG, que permite la monitorización del componente hipnótico de la anestesia. Fue obtenido a partir de algoritmo derivado del análisis de un gran número de EEG de voluntarios y pacientes sometidos a sedaciones y anestesia general con diferentes agentes anestésicos. Además de otros beneficios, el uso del BIS para la monitorización de la

  8. Comparative pharmacodynamic modeling using bispectral and narcotrend-index with and without a pharmacodynamic plateau during sevoflurane anesthesia.

    NARCIS (Netherlands)

    Kreuer, S.; Bruhn, J.; Walter, E.; Larsen, R.; Apfel, C.C.; Grundmann, U.; Biedler, A.; Wilhelm, W.

    2008-01-01

    BACKGROUND: We compared two pharmacodynamic models, one with and one without a plateau effect. Bispectral indices (BIS, Aspect Medical Systems, Natick, MA, version XP) and Narcotrend (NCT, MonitorTechnik, Bad Bramstedt, Germany, version 4.0) were used as an electroencephalographic measure of sevoflu

  9. Comparison of bispectral index and composite auditory evoked potential index for monitoring depth of hypnosis in children

    NARCIS (Netherlands)

    H.J.B. van Oud-Alblas; J.W.B. Peters (Jeroen); T.G. de Leeuw (Tom); D. Tibboel (Dick); J. Klein (Jan); F. Weber (Frank)

    2008-01-01

    textabstractBACKGROUND: In pediatric patients, the Bispectral Index (BIS), derived from the electroencephalogram, and the composite A-Line autoregressive index (cAAI), derived from auditory evoked potentials and the electroencephalogram, have been used as measurements of depth of hypnosis during ane

  10. Bispectral index monitoring prevent awareness during total intravenous anesthesia: a prospective, randomized,double-blinded, multi-center controlled trial

    Institute of Scientific and Technical Information of China (English)

    ZHANG Chen; GUO Jian-rong; JIN Yao-jun; WU Gang; YUAN Wei; YUAN Zhi-guo; YUE Yun; XU Liang; MA Ya-qun; SUN Yan-xia; LI Yan-hong; ZHANG Liang; FENG Chun-sheng; LUO Bing; ZHAO Zhen-long

    2011-01-01

    Background Awareness is a serious complication of general anesthesia.In China,the incidence of intraoperative awareness was 1% in patients undergoing total intravenous anesthesia (TIVA).In this study,we compared the incidence of awareness between Bispectral index (BIS)-guided and routine TIVA protocol and evaluated the effect of BIS on preventing awareness.Methods A prospective,randomized,double-blinded,multicenter controlled trial was performed.Patients (≥18 years of age) undergoing TIVA were randomly divided into BIS-guided group (Group A,BIS was monitored and recommended to maintain between 40-60) and control group (Group B,BIS was monitored but the screen was covered).The intraoperative BIS values were downloaded and the BIS trends of confirmed awareness cases were analyzed to determine whether light anesthesia existed.Results Of the total 5228 patients,2919 patients were assigned to Group A and 2309 to Group B.Four cases of confirmed awareness (0.14%) were reported in the BIS-guided group and 15 (0.65%) in the control group (P=0.002,OR=0.21,95% confidence intervals:0.07-0.63).The incidence of possible awareness (0.14% vs.0.26%,P=0.485) and dreaming (3.1% vs.3.1%,P=0.986) was comparable between BIS-guided group and the control group.Among the 19 confirmed awareness cases,intraoperative BIS trends of six cases were downloaded and identified.Five of them showed signs of light anesthesia as BIS >60 and lasted 19-106 minutes,whereas one case had a stable BIS trend and the values were within 60 during the operation.Another five awareness cases were reviewed for anesthesia procedures,of which improper light anesthesia were confirmed.Conclusions BIS-guided TIVA (BIS was recommended to maintain between 40-60) decreased the risk of awareness compared with routine TIVA.The main reason for awareness was light anesthesia.

  11. Neutronic analysis of the bi-spectral moderator such as that proposed for ESS

    Energy Technology Data Exchange (ETDEWEB)

    Magán, M., E-mail: miguel.magan@essbilbao.org [ESS-BILBAO, Parque Tecnológico Bizkaia, Laida Bidea, Edificio 207 B Planta Baja, 48160 Derio (Spain); Instituto de Fusión Nuclear – UPM, ETS Ingenieros Industriales, C José Gutiérrez Abascal, 2, 28006 Madrid (Spain); Sordo, F. [ESS-BILBAO, Parque Tecnológico Bizkaia, Laida Bidea, Edificio 207 B Planta Baja, 48160 Derio (Spain); Instituto de Fusión Nuclear – UPM, ETS Ingenieros Industriales, C José Gutiérrez Abascal, 2, 28006 Madrid (Spain); Zanini, L. [European Spallation Source ESS AB, Box 176, 22100 Lund (Sweden); Terrón, S.; Ghiglino, A.; Martínez, F.; Vicente, J.P. de; Vivanco, R. [ESS-BILBAO, Parque Tecnológico Bizkaia, Laida Bidea, Edificio 207 B Planta Baja, 48160 Derio (Spain); Instituto de Fusión Nuclear – UPM, ETS Ingenieros Industriales, C José Gutiérrez Abascal, 2, 28006 Madrid (Spain); Perlado, J.M. [Instituto de Fusión Nuclear – UPM, ETS Ingenieros Industriales, C José Gutiérrez Abascal, 2, 28006 Madrid (Spain); Bermejo, F.J. [ESS-BILBAO, Parque Tecnológico Bizkaia, Laida Bidea, Edificio 207 B Planta Baja, 48160 Derio (Spain); Instituto de Estructura de la Materia, IEM-CSIC, Consejo Superior de Investigaciones Científicas, Serrano 123, 28006 Madrid (Spain); Mezei, F. [European Spallation Source ESS AB, Box 176, 22100 Lund (Sweden); Muhrer, G. [Lujan Neutron Scattering Center, LANSCE Los Alamos National Laboratory, Los Alamos, NM 87545 (United States)

    2013-11-21

    This paper reports on design studies concerning a moderator concept which aims to maximize the time averaged flux. The idea is to provide neutron spectra showing two clear maxima, with peaks at (∼1Å) and (∼2.5Å) arising from leakage from both cryogenic and thermal moderators. Such a concept known as a bi-spectral moderator (Mezei, 2006 [1]) while proven on a reactor source has only been examined for the ESS 2003 proposal. Filges et al. (2003 [2]), which featured a different design than the current ESS. This paper thus reports on a baseline design for such a moderator concept and shows that it can provide substantial gains in count rates for those applications not requiring high resolution in time-of-flight.

  12. Capnography and the Bispectral Index—Their Role in Pediatric Sedation: A Brief Review

    Directory of Open Access Journals (Sweden)

    Maria Sammartino

    2010-01-01

    Full Text Available Sedation in children is increasingly emerging as a minimally invasive technique that may be associated with local anaesthesia or diagnostic and therapeutic procedures which do not necessarily require general anaesthesia. Standard monitoring requirements are not sufficient to ensure an effective control of pulmonary ventilation and deep sedation. Capnography in pediatric sedation assesses the effect of different drugs on the occurrence of respiratory failure and records early indicators of respiratory impairment. The Bispectral index (BIS allows the reduction of dose requirements of anaesthetic drugs, the reduction in the time to extubation and eye opening, and the reduction in the time to discharge. In the field of pediatric sedation, capnography should be recommended to prevent respiratory complications, particularly in spontaneous ventilation. The use of the BIS index, however, needs further investigation due to a lack of evidence, especially in infants. In this paper, we will investigate the role of capnography and the BIS index in improving monitoring standards in pediatric sedation.

  13. Relationship of bispectral index to hemodynamic variables and alveolar concentration multiples of sevoflurane in puppies.

    Science.gov (United States)

    Morgaz, J; Granados, M M; Domínguez, J M; Navarrete, R; Galán, A; Fernández, J A; Gómez-Villamandos, R J

    2009-06-01

    The relationships between bispectral index (BIS), cardiovascular variables and minimum alveolar concentration (MAC) multiples of sevoflurane in puppies were determined. Five puppies were anesthetized with sevoflurane on two occasions. First, the individual sevoflurane MAC values were determined for each puppy. Secondly, dogs were anesthetized with sevoflurane at each of 5 MAC multiples, 0.75, 1, 1.25, 1.5 and 1.75 MAC administered in random order. Hemodynamic parameters and BIS data were collected for 20min. Somatic stimulus was then applied and the same parameters and data were collected for 6min. Correlation between BIS and end tidal sevoflurane and between BIS and hemodynamic parameters were studied. We found positive significant correlation in both cases. BIS is lower in puppies that in adults at the same alveolar anesthetic concentrations and sevoflurane appears to be a safe anesthetic in puppies.

  14. Effect of different doses of dezocine on degree of emergence agitation under bispectral index monitoring

    Institute of Scientific and Technical Information of China (English)

    Xing-Bao Liang; Zong-Rong Guo

    2016-01-01

    Objective:To analyze the effect of different doses of dezocine on degree of emergence agitation under bispectral index monitoring. Methods:A total of 196 cases who received general anesthesia in our hospital from September 2012 to December 2014 were selected as research subjects, bispectral index (BIS) monitoring was continuously conducted during anesthesia induction and extubation anesthesia recovery, and according to different methods of dezocine intervention, they were randomly divided into control group, D1 group, D2 group and D3 group, each group with 49 cases. Differences in levels of recovery time-related indexes, BIS values before dezocine administration (T0), sputum suction before extubation (T1), extubation time (T2) and 10 min after extubation (T3), hemodynamic indexes and stress indexes of all groups were compared. Results:Recovery time and extubation time of D2 group were shorter than those of control group, D1 group and D3 group, restlessness scale after extubation and VAS were lower than those of control group and D1 group, and Ramsay sedation scale was higher than that of control group and D1 group (P0.05);cortisol and blood glucose levels at T1, T2 and T3 points in time of D2 and D3 group were lower than those of other two groups (P0.05). Conclusions:0.1 mg/kg dezocine administration before end of operation can reduce emergence agitation without causing excessive sedation or prolonged extubation time, and it has active significance in stabilizing patients’ hemodynamic and stress levels in extubation period.

  15. The use of the bispectral index in the detection of pain in mechanically ventilated adults in the intensive care unit: A review of the literature

    Science.gov (United States)

    Coleman, Robin Marie; Tousignant-Laflamme, Yannick; Ouellet, Paul; Parenteau-Goudreault, Élizabeth; Cogan, Jennifer; Bourgault, Patricia

    2015-01-01

    BACKGROUND: Pain assessment is an immense challenge for clinicians, especially in the context of the intensive care unit, where the patient is often unable to communicate verbally. Several methods of pain assessment have been proposed to assess pain in this environment. These include both behavioural observation scales and evaluation of physiological measurements such as heart rate and blood pressure. Although numerous validation studies pertaining to behavioural observation scales have been published, several limitations associated with using these measures for pain assessment remain. Over the past few years, researchers have been interested in the use of the bispectral index monitoring system as a proxy for the evaluation of encephalography readings to assess the level of anesthesia and, potentially, analgesia. OBJECTIVES: To synthesize the main studies exploring the use of the bispectral index monitoring system for pain assessment, to guide future research in adults under sedation in the intensive care unit. METHOD: The EMBASE, Medline, CINAHL and PsycINFO databases were searched for studies published between 1996 and 2013 that evaluated the use of the bispectral index in assessing pain. RESULTS: Most studies conclude that nociceptive stimulation causes a significant increase in the bispectral index and revealed the importance of controlling certain confounding variables such as the level of sedation. DISCUSSION: Further studies are needed to clearly demonstrate the relationship between nociceptive stimuli and the bispectral index, as well as the specificity of the bispectral index in detecting pain. PMID:25050877

  16. Changes to the bispectral index and regional cerebral blood flow in a sedative state, caused by midazolam administration

    OpenAIRE

    池田, 淳子; イケダ, ジュンコ; Junko, IKEDA

    2006-01-01

    Psychosedation, as used in the field of dentistry, is intended to provide trouble-free dental care while maintaining a proper level of sedation. One drug used in psychosedation is midazolam, which is known to have a strong amnestic effect. In the current research, I sought to clarify whether the bispectral index (BIS) using EEC analysis can be used for assessment of optimal sedation in psychosedation, and what effects midazolam has on the cerebrum's mechanism of memory. The subjects were 17 h...

  17. Effects of cardiopulmonary bypass on propofol pharmacokinetics and bispectral index during coronary surgery

    Directory of Open Access Journals (Sweden)

    Ricardo Antonio G. Barbosa

    2009-03-01

    Full Text Available PURPOSE: Cardiopulmonary bypass is known to alter propofol pharmacokinetics in patients undergoing cardiac surgery. However, few studies have evaluated the impact of these alterations on postoperative pharmacodynamics. This study was designed to test the hypothesis that changes in propofol pharmacokinetics increase hypnotic effects after cardiopulmonary bypass. METHODS: Twenty patients scheduled for on-pump coronary artery bypass graft (group, n=10 or off-pump coronary artery bypass graft (group, n=10 coronary artery bypass grafts were anesthetized with sufentanil and a propofol target controlled infusion (2.0 µg/mL. Depth of hypnosis was monitored using the bispectral index. Blood samples were collected from the induction of anesthesia up to 12 hours after the end of propofol infusion, at predetermined intervals. Plasma propofol concentrations were measured using high-performance liquid chromatography, followed by a non-compartmental propofol pharmacokinetic analysis. Data were analyzed using ANOVA, considering p<0.05 as significant. RESULTS: After cardiopulmonary bypass, despite similar plasma propofol concentrations in both groups, bispectral index values were lower in the on-pump coronary artery bypass graft group. Time to extubation after the end of propofol infusion was greater in the on-pump coronary artery bypass graft group (334 ± 117 vs. 216 ± 85 min, p = 0.04. Patients undergoing cardiopulmonary bypass had shorter biological (1.82 ± 0.5 vs. 3.67 ± 1.15h, p < 0.01 and terminal elimination (6.27 ± 1.29 vs. 10.5h ± 2.18, p < 0.01 half-life values, as well as higher total plasma clearance (28.36 ± 11.40 vs.18.29 ± 7.67 mL/kg/min, p = 0.03, compared to patients in the off-pump coronary artery bypass graft group. CONCLUSION: Aside from the increased sensitivity of the brain to anesthetics after cardiopulmonary bypass, changes in propofol pharmacokinetics may contribute to its central nervous system effects.

  18. Comparison of dexmedetomidine and midazolam for conscious sedation in dental surgery monitored by bispectral index.

    Science.gov (United States)

    Fan, Tai Weng Victor; Ti, Lian Kah; Islam, Intekhab

    2013-07-01

    Although various sedative drugs in different regimens and given by different delivery routes have been used for conscious sedation, the ideal agent and regimen remain to be established. This study was designed to compare the efficacy (sedation, anxiolysis, analgesia, operating conditions, and patients' satisfaction) and safety of midazolam and dexmedetomidine as sedatives for dental procedures in a randomised, double-blind study in third molar and dental implant surgery. Sixty healthy patients who were American Society of Anesthesiologists (ASA) group I or II were enrolled and we recorded their personal details, the amount of drug used, their degree of satisfaction, duration of operation, and haemodynamic and respiratory variables. The two groups were comparable. The amount of local anaesthetic (p=0.11) and the duration of operation did not differ significantly (p=0.32). The patients in the dexmedetomidine group had a slower heart rate, lower systolic and diastolic pressure, and cooperated better. There were no significant differences in their respiratory rates, bispectral index, and total volume of drugs used. We conclude that dexmedetomidine works as well as midazolam for outpatient dental procedures and can be used as an alternative to midazolam.

  19. Usefulness of bispectral monitoring of conscious sedation during endoscopic mucosal dissection

    Institute of Scientific and Technical Information of China (English)

    Kazunori Hata; Akira Andoh; Kiyoyuki Hayafuji; Atsuhiro Ogawa; Tamio Nakahara; Tomoyuki Tsujikawa; Yoshihide Fujiyama; Yasuharu Saito

    2009-01-01

    AIM: To assess the usefulness of bispectral index (BIS) monitoring in order to carry out endoscopic submucosal dissection (ESD) safely and with patients'satisfaction. METHODS: Three hundred sixty-six patients with an early-stage neoplasm of the digestive tract were enrolled. The BIS monitor (A-1050: Aspect medical systems/NIHON KOHDEN, Tokyo, Japan) was used. The appropriate sedative condition was set at 55 to 75 BIS levels (BIS value) during the endoscopic procedures.RESULTS: Among 366 cases, 13 were accompanied by adverse events during and/or after ESD. All episodes occurred in cases with BIS value between 56 and 65. Hypotension was observed in four cases, and bradycardia in six. Respiratory distress was observed in two cases with chronic pulmonary obstructive disease. All patients with adverse events were able to leave the hospital without extension of the hospitalization. CONCLUSION: BIS monitoring is useful to safely perform ESD. A BIS value of 70 to 75 is suitable for ESD.

  20. Bi-spectral beam extraction in combination with a focusing feeder

    CERN Document Server

    Zendler, C; Nekrassov, D; Cussen, L D; Strobl, M

    2013-01-01

    Bi-spectral beam extraction combines neutrons from two different kind of moderators into one beamline, expanding the spectral range and thereby the utilization of an instrument. This idea can be realized by a mirror that reflects long wavelength neutrons from an off-axis colder moderator into a neutron guide aligned with another moderator emitting neutrons with shorter wavelengths which will be transmitted through the mirror. The mirror used in such systems is typically several meters long, which is a severe disadvantage because it reduces the possible length of a focusing device in design concepts requiring a narrow beam at a short distance from the source, as used in many instruments under development for the planned European Spallation Source (ESS). We propose a shortened extraction system consisting of several mirrors, and show that such an extraction system is better suited for combination with a feeder in an eye of the needle design, illustrated here in the context of a possible ESS imaging beamline.

  1. Bispectral index monitoring in the management of sedation in an intensive care unit patient with locked-in syndrome.

    Science.gov (United States)

    Quraishi, Sadeq A; Blosser, Sandralee A; Cherry, Robert A

    2011-11-01

    Locked-in syndrome is an extremely rare neurological state caused by injury of the ventral pons. The syndrome is characterized by quadriplegia and anarthria with concomitant preservation of cortical function. When a reversible underlying pathological abnormality is identified and managed aggressively, meaningful recovery is possible. Because patients retain consciousness throughout their illness, a dependable method for titrating sedation may improve their quality of life. The case presented suggests that bispectral index monitoring may be a cost-effective and reliable method for managing sedation in patients with locked-in syndrome.

  2. Relationship of feline bispectral index to multiples of isoflurane minimum alveolar concentration.

    Science.gov (United States)

    Lamont, Leigh A; Greene, Stephen A; Grimm, Kurt A; Tranquilli, William J

    2005-06-01

    The study reported here was done to determine the relationship between bispectral index (BIS) values and minimum alveolar concentration (MAC) multiples of isoflurane in cats. Isoflurane MAC was determined using the tail-clamp method in eight domestic cats. Ten days later, the cats were anesthetized a second time with isoflurane at each of five MAC multiples administered in random order. Ventilation was controlled and, after a 20-min equilibration period at each MAC multiple of isoflurane, BIS data were collected for 5 min and the median BIS value calculated. Data from each isoflurane MAC multiple were compared using analysis of variance for repeated measures, and statistical significance was set at P MAC of isoflurane (mean +/- 1 standard deviation) was 1.8% +/- 0.2%. BIS values at 0.5 MAC could not be recorded due to spontaneous movement in all eight cats. BIS values at 2.0 MAC were confounded by burst suppression in seven of the eight cats. Over the range of 0.8 to 1.5 MAC, BIS values decreased significantly with increasing end-tidal isoflurane concentrations. Mean (+/- 1 standard deviation) BIS measurements were 32 +/- 3 at 0.8 MAC, 20 +/- 4 at 1.0 MAC, and 5 +/- 3 at 1.5 MAC. Therefore, BIS values are inversely and linearly related to end-tidal isoflurane concentrations in anesthetized cats. However, the consistently low BIS values recorded in this study suggest that clinical BIS endpoints used to titrate anesthetic agents in humans may not be applicable to cats.

  3. Bispectral index monitoring for conscious sedation in intervention: better, safer, faster

    Energy Technology Data Exchange (ETDEWEB)

    Bell, J.K.; Laasch, H.-U.; Wilbraham, L.; England, R.E.; Morris, J.A.; Martin, D.F. E-mail: derrick.martin@smtr.nhs.uk

    2004-12-01

    AIM: The aim of this study was to compare subjective (Ramsay sedation score, RSS) with objective electroencephalogram-based bispectral index (BIS) assessment, and to validate the appropriate BIS range for measurement of conscious sedation in interventional procedures. MATERIALS AND METHODS: One hundred patients undergoing sedo-analgesia (midazolam and fentanyl) for interventional gastrointestinal procedures were divided into two groups. In group A (n=30) sedation was guided by the RSS with the operator blinded to the BIS recording. In group B (n=70) the operator titrated intravenous sedation to maintain an optimal BIS, predetermined from the results in group A. Recovery time, procedure duration, physiological parameters and unplanned events were recorded in both groups. RESULTS: There was a significant correlation between the BIS and RSS (p<0.001). BIS values of 87.2 and 80.9 corresponded to an RSS of 3 and 4, respectively. The optimal BIS level was defined as 80-85. Fifty-seven point five percent of readings were within this range in group B compared with 26.5% in group A (p<0.001). Sedation approaching general anaesthesia (BIS<60) occurred in 5.5% of patients in group A but not in group B. Mean recovery time, duration of procedure, midazolam and fentanyl doses were significantly reduced in group B. Unplanned events were reduced from 27 to 17%, but this was not statistically significant (p=0.29). CONCLUSION: BIS monitoring enables more effective titration of sedatives to maintain a suitable level of consciousness, whilst reducing procedure time. The BIS offers an objective, safe and reliable measure of sedation, without disturbing either patient or operator. BIS monitoring raises the standard of patient care, and in our view, should be used to augment standard assessment.

  4. Bispectral index as a predictor of sedation depth during isoflurane or midazolam sedation in ICU patients.

    Science.gov (United States)

    Sackey, P V; Radell, P J; Granath, F; Martling, C R

    2007-06-01

    Bispectral index (BIS) is used for monitoring anaesthetic depth with inhaled anaesthetic agents in the operating room but has not been evaluated as a monitor of sedation depth in the intensive care unit (ICU) setting with these agents. If BIS could predict sedation depth in ICU patients, patient disturbances could be reduced and oversedation avoided. Twenty ventilator-dependent ICU patients aged 27 to 80 years were randomised to sedation with isoflurane via the AnaConDa or intravenous midazolam. BIS (A-2000 XP, version 3.12), electromyogram activity (EMG) and Signal Quality Index were measured continuously. Hourly clinical evaluation of sedation depth according to Bloomsbury Sedation Score (Bloomsbury) was performed. The median BIS value during a 10-minute interval prior to the clinical evaluation at the bedside was compared with Bloomsbury. Nurses performing the clinical sedation scoring were blinded to the BIS values. End-tidal isoflurane concentration was measured and compared with Bloomsbury. Correlation was poor between BIS and Bloomsbury in both groups (Spearman's rho 0.012 in the isoflurane group and -0.057 in the midazolam group). Strong correlation was found between BIS and EMG (Spearman's rho 0.74). Significant correlation was found between end-tidal isoflurane concentration and Bloomsbury (Spearman's rho 0.47). In conclusion, BIS XP does not reliably predict sedation depth as measured by clinical evaluation in non-paralysed ICU patients sedated with isoflurane or midazolam. EMG contributes significantly to BIS values in isoflurane or midazolam sedated, non-paralysed ICU patients. End-tidal isoflurane concentration appeared to be a better indicator of clinical sedation depth than BIS.

  5. Evaluation of the Adequacy of General Anesthesia in Cesarean Section by Bispectral Index

    Directory of Open Access Journals (Sweden)

    Sayed Mohammad Reza Hadavi

    2013-09-01

    Full Text Available Background: Awareness and recall, though not common, are the major hazards of general anesthesia, especially in Cesarean section (C/S because of the absence of benzodiazepine and opioids for a significant time during anesthesia. In this study, the Bispectral Index (BIS, end-tidal isoflurane, and hemodynamic parameters were examined to evaluate the depth of the routine general anesthetic technique in C/S. Methods: This study was carried out on 60 parturient patients undergoing elective C/S. A standardized anesthetic technique was applied: induction with Thiopental (4-5 mg/kg and Succinylcholine (1.5-2 mg/kg as well as maintenance with O2, N2O, and isoflurane. Electrocardiogram, heart rate, blood pressure, Spo2, end-tidal isoflurane concentration, BIS, and any clinical signs of inadequate depth of anesthesia such as movement, sweating, lacrimation, coughing, and jerking were continuously monitored and recorded at 16 fixed time points during anesthesia. Results: A median BIS of less than 70 (range: 42-68 was obtained on all occasions during surgery; however, at each milestone, at least 20% of the patients had BIS values above 60. Hemodynamic parameters increased significantly in some patients, especially during laryngoscopy and intubation. No patient experienced recall or awareness. Conclusion: The currently used general anesthetic technique in our center appears inadequate in some milestones to reliably produce BIS values less than 60, which are associated with lower risk of awareness. Therefore, with respect to such desirable outcomes as good Apgar and clinical status in neonates, we would recommend the application of this method (if confirmed by further studies through larger dosages of anesthetic agents.

  6. Bispectral index monitoring of a narcolepsy-cataplexy episode during regional anesthesia.

    Science.gov (United States)

    Dahaba, Ashraf A; Xu, Guo Xun; Liu, Qing Hai; Xue, Ji Xiu; Metzler, Helfried

    2009-02-01

    Narcolepsy or Gélineau syndrome is an extremely incapacitating chronic sleep disorder of unknown etiology that is characterized by uncontrollable attacks of deep sleep and is typically associated with cataplexy sudden loss of muscle tone. The Bispectral Index (BIS), an electroencephalographic-derived cerebral monitor, used for monitoring the effects of anesthetic/hypnotic drugs was shown to correlate to various conditions that could influence the eletroencephalogram. We assessed the utility of using BIS for monitoring a possible narcolepsy-cataplexy episode and whether a distinctive BIS profile might offer an early warning of an impending narcoleptic/cataplectic spell. We recorded both hemispheres, using two synchronized BIS-XP monitors, during a narcolepsy-cataplexy episode in a 57-yr-old male patient undergoing lower limb surgery under femoral nerve block regional anesthesia. The patient went through three stages: first a prodromal "intermittent low-vigilance" phase interrupted by high electromyographic activity. This was followed by a second "continuous low-vigilance" phase of BIS around 75 with low electromyographic activity, ending with a third "nonresponsive vigilance" phase of a full-blown narcolepsy-cataplexy episode of BIS around 45 with complete loss of muscle power. The purpose of presenting this report is to emphasize the fact that narcoleptic patients can still run the risk of loss of consciousness with atonia under regional anesthesia, and such an undesirable complication cannot be under-estimated. BIS monitoring is a simple method that could offer an early warning of an imminent episode, with its associated hazards, in patients with narcolepsy-cataplexy undergoing surgery under regional anesthesia.

  7. Can bispectral index or auditory evoked potential index predict implicit memory during propofol-induced sedation?

    Institute of Scientific and Technical Information of China (English)

    WANG Yun; YUE Yun; SUN Yong-hai; WU An-shi

    2006-01-01

    Background Some patients still suffer from implicit memory of intraoperative events under adequate depth of anaesthesia. The elimination of implicit memory should be a necessary aim of clinical general anaesthesia.However, implicit memory cannot be tested during anaesthesia yet. We propose bispectral index (BIS) and auditory evoked potential index (AEPI), as predictors of implicit memory during anaesthesia.Methods Thirty-six patients were equally divided into 3 groups according to the Observer's Assessment of Alertness/Sedation Score: A, level 3; B, level 2 ;and C, level 1. Every patient was given the first auditory stimulus before sedation. Then every patient received the second auditory stimulus after the target level of sedation had been reached. BIS and AEPI were monitored before and after the second auditory stimulus presentation. Four hours later, the inclusion test and exclusion test were performed on the ward using process dissociation procedure and the scores of implicit memory estimated.Results In groups A and B but not C, implicit memory estimates were statistically greater than zero (P<0.05).The implicit memory scores in group A did not differ significantly from those in group B (P>0.05). Implicit memory scores correlated with BIS and AEPI (P<0.01). The area under ROC curve is BIS> AEPI. The 95% cutoff points of BIS and AEPI for predicting implicit memory are 47 and 28, respectively.Conclusions Implicit memory does not disappear until the depth of sedation increases to level 1 of OAA/S score. Implicit memory scores correlate well with BIS and AEPI during sedation. BIS is a better index for predicting implicit memory than AEPI during propofol induced sedation.

  8. Bispectral index detects intraoperative cerebral ischaemia during balloon assisted cerebral aneurysm coiling [v2; ref status: indexed, http://f1000r.es/2xs

    Directory of Open Access Journals (Sweden)

    Zoe Harclerode

    2014-02-01

    Full Text Available Bispectral index (BIS is a monitoring modality designed and used for monitoring depth of anaesthesia. We wish to report a case where BIS monitoring may have alerted us to a potential adverse neurological event during angiographic coiling of a cerebral aneurysm.

  9. The Entropy Module and Bispectral Index as guidance for propofol-remifentanil anaesthesia in combination with regional anaesthesia compared with a standard clinical practice group.

    NARCIS (Netherlands)

    Ellerkmann, R.K.; Soehle, M.; Riese, G.; Zinserling, J.; Wirz, S.; Hoeft, A.; Bruhn, J.

    2010-01-01

    This study was designed to investigate the impact of the Entropy Module and Bispectral Index (BIS) monitoring on drug consumption and recovery times compared with standard anaesthetic practice in patients undergoing orthopaedic surgery using a combination of regional and general anaesthesia as perfo

  10. 脑电双频指数指导下调节七氟烷体积分数对患儿眼心反射抑制的影响%Effect of bispectral index-guided sevoflurane concentration change on oculocardiac reflex in pediatric patients

    Institute of Scientific and Technical Information of China (English)

    张忠; 刘凤梅; 周峰; 米志华; 黄鹤

    2011-01-01

    Objective To investigate whether bispectrial index (BlS)-guided sevoflurane concentration change can effectively suppress the oculocardiac reflex in pediatric patients receiving strabotomy. Methods Totally 52 congenital esotropia children were randomly divided into group A and B (each n = 26). All children were anesthetized with sevoflurane inhalation. The BIS was maintained at about 40 in group A and about 60 in group B. The following indicators, including pulse oxyhemoglobin saturation (SpO2). Blood pressure (BP), electrocardiogram and end-tidal pressure of carbon dioxide (petCO2), were monitored during the operation. The incidences of oculocardiac reflex and related sevoflurane concentration were recorded. Results All the other physical data were within normal range except for the heart rate. The incidence of oculocardiac reflex was 11.6% (3/26) in group A, which was significantly lower than that in group B (34. 9% [9/26], P<0.05). The mean sevoflurane concentration was 0. 021 ± 0. 003 in group A, which was significantly higher than that in group B (0.015±0.005, P<0.05). Conclusion Compared with the adjusted seveflurane concentration guided by BIS = 60±2, that guided by BIS = 40± 1 can reduce the incidence of oculocardiac reflex in congenital crosseye children receiving strabotomy. (Shanghai Med J, 2011, 34: 601-603)%目的 探讨脑电双频指数(BIS)指导下调节七氟烷体积分数能否有效抑制行斜视手术时患儿的眼心反射.方法 52例行手术治疗的先天性斜视患儿被随机分为A、B两组,分别维持BIS值为40(A组)和60(B组)左右,两组均采用吸入七氟烷行全身麻醉,术中监测脉搏血氧饱和度(SpO2)、血压(BP)、心电图(ECG)、呼吸末二氧化碳分压(pet CO2),记录眼心反射的发生率及呼气末七氟烷体积分数.结果 A组的眼心反射发生率为11.6%(3/26),显著低于B组的34.9%(9/26,P<0.05).A组的呼气末七氟烷体积分数为0.021±0.003,显著高于B组的0.015±0.005(P<0.05).结论 先天性斜视患儿行手术治疗,吸入七氟烷行全身麻醉时,BIS值维持于40±1时其眼心反射的发生率低于BIS值为60±2时.

  11. Effect of rocuronium on the bispectral index under anesthesia and tracheal intubation

    Science.gov (United States)

    Yue, Hui; Han, Jinyu; Liu, Ling; Wang, Kaiyuan; Li, Jincheng

    2016-01-01

    The aim of the present study was to investigate the effect of various doses of rocuronium on bispectral index (BIS) responses to propofol induction and tracheal intubation, as well as the role of the non-depolarization muscle relaxant rocuronium on the depth of sedation. A total of 72 patients (American Society of Anesthesiologists physical status I–II) were anaesthetized with propofol using a target-controlled infusion, and randomly divided into two sedation level groups (n=36). The patients were divided into 2 groups according to the BIS value: A normal sedation group (group 1), with a stable BIS value at 40–60, and a deep sedation group (group 2), with a BIS value <20 or with burst suppression. Each group was randomly divided into 4 subgroups A-D (n=9) according to the various doses of rocuronium (0.3, 0.6, 0.9 and 1.2 mg/kg). Tracheal intubation was performed after 2 min of rocuronium administration. BIS, electromyography (EMG), heart rate (HR) and mean arterial pressure (MAP) were recorded continuously and averaged over 1 min during baseline (T1), steady state (T2), 2 min after rocuronium infusion (T3), and 0, 2 and 5 min after tracheal intubation. The results demonstrated that HR and MAP decreased significantly at T2 and T3 compared with T1. Following tracheal intubation (L0), HR and MAP significantly increased compared with T2 and T3, and returned to levels similar to those prior to intubation after 5 min. In group 1C and 1D, BIS was significantly decreased at T3 compared with T2; BIS was significantly increased at L0 compared with T3 in group 1A and 1B. EMG at earlier stages of anesthesia was significantly higher compared with other points, and was significantly increased at L0 compared with T3 in group 1A and 1B. These results demonstrated that BIS response may be associated with the dosage of rocuronium in the normal sedation group, although no association was observed with the deep sedation group. Tracheal intubation resulted in marked hemodynamic

  12. Effects of Phenytoin Therapy on Bispectral Index and Haemodynamic Changes Following Induction and Tracheal Intubation

    Directory of Open Access Journals (Sweden)

    Parmod P Bithal

    2009-01-01

    Full Text Available Laryngoscopy and tracheal intubation (LTI increase blood pressure and heart rate (HR. Intensity of these changes is influenced by the anaesthetic depth assessed by the bispectral index (BIS. We determined the effect of phenytoin on anaesthetic depth and its influence on haemodynamics following LTI. Fifty patients of ASA grades I and II on oral phenytoin 200 to 300mg per day for more than one week were compared with 48 control patients. Standard anaesthesia technique was followed. BIS, non invasive mean blood pressure (MBP and HR were recorded 30, 60, 90 and 120 sec after LTI. Phenytoin group needed lesser thiopentone for induction, 5 mg (1.1 vs. 4.3 mg (0.7 [p=0.036]. BIS was significantly lower in the phenytoin group vs. the control 30, 60, 90 and 120 sec after LTI [43.1 (16.0 vs. 48.9 (14.9, p=0.068, 56.3 (16.7 vs. 64.3 (14.4, p=0.013, 59.8 (15.8 vs. 67.5 (12.1, p=0.008, 62.6 (14 vs. 68.9 (11.2, p=0.017, and 64.2 (11.3 vs. 69 (11.7, p=0.033], respectively. MBP was also lower in the phenytoin group 30, 60, 90 and 120 sec after LTI [112.8 mmHg (13.8, vs. 117.9 mmHg (18 p=0.013, 108.6 (12.8 vs. 117.5 (16 p=0.003, 106.1 mmHg (14.1 vs. 113.2 mmHg (14.9, p=0.017, 101.8 mmHg (13.8 vs. 109.5 mmHg (14.1, p=0.007], respectively. HR was lower in phenytoin group at 30 sec. (p=0.027, 60 sec (p=0.219, and again at 120 sec (p=0.022. Oral phenytoin therapy for over a week results in greater anaesthetic depth as observed using BIS, which also attenuated haemodynamic response of LTI.

  13. Perioperative use of bispectral (BIS) monitor for a pressure ulcer patient with locked-in syndrome (LIS).

    Science.gov (United States)

    Yoo, Christine; Ayello, Elizabeth A; Robins, Bryan; Salamanca, Victor R; Bloom, Marc J; Linton, Patrick; Brem, Harold; O'Neill, Daniel K

    2014-10-01

    The bispectral (BIS) monitor uses brain electroencephalographic data to measure the depth of sedation and pharmacological response during anaesthetic procedures. In this case, the BIS monitor was used for another purpose, to demonstrate postoperatively to the nursing staff that a patient with history of locked-in syndrome (LIS), who underwent pressure ulcer debridement, had periods of wakefulness and apparent sensation, even with his eyes closed. Furthermore, as patients with LIS can feel pain, despite being unable to move, local block or general anaesthesia should be provided for sharp surgical debridement and other painful procedures. This use of the BIS has shown that as a general rule, the staff should treat the patient as though he might be awake and sensate even if he does not open his eyes or move his limbs. The goal of this study was to continuously monitor pain level and communicate these findings to the entire wound team, i.e. anaesthesiologists, surgeons and nurses.

  14. Bispectral index monitoring as an adjunct to nurse-administered combined sedation during endoscopic retrograde cholangiopancreatography

    Institute of Scientific and Technical Information of China (English)

    Se Young Jang; Hyun Gu Park; Min Kyu Jung; Chang Min Cho; Soo Young Park; Seong Woo Jeon; Won Young Tak

    2012-01-01

    AIM:TO determine whether bispectral index (BIS)monitoring is useful for propofol administration for deep sedation during endoscopic retrograde cholangiopancreatography (ERCP).METHODS:Fifty-nine consecutive patients with a variety of reasons for ERCP who underwent the procedure at least twice between 1 July 2010 and 30 November 2010.This was a randomized cross-over study,in which each patient underwent ERCP twice,once with BIS monitoring and once with control monitoring.Whether BIS monitoring was done during the first or second ERCP procedure was random.Patients were intermittently administered a mixed regimen including midazolam,pethidine,and propofol by trained nurses.The nurse used a routine practice to monitor sedation using the Modified Observer's Assessment of Alertness/Sedation (MOAA/S) scale or the BIS monitoring.The total amount of midazolam and propofol used and serious side effects were compared between the BIS and control groups.RESULTS:The mean total propofol dose administered was 53.1 ± 32.2 mg in the BIS group and 54.9± 30.8 mg in the control group (P =0.673).The individual propofol dose received per minute during the ERCP procedure was 2.90 ± 1.83 mg/min in the BIS group and 3.44 ± 2.04 mg in the control group (P =0.103).The median value of the MOAA/S score during the maintenance phase of sedation was comparable for the two groups.The mean BIS values throughout the procedure (from insertion to removal of the endoscope) were 76.5 ± 8.7 for all 59 patients in using the BIS monitor.No significant differences in the frequency of < 80% oxygen saturation,hypotension (< 80 mmHg),or bradycardia (< 50 beats/min) were observed between the two study groups.Four cases of poor cooperation occurred,in which the procedure should be stopped to add the propofol dose.After adding the propofol,the procedure could be conducted successfully (one case in the BIS group,three cases in the control group).The endoscopist rated patient sedation as excellent for

  15. Comparative evaluation of bispectral index system after sedation with midazolam and propofol combined with remifentanil versus ketamine in uncooperative during dental procedures

    OpenAIRE

    Alireza Eshghi; Mehrnaz Mohammadpour; Nasser Kaviani; Dana Tahririan; Najmeh Akhlaghi

    2016-01-01

    Background: Proper analgesic agents should be used in combination with sedative agents. Remifentanil is a synthetic narcotic/analgesic agent with a short duration effect and decreases the risk of apnea during recovery. Bispectral index system (BIS) is a new noninvasive technique for the evaluation of the depth of sedation. The aim of present clinical trial was to evaluate and compare the efficacy of intravenous sedation with propofol/midazolam/remifentanil (PMR) in comparison to propofol/mida...

  16. Comparison of recovery profiles of propofol AND sevoflurane anesthesia with bispectral index monitoring (BIS in general anesthesia

    Directory of Open Access Journals (Sweden)

    Mukesh Somvanshi

    2015-03-01

    Method: Fifty ASA physical status I-II patients of either sex, aged between 18 and 60 years were randomly divided into two groups to receive either propofol infusion (group P, n=25 or sevoflurane (group S, n=25. Cardiovascular parameters, SpO2 and bispectral index (BIS scores were recorded. Time to eye opening, hand squeezing and achieve modified Aldrete's Score and #8805; 9 and the incidence of complications were noted. Results: Early recovery times [eye opening, hand squeezing and achieve modified Aldrete's Score and #8805; 9] were significantly longer in group P (P 0.05. The incidence of post-operative nausea and vomiting was significantly higher in group S. Conclusions: The present study which adjusted propofol infusion rate and sevoflurane concentration according to BIS scores revealed that maintenance of anesthesia with sevoflurane is associated with faster recovery than anesthesia with propofol. Propofol resulted in a significantly lower incidence of postoperative nausea and vomiting. [Natl J Med Res 2015; 5(1.000: 52-56

  17. Relative reliability of the auditory evoked potential and Bispectral Index for monitoring sedation level in surgical intensive care patients.

    Science.gov (United States)

    Lu, C-H; Ou-Yang, H-Y; Man, K-M; Hsiao, P-C; Ho, S-T; Wong, C-S; Liaw, W-J

    2008-07-01

    Sedation is an important adjunct therapy for patients in the intensive care unit. The objective of the present study was to observe correlation between an established subjective measure, the Ramsay Sedation Scale, and two objective tools for monitoring critically ill patients: the Bispectral Index (BIS) and auditory evoked potential. Ninety patients undergoing major surgery scheduled for postoperative mechanical ventilation and continuous sedation with propofol and fentanyl were selected. Electrodes for determining BIS and auditory evoked potential were placed on the foreheads of all patients according to manufacturer's specifications at least six hours after patients' arrival at the intensive care unit. Ramsay Sedation Scale, BIS, signal quality index, composite A-line autoregressive index (AAI) and electromyographic activities were recorded every five minutes for 30 minutes. BIS and AAI showed good correlation amongst readings (r(s)=0.697, P Ramsay Sedation Scale (BIS, tau=-0.689; AAI, tau=-0.621; P Ramsay Sedation Scale. However, the BIS and auditory evoked potential monitors do not perform adequately as a substitute in the assessment of sedated intensive care unit patients. These monitors could be used as part of an integrated approach for the evaluation of those patients especially when the subjective scales do not work well in the setting of neuromuscular blockade or may not be sufficiently sensitive to evaluate very deep sedation.

  18. [The influence of intermittent hemodialysis (HD) on bispectral index (scale) (BIS) and serum propofol concentration under postoperative intravenous sedation].

    Science.gov (United States)

    Tatebayashi, Shigeru; Imai, Yuichiro; Ohgi, Kazuhiko; Tamaki, Shigehiro; Yamamoto, Kazuhiko; Takahashi, Masahiro; Kurehara, Koukichi; Furuya, Hitoshi; Kirita, Tadaaki

    2004-05-01

    We experienced a case of postoperative intravenous sedation with propofol during intermittent hemodialysis (HD), and investigated the correlation between the clinical sedation level based on bispectral index scale (BIS) together with Ramsay score, and the serum concentration of propofol. One adult oral cancer patient (carcinoma of the lower gingiva) with end-stage renal dysfunction needing HD was selected for this study. The day after operation, HD was commenced under intravenous sedation with propofol. Clinical sedation level was assessed using BIS and Ramsay score, and serum propofol concentrations were determined in arterial blood samples. Serum concentrations were measured every 15 times until 51 hours after operation. The initial dose of propofol was set at 3.5 mg x kg(-1) x h(-1) on the basis of clinical symptoms. According to BIS and Ramsay score, sedation level decreased lineally for 1 hour after commencement of HD. In contrast, serum propofol concentration incresed from 1.71 microg x ml(-1) to 2.21 microg x ml(-1). Total serum concentration of propofol was enhanced during HD because of dialytic dehydration, but, according to BIS and Ramsay scores, the possibility was suggested that the fraction of albmin-unbound propofol with pharmacological activities was eliminated or absorbed by membrane during HD.

  19. Awareness of bispectral index monitoring system among the critical care nursing personnel in a tertiary care hospital of India

    Directory of Open Access Journals (Sweden)

    Shikha Thakur

    2011-01-01

    Full Text Available Background: Bispectral index monitoring system (BIS is one of the several systems used to measure the effects of anaesthetic and sedative drugs on the brain and to track changes in the patient′s level of sedation and hypnosis. BIS monitoring provides information clinically relevant to the adjustment of dosages of sedating medication. It can help the nursing personnel in preventing under- and over sedation among intensive care unit (ICU patients. Objective: The present study was conducted to assess the knowledge of nursing personnel working in the ICU regarding BIS. Methods: Fifty-four subjects participated in the study. A structured questionnaire was developed to assess the knowledge of the nursing personnel regarding BIS. Focus group discussions were held among the nursing personnel to know their views regarding BIS. Results: Mean age (years of the subjects was 30.7΁7.19 (21-47 years, with a female preponderance. Although the use of BIS in ICU is not common, majority (94.44% were aware of BIS and its purpose. 79.62% of the subjects knew about its implication in patient care. The mean knowledge score of the subjects was 11.87΁2.43 (maximum score being 15. Conclusion: There exists an awareness among the critical care nursing staff in our institution regarding BIS and its clinical implications. Its use in the critical care setting may benefit the patients in terms of providing optimal sedation.

  20. Comparative study among acepromazine, chlorpromazine and methotrimeprazine in different doses, through bispectral index, term and pressure algimetry, in dogs / Estudo comparativo entre a acepromazina, clorpromazina e levomepromazina em diferentes doses, através do exame bispectral, termo e pressoalgimetria, em cães

    Directory of Open Access Journals (Sweden)

    Lidia Mitsuko Matsubara

    2009-12-01

    Full Text Available The study’s objective was to realize comparisons among different acepromazine, chlorpromazine and methotrimeprazine doses, evaluate parametric changes, test analgesia using press and term algimetry, and evaluate bispectral condition. 90 mongrel dogs were used, male and female, adult, weighting 10 to 15 Kg as a rule, distributed in 9 groups with 10 animals each. At first, second and third groups acepromazine was used at 0,1; 0,05 e 0,025 mg/Kg, respectively. At forth, fifth and sixth groups, chlorpromazine was used at 1,0; 0,5 and 0,25 mg/Kg, respectively. At seventh, eighth and ninth groups, methotrimeprazine at 1,0; 0,5 and 0,25 mg/Kg was used, respectively. All drugs were administered intravenously. Objects of study: heart rate (HR, non invasive blood pressure (SAP, MAP, DAP, respiratory rate (f, capnography (ETCO2, pulse oxymetry (SatO2, mouth and rectal temperature, bispectral index (BIS, electromyography (EMG%, press and term algimetry. Somatic analgesia was evaluated by animal’s response to nociceptives stimulus. We concluded that chlorpromazine had more hypotension. Dogs showed higher hypnosis level at chlorpromazine group, with evident myorelaxation. All groups showed analgesia to thermic and mechanic stimulus. Acepromazine group showed high duration to both pain stimuli. Bispectral index was shorten at chlorpromazine group at 1,0 mg/kg doses, showing higher hypnosis index, and acepromazine was the less depressing considering the bispectral index.Objetivou-se comparar, em diferentes doses, a acepromazina, a clorpromazina e a levomepromazina com relação às alterações paramétricas, à analgesia avaliada através da presso e termoalgimetria e a condição bispectral em 90 cães sem raça definida alocados em nove grupos. No primeiro, segundo e terceiro grupo foi empregada a acepromazina nas doses de 0,1; 0,05 e 0,025 mg/kg, respectivamente. No quarto, quinto e sexto grupo foi empregada a clorpromazina nas doses de 1,0; 0,5 e 0

  1. [EEG bispectral index as an indicator of the electrical activity of the central nervous system in children during anesthetic maintenance and intensive care].

    Science.gov (United States)

    Lazarev, V V; Subbotin, V V

    2009-01-01

    The paper presents different investigators' data on the use of the bispectral (BIS) index in children during anesthetic maintenance and intensive care. The most of publications deal with the use of the BIS index during anesthesia with sevoflurane, which shows its high efficiency in estimating the depth of sleep. There are positive aspects in the use of the BIS index in the evaluation of sedative tolerance and central nervous system function, when brain death is diagnosed, cerebral oxygenation adequateness, etc. Data are given on the ambiguity of BIS index values in infants less than a year of age.

  2. Bispectral pairwise interacting source analysis for identifying systems of cross-frequency interacting brain sources from electroencephalographic or magnetoencephalographic signals

    Science.gov (United States)

    Chella, Federico; Pizzella, Vittorio; Zappasodi, Filippo; Nolte, Guido; Marzetti, Laura

    2016-05-01

    Brain cognitive functions arise through the coordinated activity of several brain regions, which actually form complex dynamical systems operating at multiple frequencies. These systems often consist of interacting subsystems, whose characterization is of importance for a complete understanding of the brain interaction processes. To address this issue, we present a technique, namely the bispectral pairwise interacting source analysis (biPISA), for analyzing systems of cross-frequency interacting brain sources when multichannel electroencephalographic (EEG) or magnetoencephalographic (MEG) data are available. Specifically, the biPISA makes it possible to identify one or many subsystems of cross-frequency interacting sources by decomposing the antisymmetric components of the cross-bispectra between EEG or MEG signals, based on the assumption that interactions are pairwise. Thanks to the properties of the antisymmetric components of the cross-bispectra, biPISA is also robust to spurious interactions arising from mixing artifacts, i.e., volume conduction or field spread, which always affect EEG or MEG functional connectivity estimates. This method is an extension of the pairwise interacting source analysis (PISA), which was originally introduced for investigating interactions at the same frequency, to the study of cross-frequency interactions. The effectiveness of this approach is demonstrated in simulations for up to three interacting source pairs and for real MEG recordings of spontaneous brain activity. Simulations show that the performances of biPISA in estimating the phase difference between the interacting sources are affected by the increasing level of noise rather than by the number of the interacting subsystems. The analysis of real MEG data reveals an interaction between two pairs of sources of central mu and beta rhythms, localizing in the proximity of the left and right central sulci.

  3. Comparison of the ability of wavelet index and bispectral index for reflecting regain of consciousness in patients undergone surgery

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiao-tong; CHENG Hao; XIONG Wei; WANG Bao-guo

    2010-01-01

    Background Wavelet index (WLI) is a new parameter for monitoring depth of anesthesia based on Wavelet analysis.We observed the change of WLI and bispectral index (BIS) in patients regain of consciousness (ROC) in the absence of frontalis electromyographic (EMG) interference. The aim of this study was to compare the ability of WLI and BIS for reflecting ROC in patients undergone surgery.Methods Twelve patients who were scheduled for maxillofacial surgeries were enrolled in the study. BIS and WLI values were monitored continually. After being given midazolam and remifentanil, patients were asked to squeeze the investigator's hand ever 30 seconds. Patients were continuously given propofol until loss of consciousness (LOC1).Tunstall's isolated forearm technique was used to test the surgical consciousness in patients. After total muscle relaxation,endotracheal intubations were performed, and the patients were connected to a ventilator. Then, propofol was withdrawn until the patients showed regain of consciousness (ROC1) and an awareness reaction. After the command test, patients were readministered with propofol until loss of consciousness (LOC2). After surgery, all of the sedatives were withdrawn,and the patients were let to regain consciousness (ROC2).Results The BIS values of twelve patients at ROC1 after using muscle relaxant were much lower than those at LOC1 and ROC2 without using muscle relaxant, showing statistical significance (P <0.05). Meanwhile, the WLI values of twelve patients at ROC1 after using muscle relaxant were much higher than those at LOC1 and equal to ROC2 without using muscle relaxant, showing statistical significances (P <0.05) between ROC1 and LOC1.Conclusions This study showed that under muscle relaxation or facial paralysis, when there is no EMG signal, BIS can not accurately reflect regain of consciousness in surgical patients, but WLI can reflect it accurately. So WLI may have advantages for reflecting state of consciousness in surgical

  4. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  5. Evaluation of entropy for monitoring the depth of anesthesia compared with bispectral index: a multicenter clinical trial

    Institute of Scientific and Technical Information of China (English)

    GAO Jian-dong; DING Qian; TAN Zhi-ming; ZHU Zhi-rong; YUE Yun; ZHAO Yu-jie; XU Chen-shi; ZHAO Jing; HUANG Yu-guang; WANG Tian-long; PEI Ling; WANG Jian; YAO Li-nong

    2012-01-01

    Background As a new electroencephalogram (EEG) signal processing technique for monitoring the depth of anesthesia,entropy consists of two indices:reaction entropy (RE) and state entropy (SE).Our study compared entropy with classical bispectral index (BIS) in reduction of myoelectrical interference and noxious stimuli with EEG signals.Methods Two hundred and eighty patients (ASA Ⅰ-Ⅱ,18-60 years old) undergoing scheduled surgeries from seven medical centers were enrolled.Anesthesia induction was managed with propofol via the target-controlled infusion (TCI)system.The results of BIS,RE,SE,mean arterial pressure (MAP) and heart rate (HR) were recorded before anesthesia induction,at the moment of unconsciousness,before and 2 minutes after administration of muscle relaxant,and before and one and three minutes after the tracheal intubation.Results The values of half maximum effective concentrations (EC50),5% effective concentrations (EC05) and 95% effective concentrations (EC95) of propofol effect-site concentration at the onset of unconsciousness were 1.2 (1.1-1.3μg/ml),2.5 (2.4-2.5 μg/ml) and 3.7 (3.7-3.8 μg/ml),while those of the predicted plasma propofol concentration were 2.8 (2.7-2.9 μg/ml),3.9 (3.8-3:9 μg/ml) and 4.9 (4.8-5.0 μg/ml),respectively.The values of BIS,SE and RE were 62,59 and 63 when 50% of patients lost consciousness,and 79,80,85 and 42,37,44,respectively,when 5% and 95% of patients were unconscious.The values of BIS,RE and SE dropped two minutes after the injection of muscle relaxant,but there were no significant differences between RE and SE.MAP and HR increased visibly,which indicated a reaction to tracheal intubation; the values of BIS,RE and SE,however,did not display any significant changes.Conclusions This large-sample multicentric study confirmed the values of RE and SE as approximating BIS value,at the onset of unconsciousness during propofol TCI anesthesia.After elimination of myoelectrical activation,all values of RE

  6. Observation of anesthesia depth in severe burn patients with target controlled infusion of propofol and remifentanil by bispectral index

    Directory of Open Access Journals (Sweden)

    Zheng-gang GUO

    2012-04-01

    Full Text Available Objective To evaluate the feasibility and efficiency of bispectral index (BIS for monitoring the anesthesia depth of severe burn patients with target controlled infusion (TCI of propofol and remifentanil. Methods A total of 80 severe burns patients undergoing eschar excision ( < 1week were randomly divided into BIS group (group A and control group (group B, with 40 cases assigned in each group. These patients were 18 years to 65 years old, ASAⅡ-Ⅲ. Their total burn surface areas (TBSA were from 31% to 50%, or 11% to 20% with three-degree burns. All patients received remifentanil and propofol for TCI intravenous anesthesia. The mean arterial pressure (MAP and heart rate (HR were determined at following time points, namely, entrance to the operation room, loss of consciousness, 2min after intubation, before surgery, 2, 15, and 30min after the start of surgery, end of surgery, eye opening, and period when Aldrete score reaching 9 points, as well as the target concentrations of remifentanil and propofol. The time frames from stoppage of drug infusion to eye opening and the period when Aldrete score reaching 9 points were also recorded. Results Compared with group B, the target concentrations of remifentanil (2.12±0.35ng/ml vs. 2.50±0.21ng/ml and propofol (2.54±0.22μg/ml vs. 2.86±0.31μg/ml were significantly lower in group A during anesthetic maintenance (P < 0.01. The time interval from stoppage of drug infusion to eye opening (7.90±0.58min vs. 8.35±0.66min and period when Aldrete score reaching 9 points (9.15±0.69min vs. 11.13±0.96min were significantly reduced in group A. The MAP of both groups from loss of consciousness at all time points, except 2min after intubation, was significantly lower than the basic values upon entrance into the operation room (P < 0.05. The HR at all time points were significantly lower compared with the basic data (P < 0.05. Conclusion BIS for monitoring the anesthetic depth of severe burns patients

  7. Comparative study of Poincaré plot analysis using short electroencephalogram signals during anaesthesia with spectral edge frequency 95 and bispectral index.

    Science.gov (United States)

    Hayashi, K; Yamada, T; Sawa, T

    2015-03-01

    The return or Poincaré plot is a non-linear analytical approach in a two-dimensional plane, where a timed signal is plotted against itself after a time delay. Its scatter pattern reflects the randomness and variability in the signals. Quantification of a Poincaré plot of the electroencephalogram has potential to determine anaesthesia depth. We quantified the degree of dispersion (i.e. standard deviation, SD) along the diagonal line of the electroencephalogram-Poincaré plot (named as SD1/SD2), and compared SD1/SD2 values with spectral edge frequency 95 (SEF95) and bispectral index values. The regression analysis showed a tight linear regression equation with a coefficient of determination (R(2) ) value of 0.904 (p plot tightly correlates with SEF95, reflecting anaesthesia-dependent changes in electroencephalogram oscillation.

  8. The Use of the Bispectral Index in the Detection of Pain in Mechanically Ventilated Adults in the Intensive Care Unit: A Review of the Literature

    Directory of Open Access Journals (Sweden)

    Robin Marie Coleman

    2015-01-01

    Full Text Available BACKGROUND: Pain assessment is an immense challenge for clinicians, especially in the context of the intensive care unit, where the patient is often unable to communicate verbally. Several methods of pain assessment have been proposed to assess pain in this environment. These include both behavioural observation scales and evaluation of physiological measurements such as heart rate and blood pressure. Although numerous validation studies pertaining to behavioural observation scales have been published, several limitations associated with using these measures for pain assessment remain. Over the past few years, researchers have been interested in the use of the bispectral index monitoring system as a proxy for the evaluation of encephalography readings to assess the level of anesthesia and, potentially, analgesia.

  9. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  10. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  11. Topological Design of Protocols

    CERN Document Server

    Jaffe, Arthur; Wozniakowski, Alex

    2016-01-01

    We give a topological simulation for tensor networks that we call the two-string model. In this approach we give a new way to design protocols, and we discover a new multipartite quantum communication protocol. We introduce the notion of topologically compressed transformations. Our new protocol can implement multiple, non-local compressed transformations among multi-parties using one multipartite resource state.

  12. Multiparty Quantum Cryptographic Protocol

    Institute of Scientific and Technical Information of China (English)

    M. Ramzan; M. K. Khan

    2008-01-01

    We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept-resend attacks. Furthermore, it is efficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the effciency of the protocol.

  13. BiSpectral Index (BIS monitoring may detect critical hypotension before automated non-invasive blood pressure (NIBP measurement during general anaesthesia; a case report. [v1; ref status: indexed, http://f1000r.es/2oi

    Directory of Open Access Journals (Sweden)

    Matthew M. J. Smith

    2014-01-01

    Full Text Available A patient undergoing general anaesthesia for neurosurgery exhibited an unexpected sudden decrease in the BiSpectral Index (BIS value to near-zero. This prompted the detection of profound hypotension using non-invasive blood pressure (NIBP measurement and expedited urgent assessment and treatment, with the patient making a full recovery. Widely regarded as a ‘depth of anaesthesia’ monitor, this case demonstrates the potential extra clinical benefit BIS may have in the detection of critical incidents such as anaphylaxis during general anaesthesia.

  14. Bispectral index score and observer′s assessment of awareness/sedation score may manifest divergence during onset of sedation: Study with midazolam and propofol

    Directory of Open Access Journals (Sweden)

    Dipanjan Bagchi

    2013-01-01

    Full Text Available Background: Correlation between the clinical and electroencephalogram-based monitoring has been documented sporadically during the onset of sedation. Propofol and midazolam have been studied individually using the observer′s assessment of awareness/sedation (OAA/S score and Bispectral index score (BIS. The present study was designed to compare the time to onset of sedation for propofol and midazolam using both BIS and OAA/S scores, and to find out any correlation. Methods: A total of 46 patients (18-60 years, either sex, American Society of Anesthesiologists (ASA I/II posted for infraumbilical surgeries under spinal anaesthesia were randomly allocated to receive either injection propofol 1 mg/kg bolus followed by infusion 3 mg/kg/h (Group P, n=23 or injection midazolam 0.05 mg/kg bolus followed by infusion 0.06 mg/kg/h (Group M, n=23. Spinal anaesthesia was given with 2.5 ml to 3.0 ml of 0.5% bupivacaine heavy. When sensory block reached T6 level, sedation was initiated. The time to reach BIS score 70 and time to achieve OAA/S score 3 from the start of study drug were noted. OAA/S score at BIS score 70 was noted. Data from 43 patients were analyzed using SPSS 12 for Windows. Results: Time to reach BIS score 70 using propofol was significantly lower than using the midazolam (P<0.05. Time to achieve OAA/S score 3 using propofol was comparable with midazolam (P=0.358. Conclusion: A divergence exists between the time to reach BIS score 70 and time to achieve OAA/S score 3 using midazolam, compared with propofol, during the onset of sedation.

  15. Comparison of 1.5% lidocaine and 0.5% ropivacaine epidural anesthesia combined with propofol general anesthesia guided by bispectral index

    Institute of Scientific and Technical Information of China (English)

    XIANG Yan; LI Yu-hong

    2007-01-01

    Objective:To compare the effects of epidural anesthesia with 1.5% lidocaine and 0.5% ropivacaine on propofol requirements,the time to loss of consciousness (LOC),effect-site propofol concentrations,and the hemodynamic variables during induction of general anesthesia guided by bispectral index (BIS) were studied.Methods:Forty-five patients were divided into three groups to receive epidurally administered saline (Group S),1.5% (w/w) lidocaine (Group L),or 0.5% (w/w) ropivacaine (Group R).Propofol infusion was started to produce blood concentration of 4 μg/ml.Once the BIS value reached 40~50,endotracheal intubation was facilitated by 0.1 mg/kg vecuronium.Measurements included the time to LOC,effect-site propofol concentrations,total propofol dose,mean arterial blood pressure (MABP),and heart rate (HR) at different study time points.Results:During induction of anesthesia,both Groups L and R were similar for the time to LOC,effect-site propofol concentrations,total propofol dose,MABP,HR,and BIS.The total doses of propofol administered until 1 min post-intubation were significantly less in patients of Groups R and L compared with Group S.MABP and HR were significantly lower following propofol induction compared with baseline values in the three groups,or MABP was significantly increased following intubation as compared with that prior to intubation in Group S but not in Groups R and L while HR was significantly increased following intubation in the three groups.Conclusion:Epidural anesthesia with 1.5% lidocaine and 0.5% ropivacaine has similar effects on the time to LOC,effect-site propofol concentrations,total propofol dose,and the hemodynamic variables during induction of general anesthesia.

  16. The effect of different doses of esmolol on hemodynamic, bispectral index and movement response during orotracheal intubation: prospective, randomized, double-blind study

    Directory of Open Access Journals (Sweden)

    Mensure Yılmaz Çakırgöz

    2014-12-01

    Full Text Available Objective: A prospective, randomized and double-blind study was planned to identify the optimum dose of esmolol infusion to suppress the increase in bispectral index values and the movement and hemodynamic responses to tracheal intubation. Materials and methods: One hundred and twenty patients were randomly allocated to one of three groups in a double-blind fashion. 2.5 mg kg-1 propofol was administered for anesthesia induction. After loss of consciousness, and before administration of 0.6 mg kg-1 rocuronium, a tourniquet was applied to one arm and inflated to 50 mm Hg greater than systolic pressure. The patients were divided into 3 groups; 1 mg kg-1 h-1 esmolol was given as the loading dose and in Group Es50 50 μg kg-1 min-1, in Group Es150 150 μg kg-1 min-1, and in Group Es250 250 μg kg-1 min-1 esmolol infusion was started. Five minutes after the esmolol has been begun, the trachea was intubated; gross movement within the first minute after orotracheal intubation was recorded. Results: Incidence of movement response and the ΔBIS max values were comparable in Group Es250 and Group Es150, but these values were significantly higher in Group Es50 than in the other two groups. In all three groups in the 1st minute after tracheal intubation heart rate and mean arterial pressure were significantly higher compared to values from before intubation (p < 0.05. In the study period there was no significant difference between the groups in terms of heart rate and mean arterial pressure. Conclusion: In clinical practise we believe that after 1 mg kg-1 loading dose, 150 μg kg-1 min-1 iv esmolol dose is sufficient to suppress responses to tracheal intubation without increasing side effects.

  17. Transport Protocol Throughput Fairness

    Directory of Open Access Journals (Sweden)

    Saleem Bhatti

    2009-11-01

    Full Text Available Interest continues to grow in alternative transport protocols to the Transmission Control Protocol (TCP. These alternatives include protocols designed to give greater efficiency in high-speed, high-delay environments (so-called high-speed TCP variants, and protocols that provide congestion control without reliability. For the former category, along with the deployed base of ‘vanilla’ TCP – TCP NewReno – the TCP variants BIC and CUBIC are widely used within Linux: for the latter category, the Datagram Congestion Control Protocol (DCCP is currently on the IETF Standards Track. It is clear that future traffic patterns will consist of a mix of flows from these protocols (and others. So, it is important for users and network operators to be aware of the impact that these protocols may have on users. We show the measurement of fairness in throughput performance of DCCP Congestion Control ID 2 (CCID2 relative to TCP NewReno, and variants Binary Increase Congestion control (BIC, CUBIC and Compound, all in “out-of-the box” configurations. We use a testbed and endto- end measurements to assess overall throughput, and also to assess fairness – how well these protocols might respond to each other when operating over the same end-to-end network path. We find that, in our testbed, DCCP CCID2 shows good fairness with NewReno, while BIC, CUBIC and Compound show unfairness above round-trip times of 25ms.

  18. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  19. Hemodynamics and bispectral index (BIS of dogs anesthetized with midazolam and ketamine associated with medetomidine or dexmedetomidine and submitted to ovariohysterectomy Avaliação hemodinâmica e do índice bispectral (BIS de cadelas anestesiadas com midazolam e cetamina associados à medetomidina ou dexmedetomidina e submetidas a ovário-salpingo-histerectomia

    Directory of Open Access Journals (Sweden)

    Fernando do Carmo Silva

    2010-04-01

    Full Text Available PURPOSE: To evaluate hemodynamics and bispectral index (BIS in bitches anesthetized with ketamine and midazolam in combination with dexmedetomidine or medetomidine and submitted to ovariohysterectomy. METHODS: Twenty bitches pretreated with levomedetomidine and buprenorphine were anesthetized with 5 mg.kg-1 ketamine and 0.2 mg.kg-1 midazolam i.v. Continuous infusion of 0.4 mg.kg-1.h-1 midazolam and 20 mg.kg-1.h-1 ketamine was initiated in combination with DEX (n=10: 20 µg.kg-1.h-1 dexmedetomidine or MED (n=10: 30 µg.kg-1.h-1 medetomidine over 30 minutes. A pharmacokinetic study provided dexmedetomidine plasma concentration, set to be 3.0 ng.mL-1. RESULTS: BIS decreased in both groups (P0.05, but heart rate decreased in both groups, as compared to control values (POBJETIVO: Verificar o comportamento hemodinâmico e o índice bispectral de cadelas anestesiadas com cetamina e midazolam associados à dexmedetomidina ou medetomidina. MÉTODOS: Vinte cadelas receberam pré-tratamento com levomepromazina e buprenorfina e foram anestesiadas com cetamina, 5 mg.kg-1 i.v., e midazolam, 0,2 mg.kg-1 i.v., seguidos da administração contínua de midazolam, 0,4 mg.kg-1.h-1, e cetamina, 20 mg.kg-1.h-1, associados, conforme o grupo, à: DEX (n=10: dexmedetomidina 20 µg.kg-1.h-1 ou MED (n=10: medetomidina 30 µg.kg-1.h-1, mantidos por 30 minutos. A dose de dexmedetomidina foi obtida por meio de estudo farmacocinético planejando-se concentração plasmática de 3,0 ng.mL-1. RESULTADOS: Os valores do BIS diminuíram em ambos os grupos (P0,05, sem a presença de efeitos adversos. CONCLUSÃO: A administração contínua de dexmedetomidina em concentração plasmática calculada de 3 ng.mL-1, em combinação com midazolam e cetamina, resulta em plano anestésico adequado para castração de cadelas, estabilidade hemodinâmica e despertar tranquilo, sem efeitos adversos.

  20. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  1. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  2. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  3. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise......Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification...... implementations that closely correspond to their legal specification, thereby increasing trust....

  4. A Framework for Quantifying the Impacts of Sub-Pixel Reflectance Variance and Covariance on Cloud Optical Thickness and Effective Radius Retrievals Based on the Bi-Spectral Method.

    Science.gov (United States)

    Zhang, Z; Werner, F.; Cho, H. -M.; Wind, Galina; Platnick, S.; Ackerman, A. S.; Di Girolamo, L.; Marshak, A.; Meyer, Kerry

    2017-01-01

    The so-called bi-spectral method retrieves cloud optical thickness (t) and cloud droplet effective radius (re) simultaneously from a pair of cloud reflectance observations, one in a visible or near infrared (VIS/NIR) band and the other in a shortwave-infrared (SWIR) band. A cloudy pixel is usually assumed to be horizontally homogeneous in the retrieval. Ignoring sub-pixel variations of cloud reflectances can lead to a significant bias in the retrieved t and re. In this study, we use the Taylor expansion of a two-variable function to understand and quantify the impacts of sub-pixel variances of VIS/NIR and SWIR cloud reflectances and their covariance on the t and re retrievals. This framework takes into account the fact that the retrievals are determined by both VIS/NIR and SWIR band observations in a mutually dependent way. In comparison with previous studies, it provides a more comprehensive understanding of how sub-pixel cloud reflectance variations impact the t and re retrievals based on the bi-spectral method. In particular, our framework provides a mathematical explanation of how the sub-pixel variation in VIS/NIR band influences the re retrieval and why it can sometimes outweigh the influence of variations in the SWIR band and dominate the error in re retrievals, leading to a potential contribution of positive bias to the re retrieval.

  5. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  6. Quantum deniable authentication protocol

    Science.gov (United States)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  7. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  8. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  9. Changes in the Bispectral Index in Response to Loss of Consciousness and No Somatic Movement to Nociceptive Stimuli in Elderly Patients

    Institute of Scientific and Technical Information of China (English)

    Ning Yang; Yun Yue; Jonathan Z Pan; Ming-Zhang Zuo; Yu Shi; Shu-Zhen Zhou; Wen-Ping Peng

    2016-01-01

    Background: Bispectral index (BIS) is considered very useful to guide anesthesia care in elderly patients, but its use is controversial for the evaluation of the adequacy of analgesia.This study compared the BIS changes in response to loss of consciousness (LOC) and loss of somatic response (LOS) to nociceptive stimuli between elderly and young patients receiving intravenous target-controlled infusion (TCI) of propofol and remifentanil.Methods: This study was performed on 52 elderly patients (aged 65-78 years) and 52 young patients (aged 25-58 years), American Society of Anesthesiologists physical status Ⅰ or Ⅱ.Anesthesia was induced with propofol administered by TCI.A standardized noxious electrical stimulus (transcutaneous electrical nerve stimulation, [TENS]) was applied (50 Hz, 80 mA, 0.25 ms pulses for 4 s) to the ulnar nerve at increasing remifentanil predicted effective-site concentration (Ce) until patients lost somatic response to TENS.Changes in awake, prestimulus, poststimulus BIS, heart rate, mean arterial pressure, pulse oxygen saturation, predicted plasma concentration, Ce of propofol, and remifentanil at both LOC and LOS clinical points were investigated.Results: BISLOC in elderly group was higher than that in young patient group (65.4 ± 9.7 vs.57.6 ± 12.3) (t =21.58, P < 0.0001) after TCI propofol, and the propofol Ce at LOC was 1.6 ± 0.3 μg/ml in elderly patients, which was significantly lower than that in young patients (2.3 ± 0.5 μg/ml) (t =7.474, P < 0.0001).As nociceptive stimulation induced BIS to increase, the mean of BIS maximum values after TENS was significantly higher than that before TENS in both age groups (t =8.902 and t =8.019, P < 0.0001).With increasing Ce of remifentanil until patients lost somatic response to TENS, BISLOS was the same as the BISLOC in elderly patients (65.6 ± 10.7 vs.65.4 ± 9.7), and there were no marked differences between elderly and young patient groups in BISawake, BISLOS, and Ce of

  10. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  11. Blind Cognitive MAC Protocols

    CERN Document Server

    Mehanna, Omar; Gamal, Hesham El

    2008-01-01

    We consider the design of cognitive Medium Access Control (MAC) protocols enabling an unlicensed (secondary) transmitter-receiver pair to communicate over the idle periods of a set of licensed channels, i.e., the primary network. The objective is to maximize data throughput while maintaining the synchronization between secondary users and avoiding interference with licensed (primary) users. No statistical information about the primary traffic is assumed to be available a-priori to the secondary user. We investigate two distinct sensing scenarios. In the first, the secondary transmitter is capable of sensing all the primary channels, whereas it senses one channel only in the second scenario. In both cases, we propose MAC protocols that efficiently learn the statistics of the primary traffic online. Our simulation results demonstrate that the proposed blind protocols asymptotically achieve the throughput obtained when prior knowledge of primary traffic statistics is available.

  12. Cytoskeleton - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Cytoskeleton - Methods and ProtocolsSecond edition, 2010; Ray H. Gavin (Ed; Springer Protocols methods in molecular biology, vol. 586 Humana press, Totowa, New Jersey (USA; Pages: 390; €95.44; ISBN: 978-1-60761-375-6Ray H. Gavin, from the Brooklyn College of The City University of New York, Brooklyn, NY, USA, wrote a few line as preface of this book. This is quite understandable: there is not a great need of words when there are facts that sustain and favour the dissemination of a cultural product. This is the case of the second edition of Cytoskeleton - Methods and Protocols, which appears just ten years after the first edition...

  13. A Framework Based on 2-D Taylor Expansion for Quantifying the Impacts of Subpixel Reflectance Variance and Covariance on Cloud Optical Thickness and Effective Radius Retrievals Based on the Bispectral Method

    Science.gov (United States)

    Zhang, Z.; Werner, F.; Cho, H.-M.; Wind, G.; Platnick, S.; Ackerman, A. S.; Di Girolamo, L.; Marshak, A.; Meyer, K.

    2016-01-01

    The bispectral method retrieves cloud optical thickness (t) and cloud droplet effective radius (re) simultaneously from a pair of cloud reflectance observations, one in a visible or near-infrared (VIS/NIR) band and the other in a shortwave infrared (SWIR) band. A cloudy pixel is usually assumed to be horizontally homogeneous in the retrieval. Ignoring subpixel variations of cloud reflectances can lead to a significant bias in the retrieved t and re. In the literature, the retrievals of t and re are often assumed to be independent and considered separately when investigating the impact of subpixel cloud reflectance variations on the bispectral method. As a result, the impact on t is contributed only by the subpixel variation of VIS/NIR band reflectance and the impact on re only by the subpixel variation of SWIR band reflectance. In our new framework, we use the Taylor expansion of a two-variable function to understand and quantify the impacts of subpixel variances of VIS/NIR and SWIR cloud reflectances and their covariance on the t and re retrievals. This framework takes into account the fact that the retrievals are determined by both VIS/NIR and SWIR band observations in a mutually dependent way. In comparison with previous studies, it provides a more comprehensive understanding of how subpixel cloud reflectance variations impact the t and re retrievals based on the bispectral method. In particular, our framework provides a mathematical explanation of how the subpixel variation in VIS/NIR band influences the re retrieval and why it can sometimes outweigh the influence of variations in the SWIR band and dominate the error in re retrievals, leading to a potential contribution of positive bias to the re retrieval. We test our framework using synthetic cloud fields from a large-eddy simulation and real observations from Moderate Resolution Imaging Spectroradiometer. The predicted results based on our framework agree very well with the numerical simulations. Our

  14. Apoptosis - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Apoptosis - Methods and ProtocolsSecond edition, 2009; Peter Erhardt and Ambrus Toth (Eds; Springer Protocols - Methods in molecular biology, vol. 559; Humana press, Totowa, New Jersey (USA; Pages: 400; €88.35; ISBN: 978-1-60327-016-8The editors rightly begin the preface telling us that: “The ability to detect and quantify apoptosis, to understand its biochemistry and to identify its regulatory genes and proteins is crucial to biomedical research”. Nowadays this is a grounding concept of biology and medicine. What is particularly remarkable...

  15. IP Routing Protocols

    Science.gov (United States)

    Nolasco Pinto, Armando

    2002-03-01

    Uyless Black is a widely known expert in computer networks and data communications. He is author of more than ten books in the communication technologies field, which puts him in a good position to address this topic. In IP Routing Protocols he starts by providing the background and concepts required for understanding TCP/IP technology. This is done clearly and assumes little prior knowledge of the area. As might be expected, he emphasizes the IP route discovery problem. Later he details several routing protocols.

  16. Protocol Materials: A Clarification.

    Science.gov (United States)

    Innerd, Wilfred; O'Gorman, David

    "Protocol materials" are records or recordings of a wide variety of behavioral situations. Characteristically they are neither simulated nor extensively edited. They are to be used for the empirical verification of concepts derived from both educational theory and the social sciences. They are attempts to capture reality so that it may be studied…

  17. THE MASTER PROTOCOL CONCEPT

    Science.gov (United States)

    Allegra, Carmen J.

    2015-01-01

    During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553

  18. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  19. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  20. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  1. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  2. Mitosis Methods & Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Mitosis Methods & Protocols Andrew D. McAinsh (Edt Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 545, 2009 ISBN: 978-1-60327-992-5   It is quite clear from the contents of this book that the remarkably fascinating phenomenon of mitosis (that captured, and still is capturing, the attention of entire generations of scientists is still open to research. This is mainly due to our lack of knowledge of so many multifaced events of this extraordinarly complex process. The reader giving a glace through the Contents and Contributors sections is speechless: All of the first-class models (i.e., budding yeast, Caenorabditis, Drosophila, Xenopus and Human are presented..... 

  3. Cognitive Protocol Stack Design

    Science.gov (United States)

    2015-12-30

    SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS (ES) U.S. Army Research Office P.O. Box 12211 Research Triangle Park , NC 27709-2211 cognitive...related to mobility and topology changes in a wireless multi-hop ad hoc network. (xv) We used a cross-layer formulation to design transmission...the transmission parameters, the implemented protocol and the network topology . The solution adopted involves a heuristic metric to measure how the

  4. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  5. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo;

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  6. CT protocol review and optimization.

    Science.gov (United States)

    Kofler, James M; Cody, Dianna D; Morin, Richard L

    2014-03-01

    To reduce the radiation dose associated with CT scans, much attention is focused on CT protocol review and improvement. In fact, annual protocol reviews will soon be required for ACR CT accreditation. A major challenge in the protocol review process is determining whether a current protocol is optimal and deciding what steps to take to improve it. In this paper, the authors describe methods for pinpointing deficiencies in CT protocols and provide a systematic approach for optimizing them. Emphasis is placed on a team approach, with a team consisting of at least one radiologist, one physicist, and one technologist. This core team completes a critical review of all aspects of a CT protocol and carefully evaluates proposed improvements. Changes to protocols are implemented only with consensus of the core team, with consideration of all aspects of the CT examination, including image quality, radiation dose, patient care and safety, and workflow.

  7. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  8. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  9. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  10. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  11. A PROGRAMMED LABOUR - PROTOCOL

    Directory of Open Access Journals (Sweden)

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  12. Survey protocol for invasive species

    OpenAIRE

    Menza, Charles

    2009-01-01

    This protocol was developed by the Biogeography Branch of NOAA’s Center for Coastal Monitoring and Assessment to support invasive species research by the Papahānaumokuākea Marine National Monument. The protocol’s objective is to detect Carijoa riisei and Hypnea musciformis in deepwater habitats using visual surveys by technical divers. Note: This protocol is designed to detect the presence or absence of invasive species. A distinct protocol is required to collect information on abundance ...

  13. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.;

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  14. Optimal wavelengths obtained from laws analogous to the Wien's law for monospectral and bispectral methods, and general methodology for multispectral temperature measurements taking into account global transfer function including non-uniform emissivity of surfaces

    Science.gov (United States)

    Rodiet, Christophe; Remy, Benjamin; Degiovanni, Alain

    2016-05-01

    In this paper, it is shown how to select the optimal wavelengths minimizing the relative error and the standard deviation of the temperature. Furthermore, it is shown that the optimal wavelengths in mono-spectral and bi-spectral methods (for a Planck's law) can be determined by laws analogous to the displacement Wien's law. The simplicity of these laws can thus allow real-time selection of optimal wavelengths for a control/optimization of industrial processes, for example. A more general methodology to obtain the optimal wavelengths selection in a multi-spectral method (taking into account the spectral variations of the global transfer function including the emissivity variations) for temperature measurement of surfaces exhibiting non-uniform emissivity, is also presented. This latter can then find an interest in glass furnaces temperature measurement with spatiotemporal non-uniformities of emissivity, the control of biomass pyrolysis, the surface temperature measurement of buildings or heating devices, for example. The goal consists of minimizing the standard deviation of the estimated temperature (optimal design experiment). For the multi-spectral method, two cases will be treated: optimal global and optimal constrained wavelengths selection (to the spectral range of the detector, for example). The estimated temperature results obtained by different models and for different number of parameters and wavelengths are compared. These different points are treated from theoretical, numerical and experimental points of view.

  15. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  16. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  17. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  18. An index guiding temporal planting policies for wind erosion reduction

    NARCIS (Netherlands)

    Zhao, C.X.; Zheng, D.W.; Stigter, C.J.; He, W.Q.; Tuo, D.B.; Zhao, P.

    2006-01-01

    Vegetation cover has spatial as well as temporal characteristics, but the latter are often neglected. Temporal cover characteristics were explored to recommend planting policies for returning arable land into land better protected from serious wind erosion during late autumn, winter, and particularl

  19. Mode field expansion in index-guiding microstructured optical fibers

    Science.gov (United States)

    Sharma, Dinesh Kumar; Sharma, Anurag

    2013-05-01

    The mode-field expander (MFE) is a microstructured optical fiber (MOF) based device that enlarges the modal field distribution and can couple light from large mode area (LMA) fibers into small core fibers or vice-versa and other optical waveguides. Using our earlier developed analytical field model, we studied the mode-field expansion in MOFs having triangular lattice, and low-loss splicing of MOFs to standard single-mode fibers (SMFs), based on the controlled all airhole collapse method, which leads to an optimum mode-field match at the joint interface of the MOF-SMF. Comparisons with available experimental and simulation results have also been included.

  20. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  1. Interoperation between AODV protocol and AOHR protocol for mobile ad hoc networks

    Science.gov (United States)

    Wu, Shaochuan; Wang, Changhong; Zhang, Jiayan

    2009-12-01

    Although AOHR protocol has some excellent performance, no actual network utilizes AOHR as routing protocol. It is because that this protocol cannot interoperate with AODV protocol, which is the most famous routing protocol and used all over the world. The cost will be very huge to replace AODV protocol with AOHR protocol for existing networks, so the only feasible method is to modify AOHR protocol to interoperate with AODV as introduced in this paper. The simulation results prove that the modified AOHR protocol can help the existing AODV protocol provide routing service, and the interoperation of these two routing protocols is realized.

  2. Process for Reviewing Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes the process for conducting two types of reviews of survey protocols. A quick assessment is used to acknowledge and describe to potential...

  3. Assessment of Established Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — A form and instructions for quickly and briefly assessing a previously (prior to 2013) reviewed or approved survey protocol for use as a National or Regional survey...

  4. National Elk Refuge vaccination protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Proposal by the State of Wyoming, Wyoming Game and Fish Department, to vaccinate elk on the National Elk Refuge. The proposal provides a protocol for vaccinating elk...

  5. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  6. Formal Modeling of Communication Protocols.

    Science.gov (United States)

    1981-03-01

    problems have been developed. 4 FORMAL MODELING OF COMMUNICATION PROTOCOLS The state machine model is motivated by the observation that protocols may be...simplest types of state machine model because they have only a single state variable (the state) which takes on a relatively small range of values. For...grammar, this correspondence is very apparent. For each state of the state machine model , we define a nonterminal symbol in the grammar. The inputs

  7. Midazolam por via oral como medicação pré-anestésica em crianças e adolescentes com paralisia cerebral: estudo comparativo das variações do índice bispectral Midazolam por vía oral como medicación preanestésica en niños y adolescentes con parálisis cerebral: estudio comparativo de las variaciones del índice bispectral Oral midazolam as pre-anesthetic medication in children and teenagers with cerebral palsy: a comparative study on the variations of the bispectral index

    Directory of Open Access Journals (Sweden)

    Verônica Vieira da Costa

    2009-02-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: O midazolam é um derivado benzodiazepínico com ação hipnótica e muito utilizado como medicação pré-anestésica em anestesia pediátrica. As crianças com paralisia cerebral (PC também se beneficiam do uso do midazolam, mas seus efeitos são ainda desconhecidos sobre esse grupo de pacientes que apresentam uma série de particularidades, com alterações inclusive no local de ação do midazolam. O objetivo do estudo foi avaliar a ação do midazolam utilizado como medicação pré-anestésica sobre o índice bispectral (EEG-BIS dos pacientes com paralisia cerebral. MÉTODO: Foram avaliados dois grupos de pacientes: um com diagnóstico de PC e outro sem doença do sistema nervoso central (SNC e periférico. Foram registrados valores de EEG-BIS na enfermaria na véspera da operação e no dia da operação, 40 minutos depois da administração de 0,6 mg.kg-1 de midazolam via oral. Foram excluídos pacientes com história de reação paradoxal ao midazolam e pacientes do grupo-controle que estivessem em uso de outra medicação. RESULTADOS: Foram estudados 77 pacientes de ambos os sexos, entre 4 e 18 anos de idade. Não houve diferença entre os valores de EEG-BIS basal entre os grupos estudados. Após o uso do midazolam houve diminuição dos valores do EEG-BIS nos dois grupos estudados, com diferença estatística significativa em cada grupo. Na comparação entre grupos não houve diferença estatística. CONCLUSÕES: O midazolam administrado como medicação pré-anestésica na dose de 0,6 mg.kg-1 diminui os valores basais do EEG-BIS sem caracterizar hipnose e sem diferença estatística nos grupos estudados.JUSTIFICATIVA Y OBJETIVOS: El midazolam es un derivado benzodiazepínico con acción hipnótica y muy utilizado como medicación preanestésica en anestesia pediátrica. Los niños con parálisis cerebral (PC también se benefician del uso del midazolam, pero sus efectos todavía se desconocen sobre ese

  8. Ⅱ类超晶格双光谱红外探测器光谱串音的量化分析计算%Quantitative Analysis and Calculation of Spectral Crosstalk of Type Ⅱ Superlattice Bispectral Infrared Detectors

    Institute of Scientific and Technical Information of China (English)

    王忆锋; 余连杰; 田萦

    2011-01-01

    对于起降阶段的各类飞机来说,便携式导弹是主要威胁.以基于Ⅱ类超晶格双光谱红外探测器的机载导弹逼近告警(MAW)系统为应用背景,介绍了光谱串音的定义及计算方法.分别测出两个光谱通道的光谱响应曲线,容易利用MATLAB样条函数积分命令算出两条曲线交叉部分围成的面积,该面积的数值反映了器件光谱串音的大小.给出了所用MATLAB程序,该方法具有实现容易、使用快捷等特点.%The main threats for any type of aircraft are the man portable missiles during taking-off and landing.Under the application background of missile approach warning (MAW) based on type Ⅱ superlatice bispectral infrared detectors, the definition and calculation methods of spectral crosstalk were introduced.After measuring separately the spectral response curves of the two spectral channels, the area of the region bounded by the crossed sections of the two curves reflecting the amount of spectral crosstalk of the device, can be calculated easily with MATLAB spline function integration commands.The MATLAB program was listed in this paper.It is easier to implement and convenient to use.

  9. The mesh network protocol evaluation and development

    OpenAIRE

    Pei Ping; PETRENKO Y.N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily to understand that how different protocols are used in mesh network. In addition to our comprehension, Multi – hop routing protocol could provide robustness and load balancing to communication in wireless mesh networks.

  10. Cryptographic Protocols under Quantum Attacks

    CERN Document Server

    Lunemann, Carolin

    2011-01-01

    The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.

  11. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  12. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  13. Protocol Writing in Clinical Research

    Science.gov (United States)

    Al-Jundi, Azzam

    2016-01-01

    Writing a research proposal is probably one of the most challenging and difficult task as research is a new area for the majority of postgraduates and new researchers. The purpose of this article is to summarize the most important steps and necessary guidelines for producing a standard research protocol. Academic and administrative success of any project is usually determined by acquiring a grant for the related field of research. Hence, the quality of a protocol is primarily required to achieve success in this scientific competition. PMID:28050522

  14. Developing protocols for obstetric emergencies.

    Science.gov (United States)

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  15. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  16. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  17. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  18. Probability Distributions over Cryptographic Protocols

    Science.gov (United States)

    2009-06-01

    exception. Cryptyc integrates use of pattern- matching in the spi calculus framework , which in turn allows the specification of nested cryptographic...programs too: the metaheuristic search for security protocols,” Information and Software Technology, vol. 43, pp. 891– 904, December 2001. 131 [9] X

  19. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  20. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  1. Metabolomics protocols for filamentous fungi.

    Science.gov (United States)

    Gummer, Joel P A; Krill, Christian; Du Fall, Lauren; Waters, Ormonde D C; Trengove, Robert D; Oliver, Richard P; Solomon, Peter S

    2012-01-01

    Proteomics and transcriptomics are established functional genomics tools commonly used to study filamentous fungi. Metabolomics has recently emerged as another option to complement existing techniques and provide detailed information on metabolic regulation and secondary metabolism. Here, we describe broad generic protocols that can be used to undertake metabolomics studies in filamentous fungi.

  2. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols and...

  3. Protocol biopsies for renal transplantation

    Directory of Open Access Journals (Sweden)

    Rush David

    2010-01-01

    Full Text Available Protocol biopsies in renal transplantation are those that are procured at predetermined times post renal transplantation, regardless of renal function. These biopsies have been useful to study the natural history of the transplanted kidney as they have detected unexpected - i.e. "subclinical" pathology. The most significant subclinical pathologies that have been detected with protocol biopsies have been acute lesions, such as cellular and antibody mediated rejection, and chronic lesions, such as interstitial fibrosis and tubular atrophy, and transplant glomerulopathy. The potential benefit of early recognition of the above lesions is that their early treatment may result in improved long-term outcomes. Conversely, the identification of normal histology on a protocol biopsy, may inform us about the safety of reduction in overall immunosuppression. Our centre, as well as others, is attempting to develop non-invasive methods of immune monitoring of renal transplant patients. However, we believe that until such methods have been developed and validated, the protocol biopsy will remain an indispensable tool for the complete care of renal transplant patients.

  4. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrat...

  5. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analys...

  6. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison pr

  7. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As progr

  8. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  9. The Kyoto Protocol and China

    Institute of Scientific and Technical Information of China (English)

    佘巧云

    2005-01-01

    The kyoto Protocol is an agreement to the United Nations Framework Convention on CLimate Change (UNFCCC)2,an international treaty on global warming .It is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by an average of 5.2% compared to the level of 1990 during the 2008-12 period.

  10. Formally Generating Adaptive Security Protocols

    Science.gov (United States)

    2013-03-01

    a proven version of leader election and 2/3 consensus. In 2011 we did the same for a simple version of Paxos. At each stage of the evolution as our... leader election [2] and authentication [4] would suffice for Paxos as well. In preparation for the harder protocols, we had added expressive power to the

  11. Performance Evaluation of MANET Routing Protocols Based on Internet Protocols

    Directory of Open Access Journals (Sweden)

    Hilal Bello Said,

    2015-11-01

    Full Text Available The topology of mobile ad hoc network (MANET changes rapidly and unpredictably due to nodes mobility. This makes routing protocols very important to analyze so as to communicate efficiently between the wireless nodes. Another important issue in the MANET is the internet protocols IPv4 and IPV6. The former which have been conventionally in use for long and the latter which is seen as the future standard for network architecture is studied due to its improved protection and huge address space support. In this paper, performance of AODV, DYMO, OLSRv2 and OLSR are analyzed under the IPv4 and IPv6 standards using the Qualnet simulator. Distinct performance metrics viz. Packet delivery ratio, Throughput, Average End-to-End Delay, and Average jitter are selected for the experiment. The results are then analyzed and scrutinized to provide qualitative assessment of their performances.

  12. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  13. Novel analysis and improvement of Yahalom protocol

    Institute of Scientific and Technical Information of China (English)

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  14. Efficacy of Sedation Scheme Research in ICU by Using Bispectral Index Scores%脑电双频指数评分用于重症监护病房镇静方案调整的效果

    Institute of Scientific and Technical Information of China (English)

    陈亚芳; 葛称; 蔡福良; 沈正林

    2014-01-01

    目的:临床药师参与镇静方案研究,使镇静剂更加安全、合理地用于重症监护患者。方法选择18岁以上以治疗为目的进行有创机械通气重症监护病房( ICU )住院患者,利用脑电双频指数(BIS)数值调整其镇静剂,用量使镇静处于最佳水平,记录患者的生命体征、咪达唑仑总用量及平均日用量。结果咪达唑仑平均日用量与年龄呈负相关,与身高、体重、体表面积呈正相关,男性患者用量大于女性患者,60岁以上患者用量小于60岁以下患者。结论咪达唑仑应根据患者的年龄、性别、身高、体重给予个体化镇静。%Objective To make the sedative agents use in ICU patients more safe and more rational by the clinical pharmacists partici-pating in the sedative scheme research. Methods The ICU inpatients aged over 18 years old with injured mechanical ventilation were selected. The bispectral index ( BIS ) was adopted to adjust the sedative agent for making the dosage in the optimal level. The patient vi-tal signs,total amount and average daily dose of midazolam were recorded. Results The average daily dose of midazolam was negatively correlated with age and positively correlated with height,body weight and body surface area. The midazolam dose of the male patients was more than that of the female patients,the midazolam dose for the patients aged over 60 years old was less than that for the pa-tients aged less than 60 years old. Conclusion Midazolam sedation should be individualized according to the patient's age,gender, height and weight.

  15. Comparison of C50 for Propofol-remifentanil Target-controlled Infusion and Bispectral Index at Loss of Consciousness and Response to Painful Stimulus in Elderly and Young Patients

    Institute of Scientific and Technical Information of China (English)

    Ning Yang; Ming-Zhang Zuo; Yun Yue; Yun Wang; Yu Shi; Xue-Na Zhang

    2015-01-01

    Background:In this prospective randomized study,we compared the predicted blood and effect-site C50 for propofol and remifentanil target-controlled infusion (TCI) and the bispectral index (BIS) values at loss of consciousness (LOC) and response to a standard noxious painful stimulus (LOS) in elderly and young patients,respectively.We hypothesized that the elderly patients will require lower target concentration of both propofol and remifentanil at above two clinical end-points.Methods:There were 80 American Society of Anesthesiologists (ASA) physical status Ⅰ Ⅱ unpremedicated patients enrolled in this study,they were divided into elderly group (age ≥65 years,n =40) and young group (aged 18-54 years,n =40).Propofol was initially given to a predicted blood concentration of 1.2 μg/ml and thereafter increased by 0.3 μg/ml every 30 s until Observer's Assessment of Alertness and Sedation score was 1.The propofol level was kept constant,and remifentanil was given to provide a predict blood concentration of 2.0 ng/ml,and then increased by 0.3 ng/ml every 30 s until loss of response to a tetanic stimulus.BIS (version 3.22,BIS Quattro sensor) was also recorded.Results:In elderly group,the propofol effect-site C50 at LOC of was 1.5 (1.4-1.6) μg/ml,was significantly lower than that of young group,which was 2.2 (2.1-2.3) μg/ml,the remifentanil effect-site C50 at LOS was 3.5 (3.3-3.7) ng/ml in elderly patients,was similar with 3.7 (3.6-3.8) ng/ml in young patients.Fifty percent of patients lost consciousness at a BIS value of 57.3 (56.4-58.1),was similar with that of young group,which was 55.2 (54.0-56.3).Conclusion:In elderly patients,the predicted blood and effect-site concentrations of propofol at LOC were lower than that of young patients.At same sedation status,predicted blood and effect-site concentrations of remifentanil required at LOS were similar in elderly and young patients.BIS were not affected by age.Low-propofol/high-opioid may be optional TCI strategy

  16. 脑电双频指数在儿科ICU镇静监测的临床应用价值%Sedation assessment by using bispectral index in the pediatric intensive care unit

    Institute of Scientific and Technical Information of China (English)

    滕国良; 姚军; 龚小慧; 张宇鸣

    2009-01-01

    目的 探讨脑电双频指数(BIS)在儿科ICU危重患儿镇静深度监测中的应用价值.方法 前瞻性收集我院PICU的42例6个月~13岁的危重患儿,以咪唑安定持续静脉滴注镇静治疗,在应用镇静剂后的10个时间段以Ramsay评分评价镇静深度的同时进行BIS监测,分析BIS与Ramsay评分在儿童危重症镇静评估的相关性及影响因素.结果 42例危重症患儿中共采集420对BIS与Ramsay对照数据,并做Spearman等级相关分析,BIS与Ramsay评分呈明显负相关(r=-0.8879,P0.05);BIS范围在55~80之间为危重症患儿合适的镇静分值.结论 BIS与Ramsay评分在危重症镇静深度评估中具有较好相关性.BIS监测具有操作简单、省时、连续性好等优点,可作为PICU患儿镇静深度判断的客观指标.%Objective To evaluate the applicability of bispectral index (BIS) in assessing sedation in pediatric intensive care unit. Methods Patients in pediatric ICU,aged six months to thirteen years and requi-ring sedation were given midazolam as sedative drug. The Ramsay score was assessed by physicians after mi-dazolam was given at ten time interval and these data were compared with the blinded BIS score. Results A total of 42 children were included in the study,420 valid paired observation of BIS values and Ramsay score were performed. According to Spearman's scale analysis, the correlation coefficient between BIS value and Ramsay score was -0.887 9 (P0.05). Conclusion BIS values cor-relate fairly well with the Ramsay scores in PICU patient. With the advantages such as simpleness, time-sav-ing,continuity and etc,BIS monitoring is a good objective tool for judging sedation depth of PICU patients.

  17. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    Science.gov (United States)

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  18. Kioto protocol; Protocolo de Kioto

    Energy Technology Data Exchange (ETDEWEB)

    Romero, A.

    2005-07-01

    Atmospheric contamination by greenhouse gases is a global problem, and thus its solution requires global measures. Although the consequences of climate change are questioned and the foreseeable effects are not excessively serious, there are plenty of scientific reasons for all countries to make the necessary efforts to meet the objectives established by the Kyoto Protocol of reducing the six greenhouse gases over the period 2008-2012. Therefore, it seems essential that we understand the nature of the transformation that are occurring in the different systems, what changes they are causing and what costs they incur. Independently of its effectiveness and realism, the Kyoto Protocol is the first regulatory step in the direction of globalization in the environmental field. (Author)

  19. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  20. On using Mobile IP Protocols

    Directory of Open Access Journals (Sweden)

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  1. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  2. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  3. Heuristic Methods for Security Protocols

    OpenAIRE

    Qurat ul Ain Nizamani; Emilio Tuosto

    2009-01-01

    Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  4. New Models for Protocol Security

    Science.gov (United States)

    2015-06-18

    protocols and primitives (e.g., Schnorrs identification scheme, commitment schemes secure against selective openings, Chaum Blind Signatures , etc...Theory 156: 246-268 (2015) 5 3. Samantha Leung, Edward Lui, Rafael Pass: Voting with Coarse Beliefs. ITCS 2015: 61 4. Jing Chen, Silvio Micali, Rafael...Schneider: Multi-Verifier Signatures . J. Cryptology 25(2): 310-348 (2012) 7 37. Rafael Pass, Muthuramakrishnan Venkitasubramaniam: A Parallel Repetition

  5. Automatic analysis of distance bounding protocols

    CERN Document Server

    Malladi, Sreekanth; Kothapalli, Kishore

    2010-01-01

    Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in protocol executions. It is important to analyze protocols for the possibility of such violations. Past efforts to analyze distance bounding protocols have only been manual. However, automated approaches are important since they are quite likely to find flaws that manual approaches cannot, as witnessed in literature for analysis pertaining to key establishment protocols. In this paper, we use the constraint solver tool to automatically analyze distance bounding protocols. We first formulate a new trace property called Secure Distance Bounding (SDB) that protocol executions must satisfy. We then classify the scenarios in which these protocols can operate considering the (dis)honesty of nodes and location of the attacker in the network. Finally, we extend the const...

  6. DSTC Layering Protocols in Wireless Cooperative Networks

    CERN Document Server

    Elamvazhuthi, P S; Dey, B K

    2008-01-01

    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  7. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    used to give a formal semantics to security protocols which supports proofs of their correctness. More precisely, we give a compositional event-based semantics to an economical, but expressive, language for describing security protocols (SPL); so the events and dependency of a wide range of protocols......Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  8. The reliable multicast protocol application programming interface

    Science.gov (United States)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  9. ACSEPP On-Line Electronic Payment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-bin; ZHU Xian; HONG Fan

    2004-01-01

    With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol.Its aim is to design a practical electronic payment protocol which is both secure and convenient.Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security.

  10. Security Verification of Secure MANET Routing Protocols

    Science.gov (United States)

    2012-03-22

    the destination. The route discovery phase is complete upon receipt of the RREP at the requesting node. The DYMO protocol is a simpler version of AODV ...described in this appendix. The protocols are Secure AODV (SAODV), Secure Efficient Distance Vector (SEAD), and Secure Link State Routing Protocol (SLSP...SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ENG/12-03 DEPARTMENT OF THE AIR FORCE AIR

  11. A father protocol for quantum broadcast channels

    CERN Document Server

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  12. Model checking the HAVi leader election protocol

    OpenAIRE

    Romijn, J.M.T.

    1999-01-01

    The HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the tools Spin and Xtl (from the Caesar/Aldebaran package). It turns out that the protocol does not meet some safety properties and that there are situations in which the protocol may never converge to designate a l...

  13. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  14. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali...

  15. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  16. Analysing ZigBee Key Establishment Protocols

    CERN Document Server

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  17. INEEL AIR MODELING PROTOCOL ext

    Energy Technology Data Exchange (ETDEWEB)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  18. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  19. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  20. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  1. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ-Spaces......It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  2. A Secure Short Message Communication Protocol

    Institute of Scientific and Technical Information of China (English)

    Chao-Wen Chang; Heng Pan; Hong-Yong Jia

    2008-01-01

    According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway are realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.

  3. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order......We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... to ensure the finiteness of the protocol state-spaces while still being able to verify interesting protocol properties. The translations for different kinds of communication media have been implemented and successfully tested, among others, on agreement protocols from WS-Business Activity....

  4. Research on Container Behaviors Protocol

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  5. New Models for Population Protocols

    CERN Document Server

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  6. Experimental quantum multiparty communication protocols

    Science.gov (United States)

    Smania, Massimiliano; Elhassan, Ashraf M.; Tavakoli, Armin; Bourennane, Mohamed

    2016-06-01

    Quantum information science breaks limitations of conventional information transfer, cryptography and computation by using quantum superpositions or entanglement as resources for information processing. Here we report on the experimental realisation of three-party quantum communication protocols using single three-level quantum system (qutrit) communication: secret-sharing, detectable Byzantine agreement and communication complexity reduction for a three-valued function. We have implemented these three schemes using the same optical fibre interferometric setup. Our realisation is easily scalable without compromising on detection efficiency or generating extremely complex many-particle entangled states.

  7. A structured data transfer protocol

    Science.gov (United States)

    Barrett, P.; Rots, A.

    1992-01-01

    The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.

  8. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  9. Research on Routing Protocol of Mobile Ad Hoc Network

    OpenAIRE

    Tuo Ming Fu; Che Min

    2016-01-01

    Routing protocol is an important content of mobile Ad Hoc. The typical mobile Ad Hoc network routing protocols is introduced. The advantages and disadvantages of these routing protocols are analyzed. A hybrid routing protocol is put forward based on this.

  10. 脑电双频谱指数和 Narcotrend 监测临床应用新进展%The new advance in clinical application of bispectral index and Narcotrend monitoring

    Institute of Scientific and Technical Information of China (English)

    郝倩; 周莉; 刘保江; 吕洁萍

    2016-01-01

    Monitoring the depth of anesthesia has been a challenge in anesthetic research. For decades, adequacy of general anesthesia was estimated on the basis of unspecific clinical parameters, such as blood pressure, heart rate, sweating, tearing, eye movement, and many more. These traditional methods may vary from patient to patient depending on the type of surgery. And with the extent of time, these indicators may have fatigue phenomenon. In addition, the use of other drugs such as muscle relaxants and vasodilators make the analysis of these signs difficult and unreliable. Today, an increasing number of monitors reflect anesthetic effects on the main target organ of general anesthesia, the brain. These monitors record and process electroencephalogram or auditory evoked potentials, which can accurately reflect the changes in the physiological functions of the brain. At present, bispectral index (BIS) and Narcotrend monitors are commonly used for monitoring the hypnotic component of anesthesia during perioperative period. BIS is first applied to clinical, a large number of data proved the good correlation between the BIS value and sedation degree, which is its uniqueness. Narcotrend monitor is a new type of EEG monitoring system, compared with the BIS, the time delay for calculation is shorter and the electrode is cheaper. This article reviewed the application and progress of the two technologies.%麻醉深度的评估一直是麻醉研究领域的一个重要话题。传统的临床麻醉常根据临床体征调节麻醉深度,如血压、心率、出汗、流泪、眼球运动等。这些体征可能由于手术类型不同因人而异,且可能随麻醉和手术时间延长出现疲劳现象,加之现代麻醉术中骨骼肌松弛药和血管扩张剂的联合使用,使得全麻下的临床体征很难用来准确客观地评估麻醉深度。随着神经电生理技术迅猛发展,近年产生了许多定量脑电图和诱发电位指标,可更加精确

  11. Relação entre a infusão contínua de dexmedetomidina e a fração expirada de sevoflurano monitorizada pelo índice bispectral

    Directory of Open Access Journals (Sweden)

    Magalhães Edno

    2004-01-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: A associação de agentes venosos à anestesia geral inalatória proporciona melhor qualidade de analgesia e hipnose. A dexmedetomidina é um agonista específico alfa2-adrenérgico com estas características e reconhecida por proporcionar estabilidade hemodinâmica. O objetivo do estudo foi avaliar o efeito da infusão contínua de dexmedetomidina na fração expirada de sevoflurano (FEsevo em anestesia geral, monitorizada pela análise bispectral do EEG (BIS. MÉTODO: Estudou-se, de modo prospectivo, 24 pacientes adultos, de ambos os sexos, estado físico ASA I e II, submetidos à cirurgias eletivas sob anestesia geral, monitorizados com ECG, PANI, SpO2, P ET CO2, FEsevo e BIS. Procedeu-se a indução venosa com alfentanil (30 µg.kg-1, tiopental (5 mg.kg-1 e vecurônio (0,1 mg.kg-1 e intubação traqueal. Iniciaram-se a administração de sevoflurano (manutenção do BIS entre 40 e 60, a ventilação controlada com volume corrente de 10 ml.kg-1 e a manutenção da P ET CO2 entre 35 e 45 mmHg. Na fase de manutenção da anestesia, após 60 minutos da indução anestésica (M60, foi iniciada a infusão contínua de dexmedetomidina em 2 fases: infusão inicial (1 µg.kg-1 em 20 minutos; e, infusão de manutenção (0,5 µg.kg-1.h-1. A concentração de sevoflurano foi ajustada para manter o valor de BIS entre 40 e 60. As variáveis de PA, FC, FEsevo, SpO2, P ET CO2 e BIS foram avaliadas nos momentos pré-indução (M-15, M15, M45, M75, M105 e M120. RESULTADOS: A associação da dexmedetomidina à anestesia geral com sevoflurano proporcionou redução significativa (p < 0,05 da FEsevo de M45 (1,604 ± 0,485 a M105 (1,073 ± 0,457 e de M45 (1,604 ± 0,485 a M120 (1,159 ± 0,475. As variáveis hemodinâmicas analisadas apresentaram diferenças estatisticamente significantes com p < 0,05, mas sem repercussões clínicas. CONCLUSÕES: A associação de dexmedetomidina em infusão contínua (0,5 µg.kg-1.h-1 à anestesia

  12. 脑电双频指数监测对重症监护病房昏迷患者预后的评估%Study of estimating the prognosis of ICU patients with coma using Bispectral index value

    Institute of Scientific and Technical Information of China (English)

    高红梅; 路玲; 窦琳; 常文秀

    2013-01-01

    Objective To investigate the correlation between Bispectral index (BIS) value and the prognosis of patients with coma in ICU.Methods A total of 208 patients with coma in ICU were divided into 4 groups according to the BIS value.In group I,BIS value was 0 to 20; groupⅡ,BIS value 21 to 40; group Ⅲ,BIS value 41 to 60; and group Ⅳ,BIS value greater than 60.Comparison of the difference in BIS value with the differences in prognosis of patients with coma was carried out between four groups,and the prognosis of patients with coma was stratified into consciousness,coma,vegetative state,and brain death.Subsequently,the best cutoff score of BIS value calculated for determining the correlation between BIS and mental state was proposed.Results There are no significant differences in the age and APACHE Ⅱ scores between four groups (P > 0.05).It was inverse correlation between BIS value and mental state (r =-0.749,P =0.00).According to the ROC curve,as BIS value was greater than 42.5,there were higher sensitivity and specificity in Conscious-Coma patients.Conclusions BIS value is correlated with the prognosis of patients with coma in ICU,and BIS value can be a useful marker for estimating the prognosis of comatose patients.%目的 观察脑电双频指数(BIS)监测值与重症监护室(ICU)中昏迷患者预后的相关性,探讨通过BIS值评估ICU昏迷患者的预后的可行性.方法 回顾性将纳入的208例昏迷危重病患者根据所监测的BIS监测值分为四组:Ⅰ组,0~20;Ⅱ组,21 ~40;Ⅲ组,41~60;Ⅳ组,>60.分别用BIS值和神志预后(神志清楚-昏迷、植物状态、脑死亡状态)为目标,比较组间差异,计算各组BIS值与昏迷患者预后的相关性,寻找较准确评估昏迷患者预后的BIS临界值.结果 四组患者的年龄、APACHEⅡ评分采用单因素方差分析,差异无统计学意义(P>0.05),对BIS值与昏迷预后状态采用Spearman’s等级相关进行相关分析,结果呈负相关(r=-0.749,P

  13. VANET Routing Protocols: Pros and Cons

    CERN Document Server

    Paul, Bijan; Bikas, Md Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.

  14. Developing practice protocols for advanced practice nursing.

    Science.gov (United States)

    Paul, S

    1999-08-01

    In most states, the role of an advanced practice nurse is dependent on practice protocols that provide an organized method for analyzing and managing a disease or major symptom. They are also used to control the process of medical care and to specify steps in the delivery of that care. Creating appropriate practice protocols is one of the most important precursors to implementing the advanced practice role, because they virtually drive the clinician's ability to treat or manage clinical situations or disease states. This article outlines the steps involved in developing practice protocols and discusses the content that should be included in a protocol, providing an example of narrative and algorithm format protocols. Pros and cons, as well as legal issues related to practice protocols, are also presented.

  15. Merging Multiparty Protocols in Multiparty Choreographies

    Directory of Open Access Journals (Sweden)

    Fabrizio Montesi

    2013-02-01

    Full Text Available Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantiating a single protocol, which is the merge of the original ones. This gives an effective methodology for obtaining new protocols by composing existing ones. Moreover, by removing all synchronisations required for starting protocol instances, our transformation reduces the number of communications and resources needed to execute a choreography.

  16. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  17. E-Cash Payment Protocols

    Directory of Open Access Journals (Sweden)

    Shweta Srivastava

    2012-09-01

    Full Text Available E-cash is a payment system designed and implemented for making purchases over open networks such as the Internet. Need of a payment system which enables the electronic transactions are growing at the same time that the use of Internet is growing in our daily life. Present days electronic payment systems have a major problem, they cannot handle the security and the users anonymity and at the same time these systems are secure on the cost of their users anonymity. This paper shows the payment protocols for digital cash and discusses how a digital cash system can be formed by presenting a few of the present days digital cash systems in details. We also provide a comparison and determine them together to see which one of them fulfils the properties for digital cash and the required security level.

  18. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  19. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    secret sharing in terms of simple algebraic conditions on the integer sharing coefficients, and we propose a black-box secret sharing scheme with minimal expansion factor. Note that, in contrast to the classical field-based secret sharing schemes, a black-box secret sharing scheme allows to share......, MPC can be based on arbitrary finite rings. This is in sharp contrast to the literature where essentially all MPC protocols require a much stronger mathematical structure, namely a field. Apart from its theoretical value, this can lead to efficiency improvements since it allows a greater freedom...... ones. We also construct a noninteractive distributed-verifier proof of circuit satisfiability, which—in principle—allows to prove anything that can be proven without giving away the proof....

  20. [Climate change and Kyoto protocol].

    Science.gov (United States)

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  1. [The research protocol. Part I].

    Science.gov (United States)

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  2. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Ching-Nung Yang; Su-Hsuan Chu; Bing-Ling Lu

    2005-01-01

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's protocol and show that Kak's protocol does not have the joint distribution and integration that the author declares in [1].

  3. The Braid-Based Bit Commitment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Li-cheng; CAO Zhen-fu; CAO Feng; QIAN Hai-feng

    2006-01-01

    With recent advances of quantum computation, new threats have closed in upon to the classical public key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding.Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks.

  4. Reasoning about Protocol Change and Knowledge

    Science.gov (United States)

    Wang, Yanjing

    In social interactions, protocols govern our behaviour and assign meaning to actions. In this paper, we investigate the dynamics of protocols and their epistemic effects. We develop two logics, inspired by Propositional Dynamic Logic (PDL) and Public Announcement Logic (PAL), for reasoning about protocol change and knowledge updates. We show that these two logics can be translated back to the standard PDL and PAL respectively.

  5. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  6. Traffic Performance Analysis of Manet Routing Protocol

    CERN Document Server

    Rajeswari, S; 10.5121/ijdps.2011.2306

    2011-01-01

    The primary objective of this research work is to study and investigate the performance measures of Gossip Routing protocol and Energy Efficient and Reliable Adaptive Gossip routing protocols. We use TCP and CBR based traffic models to analyze the performance of above mentioned protocols based on the parameters of Packet Delivery Ratio, Average End-to-End Delay and Throughput. We will investigate the effect of change in the simulation time and Number of nodes for the MANET routing protocols. For Simulation, we have used ns-2 simulator.

  7. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  8. Status Report on the UNIDROIT Space Protocol

    Science.gov (United States)

    Larsen, Paul B.

    2002-01-01

    In my status report on the UNIDROIT Space Protocol I will describe the history and purpose of the Space Protocol; I will state the Protocol's relationship to the UNIDROIT Convention on International Interests in Mobile Equipment in particular after the 2001 Cape Town Diplomatic Conference on the Convention. I will describe the COPUOS study of possible conflicts with the existing space law treaties and explain UNIDROIT's objective of avoiding conflicts between existing space law and the Space Protocol. Finally I will describe future steps to be taken.

  9. A formal model of fair exchange protocols

    Institute of Scientific and Technical Information of China (English)

    QING Sihan; LI Gaicheng

    2005-01-01

    Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of exchanged items, and presents the formal goals for fairness, accountability,etc., reflecting the inherent requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a complete attack, discovering deeper reasons for causing an attack.Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties.

  10. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  11. Wireless sensors networks MAC protocols analysis

    CERN Document Server

    Chaari, Lamia

    2010-01-01

    Wireless sensors networks performance are strictly related to the medium access mechanism. An effective one, require non-conventional paradigms for protocol design due to several constraints. An adequate equilibrium between communication improvement and data processing capabilities must be accomplished. To achieve low power operation, several MAC protocols already proposed for WSN. The aim of this paper is to survey and to analyze the most energy efficient MAC protocol in order to categorize them and to compare their performances. Furthermore we have implemented some of WSN MAC protocol under OMNET++ with the purpose to evaluate their performances.

  12. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  13. A New Watermarking Protocol against Conspiracy

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jun; KOU Weidong; FAN Kai; CAO Xuefei

    2006-01-01

    A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

  14. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  15. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  16. Comment on "flexible protocol for quantum private query based on B92 protocol"

    Science.gov (United States)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  17. Mobile IPv6 Protocols and Implementation

    CERN Document Server

    Li, Qing; Shima, Keiichi

    2009-01-01

    Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide. This book covers the IPv6 host mobility protocol known as 'mobile IPv6' and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation.

  18. Performance of a connectionless protocol over ATM

    NARCIS (Netherlands)

    Heijenk, Geert J.; Moorsel, van Aad P.A.; Niemegeers, Ignas G.

    1992-01-01

    Recent studies show the existence of a demand for a connectionless broadband service. In order to cope with this demand, a connectionless protocol for the B-ISDN needs to be designed. Such a protocol should make use of ATM and the ATM Adaptation Layer. It needs to specify destination and bandwidth o

  19. Algebraic techniques for low communication secure protocols

    NARCIS (Netherlands)

    Haan, Robbert de

    2009-01-01

    This thesis discusses new results in two areas within cryptography; securely transmitting a message between two parties and securely computing a function on the inputs of multiple parties. For both of these areas we mainly consider perfectly secure protocols, which are protocols that have a zero err

  20. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  1. Secure Geographic Routing Protocols: Issues and Approaches

    CERN Document Server

    sookhak, Mehdi; Haghparast, Mahboobeh; ISnin, Ismail Fauzi

    2011-01-01

    In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.

  2. Beveiliging Internet Protocol beter en beter

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    1999-01-01

    Iedereen die gebruik maakt van e-mail, internet, intranet of extranet maakt gebruik van het in de jaren 7O ontworpen IP het Internet Protocol. Dit protocol zorgt ervoor dat toegang tot de diverse internetdiensten mogelijk is. Iedere computer die op internet wordt aangesloten, krijgt een eigen IP-adr

  3. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    Pang, J.

    2002-01-01

    Needham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over insecure open netwo

  4. Diagrammatization of the Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2012-09-01

    Full Text Available With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols are often explained in terms of traffic analysis and oriented toward technical staff and those already familiar with network protocols. This paper aims at proposing a diagrammatic methodology to represent protocols in general, with a focus on the Transmission Control Protocol and Secure Sockets Layer in particular. The purpose is to facilitate understanding of protocols for learning and communication purposes. The methodology is based on the notion of flow of primitive things in a system with six stages: creation, release, transfer, arrival, acceptance, and processing. Though the method presents a basic description of protocols without in-depth analysis of all aspects and mechanisms, the resultant conceptual description is a systematic specification that utilizes a few basic notions that assist in illustrating functionality and support comprehension.

  5. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  6. Concurrent Validity of a Pragmatic Protocol.

    Science.gov (United States)

    Duncan, Julie Condon; Perozzi, Joseph A.

    1987-01-01

    The scores of 11 non-handicapped kindergarten children on the Pragmatic Protocol (used in assessing language-handicapped children) were correlated with their ratings by five experienced judges on a 7-point equal-appearing interval scale of communicative competence. The concurrent validity of the Protocol and interobserver reliability were…

  7. The Formal Specifications for Protocols of Decoders

    Institute of Scientific and Technical Information of China (English)

    YUAN Meng-ting; WU Guo-qing; SHU Feng-di

    2004-01-01

    This paper presents a formal approach, FSPD (Formal Specifications for Protocols of Decoders), to specify decoder communication protocols. Based on axiomatic, FSPD is a precise language with which programmers could use only one suitable driver to handle various types of decoders. FSPD is helpful for programmers to get high adaptability and reusability of decoder-driver software.

  8. A Survey on Distance Vector Routing Protocols

    CERN Document Server

    Tang, Linpeng

    2011-01-01

    In this paper we give a brief introduction to five different distance vector routing protocols (RIP, AODV, EIGRP, RIP-MTI and Babel) and give some of our thoughts on how to solve the count to infinity problem. Our focus is how distance vector routing protocols, based on limited information, can prevent routing loops and the count to infinity problem.

  9. Welfare monitroing system : assessment protocol for horses

    NARCIS (Netherlands)

    Livestock Research,

    2012-01-01

    This document describes the protocol for horses in more detail. For the development of the protocol the Welfare Quality® framework was used. For each measure there is a description how to assess the measure including the method of classification.

  10. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    Romijn, J.M.T.

    1999-01-01

    The HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the tools Spin a

  11. Secure Geographic Routing Protocols: Issues and Approaches

    Directory of Open Access Journals (Sweden)

    Mehdi sookhak

    2011-09-01

    Full Text Available In the years, routing protocols in wireless sensor networks (WSN have been substantially investigated by researches Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN and also provide a qualitative comparison of them.

  12. Treatment protocols for cervical cancer

    Directory of Open Access Journals (Sweden)

    Vujkov Tamara

    2002-01-01

    Full Text Available Introduction Cervical cancer is the second most common cancer in women worldwide and the second cause of cancer death among women. About 95% (90% in developed countries of invasive carcinomas are of sqamous types, and 5% (10% in developed countries are adenocarcinomas. FIGO classification of cervical carcinomas, based on clinical staging and prognostic factor dictate therapeutic procedures and help in designing treatment protocols. Therapeutic modalities Surgical therapy includes conization, radical hysterectomy with pelvic lymphadenectomy and palliative operation urinary diversion and colostomy. Radiotherapy, brachytherapy and teletherapy are most recently combined with chemotherapy as concurrent chemoradiation. Discussion and conclusion No change in therapeutic modalities will ever decrease mortality rate of cervical carcinoma as much as education, prevention and early screening. The 5-year survival for locally advanced disease has not improved during the last 40 years as a result of failure to deliver therapy to the paraaortic region. Paraaortic lymph nodes should be evaluated before therapy planning by different imaging procedures, or more exactly by surgical staging: laparoscopy or laparotomy. Radical operations of cervical carcinoma should be performed by experienced surgeons, educated for this type of operation, with sufficient number of cases.

  13. Security Weaknesses in Arbitrated Quantum Signature Protocols

    Science.gov (United States)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  14. Cryptanalysis of the arbitrated quantum signature protocols

    Science.gov (United States)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  15. Cryptanalysis of the arbitrated quantum signature protocols

    CERN Document Server

    Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-01-01

    As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics in future study on AQS protocols.

  16. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......, one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  17. Quantum Communication Complexity of Quantum Authentication Protocols

    CERN Document Server

    Guedes, Elloá B

    2011-01-01

    In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channel is subject to eavesdropping. However, even in face of the various existing definitions of quantum authentication protocols in the literature, little is known about them in this perspective, and this lack of knowledge may unfavor comparisons and wise choices. In the attempt to overcome this limitation, in the present work we aim at showing an approach to evaluate quantum authentication protocols based on the determination of their quantum communication complexity. Based on our investigation, no similar methods to analyze quantum authentication protocols were found in the literature. Pursuing this further, our approa...

  18. Similarity based mixed transaction concurrency control protocol

    Institute of Scientific and Technical Information of China (English)

    PAN Yi; LU Yan-sheng

    2005-01-01

    Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transactions are not sufficient for mixed real-time database systems (MRTDBS), where different types of real-time transactions coexist in the systems concurrently. In this paper, a new concurrency control protocol MRTT_CC for mixed real-time transactions is proposed. The new strategy integrates with different concurrency control protocols to meet the deadline requirements of different types of real-time transactions. The data similarity concept is also explored in the new protocol to reduce the blocking time of soft real-time transactions, which increases their chances to meet the deadlines. Simulation experiments show that the new protocol has gained good performance.

  19. Multicast Protocol for Uni-Directional Networks

    Institute of Scientific and Technical Information of China (English)

    黄皓; 陈贵海; 谢立; 孙钟秀

    2000-01-01

    A very inexpensive receive-only satellite receiver can receive high bandwidth traffic from a feeder. Therefore the connection between the feeder and the receiver is uni-directional. The existing routing protocols, such as Link-State and Distance-Vector, are designed on the premise that any links are bidirectional and they cannot handle the uni-directional links. In this paper, a dynamic multicast routing protocol is proposed, which can handle uni-directional networks. This protocol can also adapt to the dynamic change of the topology of the network and has good scalability. A formal description of the protocol by Petri net is given. Liveness,deadlock free and other properties of the protocol are proved.

  20. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  1. Establishment of pharmacodynamic model of sevoflurane in pediatric patients: bispectral index%患儿七氟醚药效学模型的建立:脑电双频谱指数

    Institute of Scientific and Technical Information of China (English)

    宋蕴安; 黄悦; 林琳; 张马忠; 牛静

    2013-01-01

    Objective To establish the pharmacodynamic model of sevoflurane with bispectral index (BIS) as the effective index in pediatric patients.Methods Thirteen ASA physical status Ⅰ or Ⅱ pediatric patients,aged 4-9 yr,weighing 12-39 kg,undergoing non-cardiac surgery,were selected in the study.The pediatric patients sequentially inhaled 1%,5 % and 1% sevoflurane via a face mask and each concentration was inhaled for 15 min.BIS value,HR,BP and SpO2 were automatically recorded every 10 s.Based on nonlinear mixed effect modeling,the population pharmacodynamic model of sevoflurane was established using NONMEM software.The effect of age on the pharmacodynamic parameters was evaluated using a stepwise forward addition then backward elimination modeling approach.The standard for model improvement was defined as a decrease in the value of the objective function by more than 3.84.Results Twelve pediatric patients,aged 4.0-8.5 yr,weighing 12.8-38.0 kg,with body height of 92-135 cm,were enrolled in this study and the data which were enrolled comprised 2964 effective concentration-time-BIS points.The model was not improved significantly with any covariates (age,body height,and body weight) introduced (P > 0.05).The estimated parameters of the final pharmacodynamic model of sevoflurane were as follows:ke0 =O.516/min ; EC50 (BIS50) =2.11% ; γ =2.46 ; E0 =74.6 ; EMAx =11.2.Conclusion The pharmacodynamic model of sevoflurane is successfully established with BIS as the effective index in pediatric patients,and the analysis for each parameter of the model indicates that the sensitivity to sevoflurane is lower,but the blood-brain equilibration time of the drug is shorter and the onset and recovery are faster in children than in adults.%目的 以脑电双频谱指数(BIS)为效应指标,建立患儿七氟醚药效学模型.方法 选择行非心脏手术患儿13例,年龄4-9岁,体重12~39 kg,ASA分级Ⅰ或Ⅱ级.患儿经面罩顺序吸入七氟醚1%、5%和1

  2. A comparison of bispectral index and sedation-agitation scale in guiding sedation therapy: a randomized controlled study in patients undergoing short-term mechanical ventilation%脑电双频指数与镇静-躁动评分指导短期机械通气患者镇静治疗的随机对照研究

    Institute of Scientific and Technical Information of China (English)

    赵栋; 许媛; 何伟; 李彤; 何茵

    2011-01-01

    目的 比较脑电双频指数(BIS)实时监测和镇静-躁动评分(SAS)在重症监护病房(ICU)短期机械通气患者镇静治疗实施过程中的可行性.方法 选择ICU中18~60岁外科手术后需持续机械通气(>12 h)患者105例,按信封法随机分为BIS组(42例)和SAS组(63例),分别依据BIS和SAS评估镇静深度.两组均给予芬太尼镇痛,丙泊酚和咪唑安定联合镇静,每小时根据镇静深度评估调节镇静药物泵入剂量(BIS组目标值为50~70,SAS组目标为3~4级).入ICU后次日晨6时停用镇静及镇痛药物,每小时记录镇静深度(BIS值或SAS分级)、镇静持续时间、觉醒时间、机械通气时间、单位时间内咪唑安定和丙泊酚用量及累计总量,以及吸痰后躁动发生率、镇静期间气管导管耐受率和疼痛耐受率、拔管后谵妄发生率.结果 BIS组单位时间内眯唑安定和丙泊酚用量均高于SAS组[咪唑安定(mg·kg-1·h-1):0.10±0.02比0.09±0.02,丙泊酚(mg·kg-1·h-1):0.95±0.23比0.86±0.20,均P<0.05],总体镇静达标时段(Dt,以1 h为1个时段)以及前3个时段(D1、D2、D3)的镇静达标率均明显高于SAS组[Dt:75.2%(507)比52.8%(421),D1:78.6%(33)比22.2%(14),D2:88.1%(37)比20.6%(13),D3:81.0%(34)比31.7%(20),均P<0.01],觉醒时间(min)明显短于SAS组[0(0,20)比15(0,47),P<0.05];BIS组和SAS组患者急性生理学与慢性健康状况评分系统Ⅱ(APACHE Ⅱ)评分(分:3.57±2.60比4.19±2.30)、机械通气时间[h:16.5(14.5,19.0)比17.0(15.0,19.0)]、镇静持续时间[h:14.0(12.9,17.1)比16.0(13.0,18.0)]及吸痰后躁动发生率(81.0%比79.4%)、镇静期间气管导管耐受率(71.4%比74.6%)和疼痛耐受率(92.8%比93.6%)、拔管后谵妄发生率(4.8%比1.6%)等差异均无统计学意义(均P>0.05).结论 与SAS比较,BIS在指导ICU短期机械通气患者的镇静治疗中,对镇静深度调控具有更好的可操作性.%Objective To compare the value of bispectral index (BIS) monitoring and

  3. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus;

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number...

  4. Snakebite management in Iran: Devising a protocol

    Directory of Open Access Journals (Sweden)

    Seyed Mostafa Monzavi

    2014-01-01

    Full Text Available Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments.

  5. Efficient Privacy Preserving Protocols for Similarity Join

    Directory of Open Access Journals (Sweden)

    Bilal Hawashin

    2012-04-01

    Full Text Available During the similarity join process, one or more sources may not allow sharing its data with other sources. In this case, a privacy preserving similarity join is required. We showed in our previous work [4] that using long attributes, such as paper abstracts, movie summaries, product descriptions, and user feedbacks, could improve the similarity join accuracy using supervised learning. However, the existing secure protocols for similarity join methods can not be used to join sources using these long attributes. Moreover, the majority of the existing privacy‐preserving protocols do not consider the semantic similarities during the similarity join process. In this paper, we introduce a secure efficient protocol to semantically join sources when the join attributes are long attributes. We provide two secure protocols for both scenarios when a training set exists and when there is no available training set. Furthermore, we introduced the multi‐label supervised secure protocol and the expandable supervised secure protocol. Results show that our protocols can efficiently join sources using the long attributes by considering the semantic relationships among the long string values. Therefore, it improves the overall secure similarity join performance.

  6. A fully efficient secure quantum cryptography protocol

    CERN Document Server

    Xiang Bin Wang

    2001-01-01

    Since Bennett and Brassard suggested their quantum key distribution protocol(BB84 protocol) in 1984, the subject has been extensively studied both theoretically and experimentally. The protocol allows two remote parties Alice and Bob to create and share a secret key using a quantum channel and public authenticated communications. The quantum key created in this way is in principle secure because eavesdroppers have no way to tap the quantum channel without disturb it. In the protocol, two level quantum bits are measured in two basis, $X$ and $Z$ randomly by Bob. So at least half of the measurement results will be discarded because Bob has a half probability taking the measurement in a wrong basis. On the other hand, the security is not the maximum in BB84 protocol. To increase the security, one may straightforwardly increase the number of basis used in the protocol. For example, six state protocol was proposed recently for two level system. However, in this way, it seems to be the case that the higher the secu...

  7. Analysis of Enhanced Associativity Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Said A. Shaar

    2006-01-01

    Full Text Available This study introduces an analysis to the performance of the Enhanced Associativity Based Routing protocol (EABR based on two factors; Operation complexity (OC and Communication Complexity (CC. OC can be defined as the number of steps required in performing a protocol operation, while CC can be defined as the number of messages exchanged in performing a protocol operation[1]. The values represent the worst-case analysis. The EABR has been analyzed based on CC and OC and the results have been compared with another routing technique called ABR. The results have shown that EABR can perform better than ABR in many circumstances during the route reconstruction.

  8. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  9. COOPERATIVE ARQ PROTOCOL FOR CORRELATED WIRELESS CHANNELS

    Institute of Scientific and Technical Information of China (English)

    Yu Guanding; Zhang Zhaoyang; Qiu Peiliang

    2006-01-01

    A novel Automatic repeat ReQuest (ARQ) protocol called cooperative ARQ is presented in this letter, where a relay terminal is requested to retransmit an erroneously received packet, instead of the source terminal. The data link layer Packet Error Rate (PER) performance of cooperative ARQ is derived in correlated wireless channel. The results show that even though the relay-destination channel is worse than the sourcedestination channel, the new protocol outperforms the traditional one as long as the average SNR of the relaydestination channel is better than a certain threshold. It is also demonstrated that a second order diversity gain can be achieved with the cooperative ARQ protocol.

  10. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  11. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  12. Comparison of a kayaking ergometer protocol with an arm crank protocol for evaluating peak oxygen consumption.

    Science.gov (United States)

    Forbes, Scott C; Chilibeck, Philip D

    2007-11-01

    The purpose of this study was to compare a kayak ergometer protocol with an arm crank protocol for determining peak oxygen consumption (V(.-)O2). On separate days in random order, 10 men and 5 women (16-24 years old) with kayaking experience completed the kayak ergometer protocol and a standardized arm crank protocol. The kayak protocol began at 70 strokes per minute and increased by 10 strokes per minute every 2 minutes until volitional fatigue. The arm crank protocol consisted of a crank rate of 70 revolutions per minute, initial loading of 35 W and subsequent increases of 35 W every 2 minutes until volitional fatigue. The results showed a significant difference (p kayak ergometer and the arm crank protocols for relative peak V(.-)O2 (47.5 +/- 3.9 ml x kg(-1) x min(-1) vs. 44.2 +/- 6.2 ml x kg(-1) x min(-1)) and absolute peak V(.-)O2 (3.38 L x min(-1) +/- 0.53 vs. 3.14 +/- 0.64 L x min(-1)). The correlation between kayak and arm crank protocol was 0.79 and 0.90, for relative and absolute V(.-)O2 peak, respectively (both p kayak ergometer may be due to the greater muscle mass involved compared to the arm crank ergometer. The kayak ergometer protocol may therefore be more specific to the sport of kayaking than an arm crank protocol.

  13. BIS在氯胺酮联合咪达唑仑小儿麻醉深度中的监测价值评价%Evaluation on monitoring value of bispectral index in pediatric anesthesia depth of ketamine combined with midazolam

    Institute of Scientific and Technical Information of China (English)

    蔡军; 武玉清; 周成华; 周策; 陆富钊; 李鑫; 黄鹂; 李伟; 张永; 陈虎

    2012-01-01

    Objective To evaluate the value of bispectral index (BIS) monitor in pedo-oblique inguinal hernia operation through anesthesia by ketamine combined with midazolam . Methods Forty 2-to 6-year-old child patients undergoing pedo-oblique inguinal hernia surgery in 2011 were randomly divided into 2 groups; BIS group (B, n=20) and control group (C, n=20). In group B , we controlled the dosage of ketamine and midazolam by BIS monitor (78±5). In group C, we controlled the dosage of ketamine and midazolam by observation of haemodynamic reaction , respiratory rate and boby movement. Results Compared to group C , there is less haemodynamic fluctuation and shorter analepsia time and better sedation in group B. Conclusion BIS monitor could control the depth of anesthesia , shorten analepsia time by continuous and objective monitoring in pedo-oblique inguinal hernia operation , which results in better sedation in surgery and enhancementof pedo-patient comfort and safety.%目的 探讨脑电双频指数(bispectral index,BIS)在氯胺酮联合咪达唑仑进行小儿腹股沟斜疝手术麻醉深度监测中的应用价值.方法 选择择期行腹股沟斜疝手术的患儿40例,年龄2~6岁,ASAⅠ~Ⅱ级,随机分成 BIS监测组(B组)和对照组(C组).B组 (20例) 通过术中监测BIS数值,调整氯胺酮和咪达唑仑剂量使其维持在78±5;C组根据术中患儿的血流动力学反应、呼吸频率改变和出现体动反应来调整氯胺酮和咪达唑仑用量大小.结果 同C组相比,B组患儿镇静充分,血流动力学波动较小,术后苏醒时间缩短,有统计学意义(P<0.05).结论 应用BIS能连续、客观地监测并控制氯胺酮联合咪达唑仑进行小儿腹股沟斜疝手术的麻醉深度,缩短术后苏醒时间,有利于术中镇静及增强患儿的舒适感和安全性.

  14. Privacy-Preserving Protocols for Eigenvector Computation

    CERN Document Server

    Pathak, Manas A

    2010-01-01

    In this paper, we present a protocol for computing the dominant eigenvector of a collection of private data distributed across multiple parties, with the individual parties unwilling to share their data. Our proposed protocol is based on secure multiparty computation with a trusted third-party arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We also augment the protocol with randomization to make it difficult, with a high probability, for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, efficiency of protocol and experiments over a prototype implementation.

  15. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  16. Rethinking low extra delay background transport protocols

    CERN Document Server

    Carofiglio, Giovanna; Rossi, Dario; Testa, Claudio; Valenti, Silvio

    2010-01-01

    BitTorrent has recently introduced LEDBAT, a novel application-layer congestion control protocol for data exchange. The protocol design starts from the assumption that network bottlenecks are at the access of the network, and that thus user traffic competes creating self-inducing congestion. To relieve from this phenomenon, LEDBAT is designed to quickly infer that self-induced congestion is approaching (by detecting relative changes of the one-way delay in the transmission path), and to react by reducing the sending rate prior that congestion occurs. Prior work has however shown LEDBAT to be affected by a latecomer advantage, where newly arriving connections can starve already existing flows. In this work, we propose modifications to the congestion window update mechanism of the LEDBAT protocol that aim at solving this issue, guaranteeing thus intra-protocol fairness and efficiency. Closed-form expressions for the stationary throughput and queue occupancy are provided via a fluid model, whose accuracy is conf...

  17. Standardized North American Marsh Bird Monitoring Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes monitoring protocols for marshbirds in North America. Monitoring parameters, field procedures, survey methods, timing of surveys, recording...

  18. Reparable Key Distribution Protocols for Internet Environments

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be futile. Fortunately, this paper presents reparable KDPs for internet environments with the use of the concept of timestamps.

  19. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  20. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  1. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  2. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-03-08

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  3. National Wildlife Refuge System Survey Protocol Template

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This template was developed for drafting National Wildlife Refuge System (NWRS) Survey Protocols. The template is arranged in the same order as the eight basic...

  4. Comparison of on Demand Routing Protocols

    Directory of Open Access Journals (Sweden)

    Bharat Bhushan

    2013-02-01

    Full Text Available A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

  5. Information Flow in Secret Sharing Protocols

    CERN Document Server

    Kashefi, Elham; Mhalla, Mehdi; Perdrix, Simon

    2009-01-01

    The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary condit...

  6. How To Develop Survey Protocols: A Handbook

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This handbook provides a standard and guidance for developing and reviewing survey protocols used in the National Wildlife Refuge System. In the handbook, survey...

  7. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  8. Probabilistic Model--Checking of Quantum Protocols

    CERN Document Server

    Gay, S; Papanikolaou, N; Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos

    2005-01-01

    We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniqu...

  9. Hybrid protocol of remote implementations of quantum operations

    Science.gov (United States)

    Zhao, Ning Bo; Wang, An Min

    2007-12-01

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga , Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  10. Adaptive Baud Protocol For Wireless Communication

    OpenAIRE

    Eskafi, F. H.; Nassiri-toussi, K.; G. Liu

    1998-01-01

    In this paper, the authors propose an algorithm that increases and decreases the transmission speed according to a user-specified function. The design objective is to regulate baud as efficiently as possible and ensure that in each transmission interval, transmitter and receiver bauds are equal for some period of time during data transmission. An equivalent discrete-time version of the protocol is verified by using the COSPAN software. Application for this adaptive baud protocol for wireless ...

  11. Dose protocols of acetylcholine test in Chinese

    Institute of Scientific and Technical Information of China (English)

    向定成; 龚志华; 何建新; 洪长江; 邱建; 马骏

    2004-01-01

    @@ Acetylcholine test has been widely used clinically in several countries as a practical test provoking coronary artery spasm.1-3 Although it has also been launched recently in a few hospitals in China, the dose protocol for acetylcholine test used in these hospitals were from abroad.4,5 This study was aimed at developing a dose protocol for acetylcholine test suitable for Chinese people.

  12. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  13. Protocol for communications in potentially noisy environments

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  14. Secure Fingerprint Alignment and Matching Protocols

    OpenAIRE

    Bayatbabolghani, Fattaneh; Blanton, Marina; Aliasgari, Mehrdad; Goodrich, Michael

    2017-01-01

    We present three secure privacy-preserving protocols for fingerprint alignment and matching, based on what are considered to be the most precise and efficient fingerprint recognition algorithms-those based on the geometric matching of "landmarks" known as minutia points. Our protocols allow two or more honest-but-curious parties to compare their respective privately-held fingerprints in a secure way such that they each learn nothing more than a highly-accurate score of how well the fingerprin...

  15. Mutual Authentication Protocols for RFID Systems

    Institute of Scientific and Technical Information of China (English)

    Ashrar A. Omer; Johnson P. Thomas; Ling Zhu

    2008-01-01

    With the availability of low-cost radio frequency identification (RFID) tags, security becomes an increasing concern.However, such tags do not permit complex eryptographic functions due to their computational, communications, and storage limitations.In this paper, we investigate the security issues and requirements of RFID systems, and propose ultra-light weight and light weight protocols for low-cost RFID tags. The proposed protocols has been applied to a supply chain management system.

  16. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  17. OAuth protocol for CERN Web Applications

    OpenAIRE

    Kleszcz, Emil; Rodriguez Fernandez, Luis; Marescaux, Nicolas Bernard

    2016-01-01

    Project Specification The CERN Authentication service has recently increased his offer of SSO protocols/frameworks with OAuth2 standard. The purpose of the work is to explain the need for an authorization standard and explain how does OAuth2 protocol addresses our requirements. OAuth is an open standard for authorization which provides a secure access to server resources that belongs to a user. As a wide known and relatively new standard (2012) is used by big players in the industry a...

  18. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computa...... the stronger fairness notion of envy-freeness. Finally, we show that under an obliviousness restriction, which still allows the computation of approximately envy-free allocations, GCC protocols are guaranteed to have exact subgame perfect Nash equilibria...

  19. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  20. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  1. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  2. EAR Protocol-Towards Fair Optimistic Non-Repudiation Exchange

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2005-01-01

    Fairness is of crucial importance for the exchange protocols via Internet. Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This paper is to propose a new exchange protocol, termed "EAR" Exchange Protocol as it consists of three sub-protocols: Exchange sub-protocol, Abort sub-protocol and Recovery sub-protocol. It is to be argued that the incorporation of these three sub-protocols may effectively enables EAR to assure non-repudiation, strong fairness, timeliness, confidentiality and the minimized involvement of the Trusted Third Party (TTP).

  3. Security Analysis of Broadcaster Group Key Exchange Protocols

    Institute of Scientific and Technical Information of China (English)

    LI Li; ZHANG Huanguo

    2006-01-01

    Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.

  4. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    OpenAIRE

    Li, Rebecca H.; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency...

  5. Internetworking with Internet Protocol (IP) and Transmission Control Protocol (TCP) within the Military

    OpenAIRE

    Eikenberg, Bruce R.

    1990-01-01

    Approved for public release; distribution is unlimited. The backbone of the internetworking technology widely used by the military, as well as many civilian installations, is commonly referred to as TCP/IP. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the two standard communication protocols from which TCP/IP receives its name. By utilizing TCP/IP, the majority of technical issues of interconnecting various computer technologies have become transparent to the user. Th...

  6. Epidemic Protocols for Pervasive Computing Systems - Moving Focus from Architecture to Protocol

    DEFF Research Database (Denmark)

    Mogensen, Martin

    2009-01-01

    Pervasive computing systems are inherently running on unstable networks and devices, subject to constant topology changes, network failures, and high churn. For this reason, pervasive computing infrastructures need to handle these issues as part of their design. This is, however, not feasible...... epidemic protocols as distribution mechanism for pervasive systems. The nature of epidemic protocols make them easy to implement, easy to deploy, and resilient to failures. By using epidemic protocols, it is possible to mitigate a wide range of the potential issues on the protocol layer. The result...... is lower complexity of building pervasive systems and higher robustness....

  7. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  8. Protocol Independent Multicast Based States Allocation

    Directory of Open Access Journals (Sweden)

    G Hemalatha

    2012-02-01

    Full Text Available In this paper the Protocol Independent Multicast (PIM protocol is being used. The PIM protocol avoids the packet drop and diverting problem. The PIM protocol is not dependent on any specific unicast routing protocol. It is IP routing independent protocol. The PIM uses the unicast and multicast information to create a distribution tree along the reverse path from the receivers towards the source. The PIM protocol consists of three modes such as sparse mode, dense mode and bidirectional mode. The sparse mode is used to sends the file from router to a receiver. The dense mode is used to sends the file from router to multiple receivers. The bidirectional mode is used to sends the message from router to sender and then continue the other process depending on the sender requirements. The client sends the file from sender to destination via the router. First the sender selects the file name and receiver name for transmission. Then the state is assigned automatically depend upon the user selection. The state can be defined by the number of destination selected to transmit the file from the source. If the sender selects single destination, it will assign “Without forwarding state router” for transmission. Otherwise it will assign “Forwarding state router” for transmission. If the receiver is not available, the router sends a message to sender such that “the requested receiver is not available”. Then the client will decide the file is transfer or not, it will reply with transfer the file, then the file will be transferred until the file will be discarded at client side. If the sender tries the same process after two times, the router will display the warning message as “the requested receiver is not available, this file will be discarded at client side”. Then it continues the other process.

  9. Bispectral Index as an Indicator of Cerebral Hypoperfusion During Off Pump Coronary Artery Bypass Grafting%脑电双频指数作为脑灌注不足指标在非体外循环下冠状动脉旁路移植术中的应用

    Institute of Scientific and Technical Information of China (English)

    Thomas M. Hemmerling; Jean-Fran(c)ois Olivier; Fadi Basile; Nien Le; Ignatio Prieto; 徐静

    2006-01-01

    非体外循环下冠状动脉旁路移植术(off-pump coronary artery bypass grafting,OPCAB)中常发生心动过缓和低血压.本文报道一例58岁行冠脉左回旋支远端吻合时并发可逆性脑灌注不足的病例.术中行远端吻合时,该患者的脑电双频指数(bispectral index,BIS)从45~50骤降至0.术后在手术室内拔除气管导管即刻的神经系统功能评估正常,无神经系统后遗症.术后恢复顺利,于术后第5天出院.OPCAB术中可能并发脑灌注不足,BIS可用于监测OPCAB术中脑灌注不足的发生.

  10. Eccentricity in Zone Routing Protocol for MANET

    Directory of Open Access Journals (Sweden)

    Mrs Komal Nair

    2012-06-01

    Full Text Available A Mobile Ad-Hoc Network (MANET is a decentralized network of autonomous mobile nodes, able to communicate with each other over wireless links. Due to the mobility of the nodes, the topology ofthe network changes spontaneously, therefore use of conventional routing tables maintained at fixed points (routers is not suggested. Such a network may operate in a standalone fashion. There are variousrouting protocols available for MANETs. The most popular ones are DSR, DSDV and ZRP .The zone routing protocol (ZRP is a hybrid routing protocol that proactively maintains routes within a localregion of the network. ZRP can be configured for a particular network through adjustment of a single parameter, the routing zone radius. In this paper, we address the issue of configuring the ZRP to providethe best performance for a particular network at any time with the concept of eccentricity. The results illustrate the important characteristics of different protocols based on their performance and thus suggest some improvements in the respective protocol. The tools used for the simulation are NS2 which is the main simulator, NAM (Network Animator and Tracegraph which is used for preparing the graphs from the trace files.

  11. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  12. Manet Load Balancing Parallel Routing Protocol

    Directory of Open Access Journals (Sweden)

    Hesham Arafat Ali

    2012-07-01

    Full Text Available In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path routing, but it always has a problem that the discovered paths may be not 100% disjoint and sending data is done in only one path until it's broken; the discovery of multiple paths also generates more overhead on the network. Load Balancing Parallel Routing Protocol [LBPRP] tried to solve previous multi path problems, distributing traffic among multiple paths sending data in parallel form as it uses all paths in the same time. We employed a simple test scenario to be sure of proposed model efficiency and to validate the proposed Load Balancing Parallel Routing Protocol. [LBPRP] will achieve load balancing in sending data, decreasing the end-to-end delay and increasing the packet delivery ratio and throughput, thus the performance of multi-path routing protocols can be improved consequently.

  13. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  14. Performance Evaluation of Routing Protocols in MANET

    Directory of Open Access Journals (Sweden)

    Smitha Sunny

    2015-01-01

    Full Text Available Mobile Ad-Hoc Network (MANET is an autonomous system that is composed of the mobile nodes which communicates through wireless links without any preexisting infrastructure. MANET is a collection of mobile nodes which can self-organize freely and dynamically into arbitrary and temporary network topologies. Mobile nodes in ad-hoc networks function as a router and can dynamically establish routes among themselves by means of a routing protocol. Routing protocols in mobile ad-hoc network helps node to send and receive packets. Therefore, selection of an appropriate routing protocol is an integral part of establishing a MANET. A suitable and effective routing mechanism helps to extend the successful deployment of mobile ad-hoc networks. An attempt has been made to compare the performance between on-demand reactive routing protocols namely AODV, DSR and proactive routing protocol namely DSDV for Constant Bit Rate (CBR traffic by varying network scope i.e. number of participating nodes as well as by varying the speed. The parameters used for evaluation are Packet delivery ratio (PDR, Normalized routing overhead, Average end to end delay (Delay, Throughput and Average Energy consumption. The simulations are carried out using Network Simulator NS2:34.

  15. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  16. Supporting Adaptation of Wireless Communication Protocols

    Directory of Open Access Journals (Sweden)

    LACHHMAN DAS DHOMEJA

    2016-10-01

    Full Text Available Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity, Bluetooth, IrDA (Infrared, etc. In order for pervasive devices to interact with each other, they need to have matching (alike communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth from what the server has (e.g. WiFi, connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange, L2CAP (Logical Link Control and Adaptation Protocol, RFCOM (Radio Frequency Communication and WiFi protocol and can run on (J2MW (Java 2 Micro Edition enabled mobile phones which support both Bluetooth and WiFi capabilities

  17. Operational protocols for controlling accelerator equipment

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, R.; Baribaud, G.; Benincasa, G.P.; Burla, P.; Casalegno, L.; Coudert, G.; Gelato, G.; Kuhn, H.K.; Saban, R.; Spinks, A. (European Organization for Nuclear Research, Geneva (Switzerland). LEP Div.)

    1990-08-01

    The equipment used to operate an accelerator is varied. However, the different devices may be divided into a limited number of classes for which operational protocols can be defined. Operational protocols permit: (i) a uniform operation, (ii) a clear definition of responsibility between the various specialists, (iii) independent development of programs and use of the most appropriate technology, (iv) the change of hardware and the transportability of software, and (v) the fabrication of devices by industry for general use. An operational protocol should be independent of any given control system and it must not be confused with a transmission protocol. As a first step, one defines an operational model of the device to be controlled. The model must represent a high-level description of the device as seen by the user. It will be characterized by a set of parameters and a set of rules. Although the particular requirements of specialists are not included in the operational protocol, allowances should be made for them. Emphasis will be placed on studies carried out on power converters and beam instrumentation. A general-purpose control message architecture is reported. (orig.).

  18. Operational protocols for controlling accelerator equipment

    Science.gov (United States)

    Bailey, R.; Baribaud, G.; Benincasa, G. P.; Burla, P.; Casalegno, L.; Coudert, G.; Gelato, G.; Kuhn, H. K.; Saban, R.; Spinks, A.

    1990-08-01

    The equipment used to operate an accelerator is varied. However, the different devices may be divided into a limited number of classes for which operational protocols can be defined. Operational protocols permit: (i) a uniform operation, (ii) a clear definition of responsibility between the various specialists, (iii) independent development of programs and use of the most appropriate technology, (iv) the change of hardware and the transportability of software, and (v) the fabrication of devices by industry for general use. An operational protocol should be independent of any given control system and it must not be confused with a transmission protocol. As a first step, one defines an operational model of the device to be controlled. The model must represent a high-level description of the device as seen by the user. It will be characterized by a set of parameters and a set of rules. Although the particular requirements of specialists are not included in the operational protocol, allowances should be made for them. Emphasis will be placed on studies carried out on power converters and beam instrumentation. A general-purpose control message architecture is reported.

  19. Animation of Natural Language Specifications of Authentication Protocols

    Directory of Open Access Journals (Sweden)

    Mabroka A. Mayouf

    2008-01-01

    Full Text Available Problem Statement: A few visualization tools have been created for protocol design and analysis. Although these tools provide an environment for designing security protocols, each one has its own protocol definition language (its also called informal specification language. The problem is that the user should understand the language which related to the used tool in order to define an exist protocol or design a new one. For specification, a language needs to be intuitive as well as easily usable and understandable by the security protocol engineer. It must be able to precisely and unambiguously specify the behavior of security protocol. Approach: In this study, we propose an approach for protocol specification based on the Natural language definitions of protocol semantics. By using programmatic semantics together with animations, representational flexibility of different protocol demonstration is retained for as long as it is needed. Result: This study provides an environment that can be used by protocols designers to develop and investigate different scenarios of security protocols especially authentication protocols. Natural Language Protocol Specifications (NLPS approach is used to define the protocol. The environment accepts the natural language text of protocol specifications and converts it to animations of protocol behavior. Conclusions/Recommendations: NLPS environment can really help protocol designer to consider and investigate the behavior of security protocols. It can also be used for teaching-learning security protocol concepts. In further, we will consider the possibility of analyzing security protocols using our NLPS environment and animation techniques in order to improve the correctness; that is determining whether or not the intended security properties of a protocol do hold.

  20. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval.

  1. Performance Evaluation of MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Hrituparna Paul

    2012-07-01

    Full Text Available The task of finding and sustaining routes in Mobile Ad-hoc Networks (MANETS is an important factor in determining the efficiency of any MANET protocol. MANET characteristically is an autonomous system of mobile nodes connected by wireless links without any centralised infrastructure. Absence of fixed infrastructures and host mobility thus network may experience rapid and unpredictable topology changes. Hence, routing is required in order to perform communication among the entire network. There are several routing protocols namely proactive, reactive and hybrid etc. In this paper we will discuss the active research work on these routing protocols and its performance evaluation. To this end, we adopt a simulation approach, which is more suitable to this kind of analysis

  2. Efficient Controlled Quantum Secure Direct Communication Protocols

    Science.gov (United States)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  3. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  4. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    level. In noisy-channel cryptography security proofs are based on the assumption that a given physical means of communication is at a sufficiently low level inherently noisy. In bounded-storage cryptography security proofs are based on the assumption that there exists streams of information, generated...... by computers or other physical phenomena, so intense that no one is able to fully store them. In quantum cryptography security proofs are based on the assumption that nature behaves consistently with quantum mechanics. In the following we describe the state of the art and some main open problems in the three......This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...

  5. Chapter 15: Commercial New Construction Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  6. MILITARY MULTI-HOP ROUTING PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Military tactical network is one of the most important applications of ad hoc network. Currently the existing routing protocols are put forward based on the simple and universal network model which has the ability of multi-hop routing but cannot work efficiently in the special military applications. The narrow bandwidth and limited energy of the wireless network make general routing protocols seem to be more redundant.In order to satisfy military needs properly, this letter makes a detailed analysis of physical nodes and traffic distribution in military network, uses cross-layer design concept for reference, combines traffic characteristic of application layer with routing protocol design. It categorized routing problem as crucial routes and non-crucial routes which adopted separate maintenance methods. It not only realizes basic transmission function but also works efficiently. It is quite fit for military application.

  7. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    in a finite field, in which the third one is the product of the first two. We extend this protocol in two ways: first we consider the case where the values are integers, and then we consider tuples of values that satisfy more general algebraic relations. Our basic scheme achieves optimal amortized......This thesis presents results in two branches of cryptography. In the first part we construct two general multiparty computation protocols that can evaluate any arithmetic circuit over a finite field. Both are built in the preprocessing model and achieve active security in the setting of a dishonest......+ 13] yields a more efficient protocol than that originally proposed in [DPSZ12]. Our preprocessing phases make use of a somewhat homomorphic encryption scheme, and significantly improve on the previous state of the art, both asymptotically and in practice. The online phase we present relies...

  8. Insights From Verbal Protocols: A Case Study

    Directory of Open Access Journals (Sweden)

    Margaret Kumar

    2012-09-01

    Full Text Available This study explores a postgraduate student writer’s responses and reactions through verbal protocols as she attends to teacher feedback. Teacher feedback has been heralded as an important element in process writing. Numerous studies have been carried out on various aspects of teacher feedback such as on the effectiveness of feedback, students’ preferences for teacher feedback and students’ perceptions of feedback. However, there is still a gap in the literature in determining how students respond as they engage with teacher feedback. This paper reports on one postgraduate student’s responses on and her reactions to teacher feedback. Concurrent verbal protocols used in complement with written drafts and teacher commentaries were the main sources of data for this study. The analyses reveal that attending to feedback is a recursive process that fosters self-reflection which, in turn promotes planning for revision. Keywords: Verbal protocols, Teacher written feedback; Recursion; Reflection; Planning

  9. Chapter 22: Compressed Air Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  10. Protocol for emergency EPR dosimetry in fingernails.

    Science.gov (United States)

    Trompier, F; Kornak, L; Calas, C; Romanyukha, A; Leblanc, B; Mitchell, C A; Swartz, H M; Clairand, I

    2007-08-01

    There is an increased need for after-the-fact dosimetry because of the high risk of radiation exposures due to terrorism or accidents. In case of such an event, a method is needed to make measurements of dose in a large number of individuals rapidly and with sufficient accuracy to facilitate effective medical triage. Dosimetry based on EPR measurements of fingernails potentially could be an effective tool for this purpose. This paper presents the first operational protocols for EPR fingernail dosimetry, including guidelines for collection and storage of samples, parameters for EPR measurements, and the method of dose assessment. In a blinded test of this protocol application was carried out on nails freshly sampled and irradiated to 4 and 20 Gy; this protocol gave dose estimates with an error of less than 30%.

  11. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not....... The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA...

  12. Self Fault-Tolerance of Protocols: A Case Study

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions.In other words, protocols with the fault-tolerance can not be provided when some fault occurs. This paper discusses the self fault-tolerance of protocols. It describes some concepts and methods for achieving self fault tolerance of protocols. Meanwhile, it provides a case study, investigates a typical protocol that does not satisfy the self fault-tolerance, and gives a new redesign version of this existing protocol using the proposed approach.

  13. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  14. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols

    Directory of Open Access Journals (Sweden)

    Campagne Fabien

    2008-02-01

    Full Text Available Abstract Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC, organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation. The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches. Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT

  15. A Protocol for Evaluating Contextual Design Principles

    Directory of Open Access Journals (Sweden)

    Arthur Stamps

    2014-11-01

    Full Text Available This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.

  16. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  17. Explicit Protocol for Deterministic Entanglement Concentration

    Institute of Scientific and Technical Information of China (English)

    GU Yong-Jian; GAO Peng; GUO Guang-Can

    2005-01-01

    @@ We present an explicit protocol for extraction of an EPR pair from two partially entangled pairs in a deterministic fashion via local operations and classical communication. This protocol is constituted by a local measurement described by a positive operator-valued measure (POVM), one-way classical communication, and a corresponding local unitary operation or a choice between the two pairs. We explicitly construct the required POVM by the analysis of the doubly stochastic matrix connecting the initial and the final states. Our scheme might be useful in future quantum communication.

  18. A molecular protocol for diagnosing myotonic dystrophy.

    Science.gov (United States)

    Guida, M; Marger, R S; Papp, A C; Snyder, P J; Sedra, M S; Kissel, J T; Mendell, J R; Prior, T W

    1995-01-01

    Myotonic dystrophy (DM) is an autosomal dominant genetic disease caused by an unstable CTG repeat sequence in the 3' untranslated region of the myotonin protein kinase gene. The CTG repeat is present 5-30 times in the normal population, whereas DM patients have CTG expansions of 50 to several thousand repeats. The age of onset of the disorder and the severity of the phenotype is roughly correlated with the size of the CTG expansion. We developed a molecular protocol for the diagnosis of DM based on an initial polymerase chain reaction screen to detect normal-sized alleles and small expansions, followed by an improved Southern protocol to detect larger expansions.

  19. Social Protocols for Agile Virtual Teams

    Science.gov (United States)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  20. Social Protocols for Agile Virtual Teams

    CERN Document Server

    Picard, Willy

    2011-01-01

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  1. Communication Protocols Augmentation in VLSI Design Applications

    Directory of Open Access Journals (Sweden)

    Kanhu Charan Padhy

    2015-05-01

    Full Text Available With the advancement in communication System, the use of various protocols got a sharp rise in the different applications. Especially in the VLSI design for FPGAs, ASICS, CPLDs, the application areas got expanded to FPGA based technologies. Today, it has moved from commercial application to the defence sectors like missiles & aerospace controls. In this paper the use of FPGAs and its interface with various application circuits in the communication field for data (textual & visual & control transfer is discussed. To be specific, the paper discusses the use of FPGA in various communication protocols like SPI, I2C, and TMDS in synchronous mode in Digital System Design using VHDL/Verilog.

  2. Building multiservice Internet protocol virtual private networks

    Science.gov (United States)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  3. Quantum Private Comparison Protocol with Linear Optics

    Science.gov (United States)

    Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu

    2016-12-01

    In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.

  4. The covert channel over HTTP protocol

    Science.gov (United States)

    Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof

    2016-09-01

    The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.

  5. NADA protocol: integrative acupuncture in addictions.

    Science.gov (United States)

    Carter, Kenneth; Olshan-Perlmutter, Michelle

    2014-01-01

    National Acupuncture Detoxification Association (NADA) acupuncture is a simple, standardized, 1- to 5-point auricular needling protocol that originated as a grass-roots response to the opiate epidemic of the 1970s. NADA acupuncture is increasingly recognized as a universally useful intervention in the treatment of addictions specifically and in behavior health more generally. It is recognized as a best practice in the treatment of substance use disorders. Integrative programs using the NADA protocol are likely to see improvements in engagement, retention, decreased drug cravings, anxiety, and less physical symptoms.

  6. A New Route Maintenance in Dynamic Source Routing Protocol

    CERN Document Server

    Shukla, Ashish

    2010-01-01

    Mobile ad-hoc network (MANET) is infrastructureless, self-organizable, multi hop packet switched network. A number of routing protocols for MANETs have been proposed in recent years. Dynamic Source Routing (DSR) protocol is one of the most popular routing protocol for ad hoc networks. This paper presents a novel method to enhance route maintenance part of DSR protocol. Our proposed route maintenance significantly increases the efficiency of the protocol at the time of route failures.

  7. Energy Consumption in Location Sharing Protocols for Android Applications

    OpenAIRE

    Prihodko, Mihails

    2012-01-01

    This thesis studies the Message Queue Telemetry Transport protocol (MQTT) as an application layer protocol in geographical location sharing applications using third generation cellular communication (3G). The MQTT protocol is compared in terms of energy efficiency and amount of data generated with the Hypertext Transfer Protocol (HTTP), which is currently used in typical location sharing applications. In order to compare the communication energy efficiency of both protocols a location sharing...

  8. Comparison of Two Hierarchical Routing Protocols for Heterogeneous MANET

    Science.gov (United States)

    2007-10-01

    protocols (e.g. Ad-Hoc On-Demand Distance Vector routing protocol , AODV ) search for and maintain routes to destination nodes upon demand from...the time it takes to find a route when data needs to be sent. Protocols such as OLSR and AODV support nodes having multiple interfaces. However they...hierarchical ad hoc routing protocols are derived from a “flat” ad routing protocol . For instance, H- AODV [8] and H-DSR [11] are examples

  9. Modify AODV Routing Protocol to Improve Motorway Surveillance System Performance

    OpenAIRE

    Layth Abdulkareem Hassnawi; R. Badlishah Ahmad; Abid Yahya

    2012-01-01

    This paper presents an algorithm to modify the Ad Hoc On-Demand Distance Vector (AODV) routing protocol in order to improve the routing performance in motorway surveillance systems. The proposed protocol has all the characteristics of the original AODV routing protocol since it follows all the steps of the route discovery and route maintenance mechanism of the original AODV routing protocol. The Modified AODV (MAODV) is different from the original AODV protocol in that it modifies the origina...

  10. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, Ferdy; Jansen, Pierre G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  11. Real-time communication protocols: an overview

    OpenAIRE

    Hanssen, Ferdy; Jansen, Pierre G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally the pros and cons regarding the At-Home Anywhere project are discussed.

  12. Strong Robustness of Randomized Rumor Spreading Protocols

    CERN Document Server

    Doerr, Benjamin; Levavi, Ariel

    2010-01-01

    Randomized rumor spreading is a classical protocol to disseminate information across a network. At SODA 2008, a quasirandom version of this protocol was proposed and competitive bounds for its run-time were proven. This prompts the question: to what extent does the quasirandom protocol inherit the second principal advantage of randomized rumor spreading, namely robustness against transmission failures? In this paper, we present a result precise up to $(1 \\pm o(1))$ factors. We limit ourselves to the network in which every two vertices are connected by a direct link. Run-times accurate to their leading constants are unknown for all other non-trivial networks. We show that if each transmission reaches its destination with a probability of $p \\in (0,1]$, after $(1+\\e)(\\frac{1}{\\log_2(1+p)}\\log_2n+\\frac{1}{p}\\ln n)$ rounds the quasirandom protocol has informed all $n$ nodes in the network with probability at least $1-n^{-p\\e/40}$. Note that this is faster than the intuitively natural $1/p$ factor increase over th...

  13. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  14. An acid-catalyzed macrolactonization protocol.

    Science.gov (United States)

    Trost, Barry M; Chisholm, John D

    2002-10-17

    [reaction: see text] An efficient macrolactonization protocol devoid of any base was developed derived from the use of vinyl esters in transesterification. Subjecting a hydroxy acid and ethoxyacetylene to 2 mol % [RuCl(2)(p-cymene)](2) in toluene followed by addition of camphorsulfonic acid or inverse addition provided macrolactones in good yields.

  15. Secure communication protocol for mobile multimedia applications

    OpenAIRE

    Komninos, N.; Honary, B.; Darnell, M.

    2000-01-01

    Data transmission over wireless communication networks is increasing rapidly and security has become a very important issue. The main considerations of secure communication systems are authentication, key distribution, and data transfer. This paper describes a secure communication protocol (SCP), which provides privacy and data integrity for end-to-end data transmission over wireless communication systems.

  16. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...

  17. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  18. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  19. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom...

  20. Plant Fungal Pathogens: Methods and Protocols

    NARCIS (Netherlands)

    Bolton, M.D.; Thomma, B.P.H.J.

    2012-01-01

    Over the course of evolution, fungi have adapted to occupy specific niches, from symbiotically inhabiting the flora of the intestinal tract of mammals to saprophytic growth on leaf litter resting on the forest floor. In Plant Fungal Pathogens: Methods and Protocols, expert researchers in the field d

  1. Implementing the Environmental Protocol Domestically : An Overview

    NARCIS (Netherlands)

    Bastmeijer, C.J.; Vidas, Davor

    2000-01-01

    This book - edited by Davor Vidas of the Nansens Institute (Oslo, Norway) - is the first book that comprehensively discusses the implementation of the Environmental Protocol to the Antarctic Treaty. Part V of this book includes a number of chapters describing the measures that have been taken by sel

  2. Knowledge Sharing Protocol for Smart Spaces

    Directory of Open Access Journals (Sweden)

    Juha-Pekka Soininen

    2012-09-01

    Full Text Available In this paper we present a novel knowledge sharing protocol (KSP for semantic technology empowered ubiquitous computing systems. In particular the protocol is designed for M3 which is a blackboard based semantic interoperability solution for smart spaces. The main difference between the KSP and existing work is that KSP provides SPARQL-like knowledge sharing mechanisms in compact binary format that is designed to be suitable also for resource restricted devices and networks. In order to evaluate the KSP in practice we implemented a case study in a prototype smart space, called Smart Greenhouse. In the case study the KSP messages were on average 70.09% and 87.08% shorter than the messages in existing M3 communication protocols. Because the KSP provides a mechanism for automating the interaction in smart spaces it was also possible to implement the case study with fewer messages than with other M3 communication protocols. This makes the KSP a better alternative for resource restricted devices in semantic technology empowered smart spaces.

  3. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt high-en

  4. Smart environments technology, protocols and applications

    CERN Document Server

    Cook, Diane

    2004-01-01

    Smart Environments contains contributions from leading researchers, describing techniques and issues related to developing and living in intelligent environments. Reflecting the multidisciplinary nature of the design of smart environments, the topics covered include the latest research in smart environment philosophical and computational architecture considerations, network protocols for smart environments, intelligent sensor networks and powerline control of devices, and action prediction and identification.

  5. A Geographical Heuristic Routing Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Luis Urquiza-Aguiar

    2016-09-01

    Full Text Available Vehicular ad hoc networks (VANETs leverage the communication system of Intelligent Transportation Systems (ITS. Recently, Delay-Tolerant Network (DTN routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation.

  6. A Bayesian approach to optimizing cryopreservation protocols

    Directory of Open Access Journals (Sweden)

    Sammy Sambu

    2015-06-01

    Full Text Available Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors as preliminary meta-data, a decision tree learning analysis (DTLA was performed to develop an understanding of target survival using optimized pruning methods based on different approaches. Briefly, a clear direction on the decision process for selection of methods was developed with key choices being the cooling rate, plunge temperature on the one hand and biomaterial choice, use of composites (sugars and proteins as additional constituents, loading procedure and cell location in 3D scaffolding on the other. Secondly, using machine learning and generalized approaches via the Naïve Bayes Classification (NBC method, these metadata were used to develop posterior probabilities for combinatorial approaches that were implicitly recorded in the metadata. These latter results showed that newer protocol choices developed using probability elicitation techniques can unearth improved protocols consistent with multiple unidimensionally-optimized physical protocols. In conclusion, this article proposes the use of DTLA models and subsequently NBC for the improvement of modern cryopreservation techniques through an integrative approach.

  7. SECURED ELECTRONIC VOTING PROTOCOL USING HYBRID CRYPTOSYSTEM

    Directory of Open Access Journals (Sweden)

    KALAICHELVI V

    2013-04-01

    Full Text Available Electronic Voting play a really vital role in the democracy of our life. In this paper, we propose an electronic voting protocol. Our scheme does not require a special voting channel and communication can occur entirely over the current Internet. This method integrates the Internet convenience and cryptology. In the existing protocol the Tallier has to wait until the decryption key is received from the voter. So it will consume lot of time. But, the proposed protocol is based on the hybrid cryptosystem. In this, the ballot is encrypted using faster secret key algorithm and the digital envelope is encrypted using Tallier’s public key. So, the Tallier will decrypt the digital envelope using his own private key to get the secret key and then the encrypted ballot is decrypted using that secret key. So, comparatively the proposed protocol consumes less time. This paper also analyzes the various security issues involved in an electronic voting like security, privacy, authentication, anonymous, uniqueness, accuracy, fairness, efficiency and uncoercibility.

  8. Reliable multicasting in the Xpress Transport Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Atwood, J.W. [Concordia Univ., Montreal, PQ (Canada); Catrina, O. [Polytehnica Univ., Bucharest (Romania); Fenton, J. [Mentat, Inc., Los Angeles, CA (United States); Strayer, W.T. [Sandia National Labs., Livermore, CA (United States)

    1996-12-01

    The Xpress Transport Protocol (XTP) is designed to meet the needs of distributed, real-time, and multimedia systems. This paper describes the genesis of recent improvements to XTP that provide mechanisms for reliable management of multicast groups, and gives details of the mechanisms used.

  9. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  10. The Kyoto protocol in a global perspective

    Directory of Open Access Journals (Sweden)

    Tjaša Redek

    2009-11-01

    Full Text Available The global climate has changed notably since the beginning of the Industrial Revolution. Atmospheric concentrations of greenhouse gasses (GHG have increased dramatically followed by an increase in global average temperature. In order to avoid negative potential outcomes of global warming, countries have adopted the United Nations Framework Convention on Climate Change that has so far been ratified by 192 countries. In 1997 the Kyoto Protocol, a binding GHG reduction plan, was adopted and entered into force in 2005. But several countries, including the USA, have had doubts about the potential negative consequences of the planned 5% global joint reduction of GHG. However, studies generally show that on a macroeconomic level: (1 welfare loss in terms of GDP and lost growth in EU is low; (2 it differs among economies; and (3 permit trading and permit price (in either global or regional markets is highly correlated with the welfare loss. The main objective of the paper is to describe the attitudes and responses to the Kyoto Protocol from a global perspective. The paper has three objectives. First, to provide an overview of global greenhouse gas emissions and the big drivers behind these emissions. Second, to present where different countries, both developed and less developed countries, such as India, China and the countries of South-east Europe currently stand as regards their efforts to achieve the Kyoto Protocol requirements. Third, to analyse the responses and attitudes to the Kyoto Protocol from a country development perspective.

  11. Protocols for communication and governance of risks

    NARCIS (Netherlands)

    Vrouwenvelder, A.C.W.M.; Lind, N.C.; Faber, M.H.

    2015-01-01

    The aim of this paper is to explain the need to organize the development of standard protocols for communication about major public risks. Tragic events, such as inadequate earthquake preparedness or great unnecessary losses of life due to public misunderstandings underline the importance of such pr

  12. Quantum Dot Solar Cell Fabrication Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Chernomordik, Boris D.; Marshall, Ashley R.; Pach, Gregory F.; Luther, Joseph M.; Beard, Matthew C.

    2017-01-10

    Colloidally synthesized quantum-confined semiconducting spherical nanocrystals, often referred to as quantum dots (QDs), offer a high degree of chemical, optical, and electronic tunability. As a result, there is an increasing interest in employing colloidal QDs for electronic and optical applications that is reflected in a growing number of publications. In this protocol we provide detailed procedures for the fabrication of QD solar cells specifically employing PbSe and PbS QDs. We include details that are learned through experience, beyond those in typical methodology sections, and include example pictures and videos to aid in fabricating QD solar cells. Although successful solar cell fabrication is ultimately learned through experience, this protocol is intended to accelerate that process. The protocol developed here is intended to be a general starting point for developing PbS and PbSe QD test bed solar cells. We include steps for forming conductive QD films via dip coating as well as spin coating. Finally, we provide protocols that detail the synthesis of PbS and PbSe QDs through a unique cation exchange reaction and discuss how different QD synthetic routes could impact the resulting solar cell performance.

  13. 21 CFR 58.120 - Protocol.

    Science.gov (United States)

    2010-04-01

    ... FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GOOD LABORATORY PRACTICE... for acceptable levels of contaminants that are reasonably expected to be present in the dietary... methods to be used. (b) All changes in or revisions of an approved protocol and the reasons...

  14. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.;

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near...

  15. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  16. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  17. Adenosine stress protocols for myocardial perfusion imaging

    Directory of Open Access Journals (Sweden)

    Baškot Branislav

    2008-01-01

    Full Text Available Background/Aim. Treadmill test combined with myocardial perfusion scintigraphy (MPS is a commonly used technique in the assessment of coronary artery disease. There are many patients, however, who may not be able to undergo treadmill test. Such patients would benefit from pharmacological stress procedures combined with MPS. The most commonly used pharmacological agents for cardiac stress are coronary vasodilatators (adenosine, dipyridamol and catecholamines. Concomitant low-level treadmill exercise with adenosine pharmacologic stress (AdenoEX during MPS has become commonly used in recent years. A number of studies have demonstrated a beneficial impact of AdenoEX protocol. The aim of the study was, besides introducing into practice the two types of protocols of pharmatological stress test with adenosine, as a preparation for MPS, to compare and monitor the frequency of their side effects to quality, acquisition, as well as to standardize the onset time of acquisition (diagnostic imaging for both protocols. Methods. A total of 130 patients underwent pharmacological stress test with adenosine (vasodilatator. In 108 of the patients we performed concomitant exercise (AdenoEX of low level (50W by a bicycle ergometar. In 28 of the patients we performed Adenosine abbreviated protocol (AdenoSCAN. Side effects of adenosine were followed and compared between the two kinds of protocols AdenoEX and AdenoSCAN. Also compared were image quality and suggested time of acquisition after the stress test. Results. Numerous side effects were found, but being short-lived they did not require any active interventions. The benefit of AdenoEX versus AdenoSCAN included decreased side effects (62% vs 87%, improved safety and patients tolerance, improved target-to-background ratios because of less subdiaphragmatic activity, earlier acquisition, and improved sensitivity. Conclusion. The safety and efficacy of adenosine pharmacological stress is even better with concomitant

  18. Protocol for determining bull trout presence

    Science.gov (United States)

    Peterson, James; Dunham, Jason B.; Howell, Philip; Thurow, Russell; Bonar, Scott

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected. Current data were considered inadequate to precisely identify suitable habitat but could be useful in stratifying sampling units for presence/absence surveys. The presence/absence protocol builds on previous approaches (Hillman and Platts 1993; Bonar et al. 1997), except it uses the variation in observed bull trout densities instead of a minimum threshold density and adjusts for measured differences in sampling efficiency due to gear types and habitat characteristics. The protocol consists of: 1. recommended sample sizes with 80% and 95% detection probabilities for juvenile and resident adult bull trout for day and night snorkeling and electrofishing adjusted for varying habitat characteristics for 50m and 100m sampling units, 2. sampling design considerations, including possible habitat characteristics for stratification, 3. habitat variables to be measured in the sampling units, and 3. guidelines for training sampling crews. Criteria for habitat strata consist of coarse, watershed-scale characteristics (e.g., mean annual air temperature) and fine-scale, reach and habitat-specific features (e.g., water temperature, channel width). The protocols will be revised in the future using data from ongoing presence/absence surveys, additional research on sampling efficiencies, and development of models of habitat/species occurrence.

  19. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  20. A kind of universal quantum secret sharing protocol.

    Science.gov (United States)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  1. A kind of universal quantum secret sharing protocol

    Science.gov (United States)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  2. The Research and Application Design of SDL Protocol

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Aiming at overcoming the disadvantages in the Simple Data Link(SDL) protocol, we study and modify the protocol mechanism, which enhances the flexibility in carrying the packets of various network layer protocols and improves the ability to correct errors. We research the error check and error correction of CRC and the application of MPLS labels in the SDL protocol. Furthermore, we provide a method of CRC correction and application of MPLS labels in the SDL protocol. Finally, we present a scheme of realizing the SDL protocol.

  3. Energy-efficient MAC protocols for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Li De-liang; Peng Fei

    2009-01-01

    Designing energy-efficient Medium Access Control (MAC) protocols has a significant influence on the energy performance of wireless sensor network (WSN). In this paper we present a survey of the recent typical MAC protocols regarding energy efficiency for WSN. According to channel access policies, we classify these protocols into four categories: contention-based, TDMA-based, hybrid, and cross layer protocols, in which the advantages and disadvantages in each class of MAC protocols are discussed. Finally, we point out open research issues that need to carry on to achieve high energy efficiency for the design of MAC protocols in WSN.

  4. The Comparative Study of Entropy and Bispectral Indexes on Monitoring the Depth of Anaesthesia for the Elderly Patients%脑电双频指数和熵指数监测老年患者麻醉深度的比较

    Institute of Scientific and Technical Information of China (English)

    于帅; 林财珠

    2015-01-01

    目的:研究脑电双频指数和熵指数在老年患者硬膜外复合丙泊酚靶控静脉全麻中麻醉深度监测的可行性、准确性,并比较其优越性。方法选取择期行根治性全胃切除术的老年胃癌患者40例,均采用硬膜外复合丙泊酚靶控输注静脉全麻的麻醉方法,记录不同时间节点患者的心率(HR)、平均动脉压(MAP)、脑电双频指数(BIS)、反应熵(RE)、状态熵(SE)及停药后苏醒时间、拔管时间、手术时间、丙泊酚总用量、术中知晓的发生与否。结果应用阶梯式靶控输注丙泊酚诱导、术中维持及停药后BIS和RE、SE均随着意识变化而变化,2组之间差别无统计学意义。结论老年患者上腹部手术中施行硬膜外复合丙泊酚靶控输注静脉全麻时,BIS和RE、SE均可准确反映其麻醉深度。%Objective To compare the differences between entropy and bispectral indexes on mo‐nitoring the depth of anaesthesia for the elderly patients during the target‐controlled infusion (TCI) of propofol general anesthesia . Methods Fourty elderly patients undergoing elective abdominal surgery were studied . Anaesthesia was induced with epidural anesthesia combined with the target‐controlled infu‐sion (TCI) of propofol general anesthesia . Recording HR ,MAP ,BIS ,RE ,SE at different time ,also the emergence time and extubation time after discontinuation ,total operating time ,total dose of propofol ,and occurrence of the perioperative awareness . Results When applying ladder‐type target‐controlled infusion of propofol ,BIS and RE ,SE all changed with the conscious during induction ,maintenance and discontinua‐tion of propofol . There was no statistic difference between two groups . Conclusion In elderly patients with upper abdominal surgery in the implementation of epidural composite propofol target‐controlled infu‐sion w hen general anesthesia ,BIS and RE ,SE may reflect the depth of

  5. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  6. A study of bispectral index monitoring in assessing the depth of sedation of patients under mechanical ventilation%脑电双频指数监测对机械通气患者镇静深度评估的研究

    Institute of Scientific and Technical Information of China (English)

    李孝锦; 康焰; 张川

    2009-01-01

    Objective To investigate the correlation between subjective scoring and bispectral index (BIS) monitoring, and to study the feasibility of BIS monitor in assessing the depth of sedation for mechanically ventilated patients. Methods A prospective randomized controlled trial was conducted. The sedation target was sedation-agitation scale (SAS) 3 - 4. A total of 83 patients in the intensive care unit were assigned to receive the sedation based on BIS monitor (42 eaese) or the sedation based on subjective scale SAS (41 eases). The parameters of respiration, circulation, and the depth of sedation (BIS, SAS, Ramsay) were recorded. The difference between the two groups was compared. The correlation index and significance were calculated. Results A total of 83 patients of two groups reached the sedation target. Statistically significant difference was found between two groups in respiratory rate, fraction of inspiratory oxygen, and pulse saturation of oxygen before and after sedation (all P0.05).所有患者镇静后呼吸频率、吸入氧浓度较镇静前显著下降,脉搏血氧饱和度显著升高,差异均有统计学意义(P均<0.05);BIS值与主观评分间相关性良好,其中BIS与SAS评分呈显著正相关(r=0.626,P<0.05),与Ramsay评分呈显著负相关(r=-0.650,P<0.05),SAS与Ramsay评分呈显著负相关(r=0.908,P<0.05).结论 用BIS监测评估机械通气患者镇静深度简单方便、同步有效,是评价ICU机械通气患者镇静深度的良好客观指标.

  7. Staining protocol for organotypic hippocampal slice cultures.

    Science.gov (United States)

    Gogolla, Nadine; Galimberti, Ivan; DePaola, Vincenzo; Caroni, Pico

    2006-01-01

    This protocol details a method to immunostain organotypic slice cultures from mouse hippocampus. The cultures are based on the interface method, which does not require special equipment, is easy to execute and yields slice cultures that can be imaged repeatedly, from the time of isolation at postnatal day 6-9 up to 6 months in vitro. The preserved tissue architecture facilitates the analysis of defined hippocampal synapses, cells and entire projections. Time-lapse imaging is based on transgenes expressed in the mice or on constructs introduced through transfection or viral vectors; it can reveal processes that develop over periods ranging from seconds to months. Subsequent to imaging, the slices can be processed for immunocytochemistry to collect further information about the imaged structures. This protocol can be completed in 3 d.

  8. Internet Core Protocols Help for Network Administrators

    CERN Document Server

    Hall, Eric

    2000-01-01

    If you've ever been responsible for a network, you know that sinkingfeeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work. When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protoc

  9. Integrated Routing Protocol for Opportunistic Networks

    CERN Document Server

    Verma, Anshul

    2012-01-01

    In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information is not always available. When users are very isolated, context information cannot be distributed, and cannot be used for taking efficient routing decisions. In such cases, context oblivious based schemes are only way to enable communication between users. As soon as users become more social, context data spreads in the network, and context based routing becomes an efficient solution. In this paper we design an integrated routing protocol that is able to use context data as soon as it becomes available and falls back to dissemination based routing when context information is not available. Then, we provide a comparison between Epidemic and PROPHET, these are representative of context oblivious and co...

  10. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  11. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  12. CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    SANJUKTA PAL

    2013-02-01

    Full Text Available In modern age, security is the most challenging issue for using the secure data used by computer. This cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric authentication. Here the same idea of cryptography is working (i.e. using key, conversion of plain textinto cipher text called encryption and the reverse, means cipher text to plain text called decryption. Here the most promising method fingerprint geometry of biometric authentication is used as the key for encryption and decryption. Here this cryptographic protocol is just an algorithm for matching the key means matching of stored fingerprint images say DB Images with further given fingerprint image say Final Image. For matching purpose we used binary conversion of images. This algorithm is suitable for any type of data (means text data, multimedia data etc.

  13. Efficient Protocols for Distributed Classification and Optimization

    CERN Document Server

    Daume, Hal; Saha, Avishek; Venkatasubramanian, Suresh

    2012-01-01

    In distributed learning, the goal is to perform a learning task over data distributed across multiple nodes with minimal (expensive) communication. Prior work (Daume III et al., 2012) proposes a general model that bounds the communication required for learning classifiers while allowing for $\\eps$ training error on linearly separable data adversarially distributed across nodes. In this work, we develop key improvements and extensions to this basic model. Our first result is a two-party multiplicative-weight-update based protocol that uses $O(d^2 \\log{1/\\eps})$ words of communication to classify distributed data in arbitrary dimension $d$, $\\eps$-optimally. This readily extends to classification over $k$ nodes with $O(kd^2 \\log{1/\\eps})$ words of communication. Our proposed protocol is simple to implement and is considerably more efficient than baselines compared, as demonstrated by our empirical results. In addition, we illustrate general algorithm design paradigms for doing efficient learning over distribute...

  14. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... construction based on root extracting. As an example of this, we modify Cramer-Shoup signature scheme such that it becomes a genericm algorithm. We discuss then implementing it in RSA groups without the original restriction that the modulus must be a product of safe primes. It can also be implemented in class......,  providing a currently acceptable level of security. This allows us to propose the rst practical blind signature scheme provably secure, without relying on heuristics called random oracle model (ROM). We obtain the protocol for issuing blind signatures by implementing our modi ed Fischlin's signing algorithm...

  15. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means...... are "statistically significant" or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find...

  16. Fairness in Physical Products Delivery Protocol

    Directory of Open Access Journals (Sweden)

    Abdullah Mohammed Alaraj

    2012-12-01

    Full Text Available In an e-commerce transaction, a buyer purchases a physical product, such as a laptop, from an onlineseller. In an attempt to protect himself, any seller would prefer to collect payment from the buyer beforehe sends the product. Likewise, the buyer would prefer to have the product shipped to him before hemakes a payment to the seller. Both parties have a need to take precautions to minimize their risk in casethe other party proves to be untrustworthy. This paper proposes a new e-commerce fair exchangeprotocol based on verifiable and recoverable encryption of keys. The proposed protocol is based onoffline TTP. Only seven messages are exchanged between the parties involved in the protocol. Disputesare resolved electronically in case one party evades

  17. Bell Inequalities, Experimental Protocols and Contextuality

    CERN Document Server

    Kupczynski, Marian

    2014-01-01

    The violation of Bell, CHSH and CH inequalities indicates only that the assumption of "conterfactual definiteness" and/or the probabilistic models used in proofs were incorrect. In this paper we discuss in detail an intimate relation between experimental protocols and probabilistic models. In particular we show that local realistic and stochastic hidden variable models are inconsistent with the experimental protocols used in spin polarization correlation experiments. In particular these models neglect a contextual character of quantum theory (QT) and do not describe properly quantum measurements. We argue that the violation of various inequalities gives arguments against the irreducible randomness of act of the measurement. Therefore quantum probabilities are reducible what means that QT is emergent. In this case one could expect to discover in time series of data some unpredicted fine structures proving that QT is not predictably complete what would be a major discovery.

  18. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  19. COMPUTATIONALLY EFFICIENT PRIVATE INFORMATION RETRIEVAL PROTOCOL

    Directory of Open Access Journals (Sweden)

    A. V. Afanasyeva

    2016-03-01

    Full Text Available This paper describes a new computationally efficient private information retrieval protocol for one q-ary symbol retrieving. The main advantage of the proposed solution lies in a low computational complexity of information extraction procedure, as well as the constructive simplicity and flexibility in choosing the system parameters. Such results are based on cosets properties. The proposed protocol has communication complexity slightly worse than the best schemes at the moment, which is based on locally decodable codes, but it can be easily built for any parameters of the system, as opposed to codes. In comparison with similar solutions based on polynomials, the proposed method gains in computational complexity, which is important especially for servers which must service multiple requests from multiple users.

  20. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    .e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful......Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i...... considerations on the available resources, especially in meeting real-time and resource constraints, as well as cost and reliability requirements. For this reason many proposed security protocols in this domain have peculiar features, not present in traditional security literature. In this thesis we tackle...

  1. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... are "statistically significant" or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find...... to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means...

  2. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  3. Stabilizing token schemes for population protocols

    CERN Document Server

    Canepa, Davide

    2008-01-01

    In this paper we address the stabilizing token circulation and leader election problems in population protocols model augmented with oracles. Population protocols is a recent model of computation that captures the interactions of biological systems. In this model emergent global behavior is observed while anonymous finite-state agents(nodes) perform local peer interactions. Uniform self-stabilizing leader election or token circulation are impossible in such systems without additional assumptions. Therefore, the classical model has been augmented with the eventual leader detector, $\\Omega?$, that eventually detects the presence or the absence of a leader. In this work we propose some impossibility results related to self-stabilizing implementation of leader election and token circulation in this model. Then we propose deterministic and probabilistic self-stabilizing solutions for token circulation and leader election for various topologies (chains, trees and arbitrary networks). Additionally, we prove the nece...

  4. Instability Free Routing: Beyond One Protocol Instance

    Science.gov (United States)

    2008-12-01

    assigned a Rout- ing Information Base (RIB) [13]. This database is used to store the routing information related to the routing process (e.g., routes...presents routing anomalies that can derive from route selection by itself, i.e., without any route redis - tribution configured between the routing... redis - tributed into the RIP protocol, all RIP messages received from the neighbors are in fact discarded independently of the AD values. This

  5. Building America House Simulation Protocols (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  6. A CONTRIBUTION TO SECURE THE ROUTING PROTOCOL

    Directory of Open Access Journals (Sweden)

    Mohammed ERRITALI

    2011-10-01

    Full Text Available This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter StatelessRouting for vehicular ad hoc networks, we examine the possible attacks against GPSR and securitysolutions proposed by different research teams working on ad hoc network security. Then, we propose asolution to secure GPSR packet by adding a digital signature based on symmetric cryptographygenerated using the AES algorithm and the MD5 hash function more suited to a mobile environment

  7. Acupuncture for osteoporosis: a systematic review protocol

    OpenAIRE

    Guo, Taipin; Chen, Xiao; Wu, Xiangnong; Shan, Exian; Jin, Yaju; Tai, Xiantao; Liu, Zili; Zhu, Bowen; Yuan, Kai; Chen, Zukun

    2016-01-01

    Background Osteoporosis is a global high prevalence of chronic metabolic disease with serious disability-adjusted life years losing. Acupuncture is used to treat osteoporosis broadly in China and other countries although the evidence on effectiveness cannot give a certain answer. The aim of this systematic review protocol is to appraise the efficacy and safety of acupuncture for osteoporosis. Methods A literature search of randomized controlled trials focusing on acupuncture for osteoporosis ...

  8. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  9. The EXACT description of biomedical protocols

    OpenAIRE

    Soldatova, L.N.,Aubrey, W., King, R.D. & and Clare, A.

    2008-01-01

    © 2008 The Author(s). This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/2.0/uk/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. Motivation: Many published manuscripts contain experiment protocols which are poorly described or deficient in information. This means that the published results a...

  10. Dynamic Characteristics of Explicit Control Protocol

    Institute of Scientific and Technical Information of China (English)

    CHENG Shuang-mei; LI Jian-hua; GUO Chuan-xiong

    2008-01-01

    The dynamic characteristics of eplicit control protocol (XCP) were investigated with single bottle-neck on the microscopic time-scale. Analysis and simulation results show that the bandwidth utilization of an XCP bottleneck link converges to 1 at exponential rate, persistent congestion cannot occur at the bottleneck link, and throughput of an arbitrary subset of XCP flows at the bottleneck link converges to its fair share in exponential rate. The XCP has high bandwidth utilization and good fairness properties.

  11. Typed Multiset Rewriting Specifications of Security Protocols

    Science.gov (United States)

    2011-10-01

    Cape Breton , NS, Canada, 24–26 June 2002. IEEE Computer Society Press. [12] Frederic Butler, Iliano Cervesato, Aaron D. Jaggard, and Andre Scedrov... andR an active role set. Let moreover ΣDY and PDY be the signature and protocol theory for the Dolev-Yao intruder. 1. If ` Σ, then ` Σ,ΣDY ; 2. If Σ...Computer Society Press. [4] Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, and Joe-Kai Tsay. Cryptographically Sound Security

  12. Insights From Verbal Protocols: A Case Study

    OpenAIRE

    Margaret Kumar

    2012-01-01

    This study explores a postgraduate student writer’s responses and reactions through verbal protocols as she attends to teacher feedback. Teacher feedback has been heralded as an important element in process writing. Numerous studies have been carried out on various aspects of teacher feedback such as on the effectiveness of feedback, students’ preferences for teacher feedback and students’ perceptions of feedback. However, there is still a gap in the literature in determining how students res...

  13. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  14. A dual-consistency cache coherence protocol

    OpenAIRE

    Ros, Alberto; Jimborean, Alexandra

    2015-01-01

    Weak memory consistency models can maximize system performance by enabling hardware and compiler optimizations, but increase programming complexity since they do not match programmers’ intuition. The design of an efficient system with an intuitive memory model is an open challenge. This paper proposes SPEL, a dual-consistency cache coherence protocol which simultaneously guarantees the strongest memory consistency model provided by the hardware and yields improvements in both performance and ...

  15. Protocol for Initial Purification of Bacteriocin

    Science.gov (United States)

    2015-10-01

    The new NSRDEC protocol includes filtering the lysate/ filtrate through filters with a 30,000 molecular weight cut-off (MWCO), 10,000 MWCO, and 1,000... Resistant bacteria strains survive. Over a period of repeated use, the resistant strains become the prevalent species, making the antimicrobial...lysate/ filtrate through filters with a 30,000 molecular weight cut-off (MWCO), 10,000 MWCO, and 1,000 MWCO pore size to remove unwanted protein/debris

  16. QAODV: Improved Security Routing Protocol of AODV

    OpenAIRE

    Ruihui Mu; Wuqiang Zhang

    2013-01-01

    Network control system (NCS) has higher requirements on QoS index of the network, but MANET can hardly meet the demands of control systems because of its own characteristics. The paper improves AODV and proposes AODV routing protocol QAODV with certain QoS security in combination with NCS and MANET, and expounds routing detection, routing register and routing maintenance. Simulation results show that end-to-end delay and packet loss of QAODV reduces evidently compared with AODV, and the proto...

  17. The regensburg protocol for spinal metastases

    Directory of Open Access Journals (Sweden)

    José Manuel Pérez Atanasio

    2013-12-01

    Full Text Available Metastases to the vertebrae are a common problem in the practice of a spine surgeon. Therapeutic intervention can alleviate pain, preserve or improve neurologic function, achieve mechanical stability, optimize local tumor control, and improve quality of life. Treatment options available for metastatic spine tumors include radiation therapy, chemotherapy and surgery. This article is focused on the decision making for spine surgeons and shows the protocol to treat spinal metastases at the University Hospital of Regensburg, Germany.

  18. Protocol for emergency EPR dosimetry in fingernails

    OpenAIRE

    Trompier, F; Kornak, L.; Calas, C.; Romanyukha, A.; LeBlanc, B.; Mitchell, C. A.; Swartz, H M; Clairand, I.

    2007-01-01

    There is an increased need for after-the-fact dosimetry because of the high risk of radiation exposures due to terrorism or accidents. In case of such an event, a method is needed to make measurements of dose in a large number of individuals rapidly and with sufficient accuracy to facilitate effective medical triage. Dosimetry based on EPR measurements of fingernails potentially could be an effective tool for this purpose. This paper presents the first operational protocols for EPR fingernail...

  19. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    Energy Technology Data Exchange (ETDEWEB)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  20. The CERN Control Protocol for power converters

    Energy Technology Data Exchange (ETDEWEB)

    Barnett, I.; Benincasa, G.; Berrig, O.; Brun, R.; Burla, P.; Coudert, G.; Pett, J.G.; Pittin, R.; Royer, J.P.; Trofimov, N. (CERN, Geneva (Switzerland))

    1993-08-01

    The Control Protocols provide, for a class of similar devices, a unique and standard access procedure from the control system. Behavioral models have been proposed for the different kinds of Power Converters and the corresponding functionalities, with their parameters, variables and attributes have been identified. The resulting data structures have been presented using the ISO ASN.1 metalanguage, that permits universal representation independent of any computer environment. Implementations in the UNIX-based CERN accelerator control systems are under development.

  1. Application Protocol Design for Collaborative Learning

    Directory of Open Access Journals (Sweden)

    Joung-Souk Sung

    2009-12-01

    Full Text Available This presentation will describe the effort to construct an effective educational support environment and to develop meaningful educational applications, This system is a framework supporting interactive collaboration which enables both teachers and students to interact in real-time from remote sites. The purpose of this collaboration is to bring interactive multimedia learning in real-time. In order to induce collaborative learning, this paperproposes protocol design process that shares knowledge awareness information for learning environments. The protocol helps learner to mediate and recognize collaborators in the shared knowledge space. We are developing an open-ended collaborative learning supportsystem, which is called prototype system for protocol design, and facilities to share individual knowledge and to learn through collaboration. This system architecture can be viewed asdivided in four logical parts: the infrastructure, the service functions, the advanced service functions and the application. The session management is creates/destroys the sessions and performs the functions controlling the QOS by detaching the network load. Session manager include: session control, floor control, media instance control, packet interpreter, event interpreter, media server instance, media interface, network interface private applicationinterface and media server control.

  2. Analyzing Interoperability of Protocols Using Model Checking

    Institute of Scientific and Technical Information of China (English)

    WUPeng

    2005-01-01

    In practical terms, protocol interoperability testing is still laborious and error-prone with little effect, even for those products that have passed conformance testing. Deadlock and unsymmetrical data communication are familiar in interoperability testing, and it is always very hard to trace their causes. The previous work has not provided a coherent way to analyze why the interoperability was broken among protocol implementations under test. In this paper, an alternative approach is presented to analyzing these problems from a viewpoint of implementation structures. Sequential and concurrent structures are both representative implementation structures, especially in event-driven development model. Our research mainly discusses the influence of sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical data communication. Therefore, implementation structures carry weight on interoperability, which may not gain much attention before. To some extent, they are decisive on the result of interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy may contribute to the interoperability of a protocol implementation. Herein model checking technique is introduced into interoperability analysis for the first time. As the paper shows, it is an effective way to validate developers' selections on implementation structures or strategies.

  3. Heterogeneous LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nishi Sharma

    2013-07-01

    Full Text Available Wireless Sensor Networks are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities. Nodes sense and send their reports toward a processing center which is called base station. Since this transmission and reception process consumes lots of energy as compare to data processing, Designing protocols and applications for such networks has to be energy aware in order to prolong the lifetime of the network. Generally, real life applications deal with such Heterogeneity rather than Homogeneity. In this paper, a protocol is proposed, which is heterogeneous in energy. We analyze the basic distributed clustering routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy, which is a homogeneous system, and then we study the impact of heterogeneity in energy of nodes to prolong the life time of WSN. Simulation results using MATLAB shows that the proposed Leach-heterogeneous system significantly reduces energy consumption and increase the total lifetime of the wireless sensor network.

  4. Voice over Internet Protocol (VOIP: Future Potential

    Directory of Open Access Journals (Sweden)

    Ms. Deepti

    2014-11-01

    Full Text Available VoIP (voice over IP delivers standard voice over telephone services over Internet Protocol (IP. VoIP is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP (internet protocol network where it is reassembled, decompressed, and converted back into an analog wave form. Gateways are the key component required to facilitate IP Telephony. A gateway is used to bridge the traditional circuit switched PSTN with the packet switched Internet. The paper covers software, hardware and protocol requirements followed by weighing the VoIP advantages such as low cost, portability, free and advanced features, bandwidth efficiency, call recording and monitoring against the VoIP disadvantages such as power dependency, quality of voice and service, security, and reliability. With ever increasing internet penetration and better broadband connectivity, VoIP is going to expand further with businesses already using VoIP standalone or in a hybrid format, although our focus and scope here remains VoIP. Mobile VoIP, an infant with less than 4% market share, has so far been focusing on increasing active subscriptions without a sustainable revenue model, but has the potential and is going to see tussle with static VoIP for space in days ahead.

  5. VOICE OVER INTERNET PROTOCOL (VOIP: FUTURE POTENTIAL

    Directory of Open Access Journals (Sweden)

    Deepti Kumari

    2015-10-01

    Full Text Available VoIP (voice over IP delivers standard voice over telephone services over Internet Protocol (IP. VoIP is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP (internet protocol network where it is reassembled, decompressed, and converted back into an analog wave form. Gateways are the key component required to facilitate IP Telephony. A gateway is used to bridge the traditional circuit switched PSTN with the packet switched Internet. The paper covers software, hardware and protocol requirements followed by weighing the VoIP advantages such as low cost, portability, free and advanced features, bandwidth efficiency, call recording and monitoring against the VoIP disadvantages such as power dependency, quality of voice and service, security, and reliability. With ever increasing internet penetration and better broadband connectivity, VoIP is going to expand further with businesses already using VoIP standalone or in a hybrid format, although our focus and scope here remains VoIP. Mobile VoIP, an infant with less than 4% market share, has so far been focusing on increasing active subscriptions without a sustainable revenue model, but has the potential and is going to see tussle with static VoIP for space in days ahead.

  6. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  7. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  8. Comparison of CSMA based MAC protocols of wireless sensor networks

    CERN Document Server

    singh, Himanshu

    2012-01-01

    Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly focused on the classification of MAC protocols according to the techniques being used or problem dealt with and presented a theoretical evaluation of protocols. This paper presents the comparative study of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and supports the arguments with the simulation results. The comparative study can be used to find the best suited MAC protocol for wireless sensor networks in different environments.

  9. Yoga-teaching protocol adapted for children with visual impairment

    Directory of Open Access Journals (Sweden)

    Soubhagyalaxmi Mohanty

    2016-01-01

    Conclusions: Specially designed protocol may pave the way to impart yoga in an exciting and comfortable way to children with VI. More studies are needed to further investigate the effectiveness of this new yoga protocol in similar settings.

  10. Passive Cryptanalysis of Unconditionally Secure Authentication Protocol for RFID Systems

    CERN Document Server

    Abyaneh, Mohammad Reza Sohizadeh

    2010-01-01

    Recently, Alomair et al. proposed the first UnConditionally Secure mutual authentication protocol for low-cost RFID systems(UCS-RFID). The security of the UCS-RFID relies on five dynamic secret keys which are updated at every protocol run using a fresh random number (nonce) secretly transmitted from a reader to tags. Our results show that, at the highest security level of the protocol (security parameter= 512), inferring a nonce is feasible with the probability of 0.99 by eavesdropping(observing) about 90 runs of the protocol. Finding a nonce enable a passive attacker to recover all five secret keys of the protocol. To do so, we propose a three-phase probabilistic approach in this paper. Our attack recovers the secret keys with a probability that increases by accessing to more protocol runs. We also show that tracing a tag using this protocol is also possible even with less runs of the protocol.

  11. Analysis of a key-establishment security protocol

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2008-05-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and non-repudiation. This paper is concerned with attacks against security protocols. Security protocols are introduced and the most common attacks against security protocols are discussed. The Wide-Mouthed Frog key-establishemnt protocol of Burrows, Abadi and Needham is presented. Attacks which exploit known weaknesses in the protocol are discussed and a corrected version of the protocol by Lowe is presented. Analysis of the Lowe modified Wide-Mouthed Frog protocol in this paper reveals a new parallel session attack. The reasons for this attack and how it can be mounted are discussed.

  12. An Arbitrary 2D Structured Replica Control Protocol

    OpenAIRE

    Basmadjian, Robert; Meer, Hermann,

    2011-01-01

    Traditional replication protocols that logically arrange the replicas into a specific structure have reasonable availability, lower communication cost as well as system load than those that do not require any logical organisation of replicas. We propose in this paper the A2DS protocol: a single protocol that, unlike the existing proposed protocols, can be adapted to any 2D structure. Its read operation is carried out on any replica of every level of the structure whereas write operations are ...

  13. Performance Evaluation of the WSN Routing Protocols Scalability

    OpenAIRE

    2008-01-01

    Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs). A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network ...

  14. Performance Evaluation of the WSN Routing Protocols Scalability

    Directory of Open Access Journals (Sweden)

    L. Alazzawi

    2008-01-01

    Full Text Available Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs. A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network scalability.

  15. A Model Based Security Testing Method for Protocol Implementation

    Directory of Open Access Journals (Sweden)

    Yu Long Fu

    2014-01-01

    Full Text Available The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  16. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  17. Advanced transport protocols for space communications

    Science.gov (United States)

    Fang, Jian

    Satellite IP networks are characterized by high bit error rates, long propagation delays, low bandwidth feedback links, and persistent fades resulting from varying weather patterns. A new unicast transport protocol is designed to address all the above challenges. Two new algorithms, Jump Start and Quick Recovery, are presented to replace the traditional Slow Start algorithm and to recover rapidly from multiple segment losses within one window of data. The characteristics of satellite IP networks also distinguish satellite multicasting from multicasting in terrestrial wirelined networks. A reliable data multicast transport protocol, TCP-Peachtree, is proposed to solve the acknowledgment implosion and scalability problems in satellite IP networks. Developments in space technology are enabling the realization of deep space missions. The scientific data from these missions need to be delivered to the Earth successfully. To achieve this goal, the InterPlaNetary Internet is proposed as the Internet of the deep space planetary networks, which is characterized by extremely high propagation delays, high link errors, asymmetrical bandwidth, and blackouts. A reliable transport protocol, TP-Planet, is proposed for data traffic in the InterPlaNetary Internet. TP-Planet deploys rate-based additive-increase multiplicative-decrease (AIMD) congestion control and replaces the inefficient slow start algorithm with a novel Initial State algorithm that allows the capture of link resources in a very fast and controlled manner. A new congestion detection and control mechanism is developed and a Blackout State is incorporated into the protocol operation. Multimedia traffic is also one part of the aggregate traffic over InterPlaNetary Internet backbone links and it has additional requirements such as minimum bandwidth, smooth traffic, and error control. To address all the above challenges, RCP-Planet is proposed. RCP-Planet consists of two novel algorithms, i.e., Begin State and

  18. A correctness proof of the bakery protocol in $ mu $CRL

    NARCIS (Netherlands)

    Groote, J.F.; Korver, H.P.

    1994-01-01

    A specification of a bakery protocol is given in $mu$CRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for $mu$CRL. The proof primarily consists of algebraic manipulations based on specifications of abstr

  19. Protocol channels as a new design alternative of covert channels

    CERN Document Server

    Wendzel, Steffen

    2008-01-01

    Covert channel techniques are used by attackers to transfer hidden data. There are two main categories of covert channels: timing channels and storage channels. This paper introduces a third category called protocol channels. A protocol channel switches one of at least two protocols to send a bit combination to a destination while sent packets include no hidden information themselves.

  20. 21 CFR 814.19 - Product development protocol (PDP).

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  1. Assessment time of the Welfare Quality protocol for dairy cattle

    NARCIS (Netherlands)

    Vries, de M.; Engel, B.; Uijl, I.; Schaik, van G.; Dijkstra, T.; Boer, de I.J.M.; Bokkers, E.A.M.

    2013-01-01

    The Welfare Quality® (WQ) protocols are increasingly used for assessing welfare of farm animals. These protocols are time consuming (about one day per farm) and, therefore, costly. Our aim was to assess the scope for reduction of on-farm assessment time of the WQ protocol for dairy cattle. Seven tra

  2. The MAC framework: redefining MAC protocols for wireless sensor networks

    NARCIS (Netherlands)

    Parker, T.; Halkes, G.; Bezemer, M.; Langendoen, K.

    2010-01-01

    Most current WSN MAC protocol implementations have multiple tasks to perform—deciding on correct timing, sending of packets, sending of acknowledgements, etc. However, as much of this is common to all MAC protocols, there is duplication of functionality, which leads to larger MAC protocol code size

  3. Implementation of Siemens USS protocol into LabVIEW.

    Science.gov (United States)

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions.

  4. Caltech computer scientists develop FAST protocol to speed up Internet

    CERN Multimedia

    2003-01-01

    "Caltech computer scientists have developed a new data transfer protocol for the Internet fast enough to download a full-length DVD movie in less than five seconds. The protocol is called FAST, standing for Fast Active queue management Scalable Transmission Control Protocol" (1 page).

  5. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo;

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain ...

  6. ASYNCHRONOUS BYZANTINE AGREEMENT PROTOCOL BASED ON VERIFIABLE SIGNATURE SHARING

    Institute of Scientific and Technical Information of China (English)

    Ji Dongyao; Feng Dengguo

    2006-01-01

    An ([n / 3]- 1 )-resilient Asynchronous Byzantine Agreement Protocol (ABAP) that combines verifiable signature sharing and random secret sharing is proposed. The protocol works in the asynchronous network environment and produces Byzantine agreement within a fixed expected number of computational rounds. The correctness of the protocol is proved in theory.

  7. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  8. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane;

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature of the...

  9. Coping with threats of terrorism: a protocol for group intervention.

    Science.gov (United States)

    Ottenstein, Richard J

    2003-01-01

    This article presents a group protocol designed to assist people in coping with direct and ongoing threats of terrorism. The protocol is intended to enable participants to address the psychological issues necessary to cope during periods of extreme threat. A step-by-step description of the protocol is provided.

  10. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco;

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first...

  11. Going Online with Protocols: New Tools for Teaching and Learning

    Science.gov (United States)

    McDonald, Joseph P.; Zydney, Janet Mannheimer; Dichter, Alan; McDonald, Elizabeth C.

    2012-01-01

    Many users of the popular professional development book, "The Power of Protocols," discovered that protocols are also very useful for online teaching. This new book, by three of the same authors, focuses on using protocols to enhance learning with their students in multiple environments including online--a growing sector of the educational world.…

  12. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    Science.gov (United States)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  13. EXTENDED DYNAMIC SOURCE ROUTING PROTOCOL FOR AD HOC NETWORK

    Directory of Open Access Journals (Sweden)

    Puja Kumari Sharma

    2012-07-01

    Full Text Available MANET is a collection of self-configurable mobile nodes. Several routing protocols are proposed for ad hoc network among which DSR and AODV On demand routing protocols are mostly used. Existing Dynamic source routing protocol is not suitable for large network because packet size gets increased according to the number of nodes travelled by route discovery packet. In this paper, extended DSR routing protocol is proposed to eliminate the above limitation of existing DSR. Proposed protocol will be suitable for small and large both types of networks.

  14. Model Checking Data Consistency for Cache Coherence Protocols

    Institute of Scientific and Technical Information of China (English)

    Hong Pan; Hui-Min Lin; Yi Lv

    2006-01-01

    A method for automatic verification of cache coherence protocols is presented, in which cache coherence protocols are modeled as concurrent value-passing processes, and control and data consistency requirement are described as formulas in first-orderμ-calculus. A model checker is employed to check if the protocol under investigation satisfies the required properties. Using this method a data consistency error has been revealed in a well-known cache coherence protocol.The error has been corrected, and the revised protocol has been shown free from data consistency error for any data domain size, by appealing to data independence technique.

  15. A New Formal Method for Communication Protocol Specification

    Institute of Scientific and Technical Information of China (English)

    李腊元

    1989-01-01

    A new formal method for communication protocol specification is presented.FSM,CSP and ADT are mixed and the best features of these approaches can be offered in the fomal method.First,we briefly describe the formal techniques of communication protocol.We then put forward the hybrid method of protocol specification.Finally,an example,i.e.,IEEE 802.3 MAC protocol for LAN described by the proposed formal method,is given.The results of studies show that this hybrid formal method for protocol specification is a correct,unambiguous and complete approach.

  16. Performance Evaluation of Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Laiali Almazaydeh

    2010-04-01

    Full Text Available The efficiency of sensor networks strongly depends on the routing protocol used. In this paper, we analyze three different types of routing protocols: LEACH, PEGASIS, and VGA. Sensor networks aresimulated using Sensoria simulator. Several simulations are conducted to analyze the performance of these protocols including the power consumption and overall network performance. The simulationresults, using same limited sensing range value, show that PEGASIS outperforms all other protocols while LEACH has better performance than VGA. Furthermore, the paper investigates the powerconsumption for all protocols. On the average, VGA has the worst power consumption when the sensing range is limited, while VGA is the best when the sensing range is increased

  17. Efficient multiparty protocols via log-depth threshold formulae

    DEFF Research Database (Denmark)

    Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval;

    2013-01-01

    We put forward a new approach for the design of efficient multiparty protocols: Design a protocol π for a small number of parties (say, 3 or 4) which achieves security against a single corrupted party. Such protocols are typically easy to construct, as they may employ techniques that do not scale...... of efficient protocols for Secure Multiparty Computation (MPC) in the presence of an honest majority, as well as broadcast protocols from point-to-point channels and a 2-cast primitive. We obtain new results on MPC over blackbox groups and other algebraic structures. The above results rely on the following...

  18. Quantum Key Distribution Using Decoy State Protocol

    Directory of Open Access Journals (Sweden)

    Sellami Ali

    2009-01-01

    Full Text Available Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible for sophisticated eavesdroppers to launch various subtle eavesdropping attacks including the Photon Number Splitting (PNS attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secure key generation rate of Quantum Key Distribution (QKD. Approach: Objective of this study was experimental implementation of weak decoy + vacuum states QKD for increasing the performance of QKD system. To show conceptually how simple it was to apply the weak decoy + vacuum state idea to a commercial QKD system, we chosen ID-3000 commercial quantum key distribution system manufactured by id quantique. To implement the weak decoy + vacuum state protocol, we had to add some new optical and electronics components to id quantique and to attenuate each signal to the intensity of either signal state or weak decoy or vacuum state randomly. Results: In our implementation, the attenuation will be done by placing a VOA (variable optical attenuator in Alice’s side. Specifically, our QKD system required the polarizations of 2 pulses from the same signal to be orthogonal. Therefore the VOA must be polarization independent so as to attenuate the two pulses equally. The VOA utilized in experiment to attenuate signals dynamically was Intensity Modulator (IM. We had implemented weak + vacuum protocol on a modified commercial QKD system over a 25 km of telecom fibers with an unconditionally secure key rate of 6.2931x10-4 per pulse. Conclusion: By making simple modifications to a commercial quantum key distribution system, we could achieve much better performance with substantially higher key generation rate and longer distance than

  19. Algebra model and security analysis for cryptographic protocols

    Institute of Scientific and Technical Information of China (English)

    HUAI Jinpeng; LI Xianxian

    2004-01-01

    More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and analyze due to the complexity of the cryptographic protocol execution, and a large number of problems are unsolved that range from the theory framework to the concrete analysis technique. In this paper, we build a new algebra called cryptographic protocol algebra (CPA) for describing the message operations with many cryptographic primitives, and proposed a new algebra model for cryptographic protocols based on the CPA. In the model, expanding processes of the participant's knowledge on the protocol runs are characterized with some algebraic notions such as subalgebra, free generator and polynomial algebra, and attack processes are modeled with a new notion similar to that of the exact sequence used in homological algebra. Then we develope a mathematical approach to the cryptographic protocol security analysis. By using algebraic techniques, we have shown that for those cryptographic protocols with some symmetric properties, the execution space generated by an arbitrary number of participants may boil down to a smaller space generated by several honest participants and attackers. Furthermore we discuss the composability problem of cryptographic protocols and give a sufficient condition under which the protocol composed of two correct cryptographic protocols is still correct, and we finally offer a counterexample to show that the statement may not be true when the condition is not met.

  20. NLHB : A Non-Linear Hopper Blum Protocol

    CERN Document Server

    Madhavan, Mukundan; Sankarasubramaniam, Yogesh; Viswanathan, Kapali

    2010-01-01

    In this paper, we propose a light-weight provably-secure authentication protocol called the NLHB protocol, which is a variant of the HB protocol. The HB protocol uses the complexity of decoding linear codes for security against passive attacks. In contrast, security for the NLHB protocol is proved by reducing passive attacks to the problem of decoding a class of non-linear codes\\footnote that are provably hard. We demonstrate that the existing passive attacks on the HB protocol family, which have contributed to considerable reduction in its effective key-size, are ineffective against the NLHB protocol. From the evidence, we conclude that smaller-key sizes are sufficient for the NLHB protocol to achieve the same level of passive attack security as the HB Protocol. Further, for this choice of parameters, we provide an implementation instance for the NLHB protocol for which the Prover/Verifier complexity is lower than the HB protocol, enabling authentication on very low-cost devices like RFID tags. Finally, in t...

  1. Verification of Authentication Protocols for Epistemic Goals via SAT Compilation

    Institute of Scientific and Technical Information of China (English)

    Kai-Le Su; Qing-Liang Chen; Abdul Sattar; Wei-Ya Yue; Guan-Feng Lv; Xi-Zhong Zheng

    2006-01-01

    This paper introduces a new methodology that uses knowledge structures, a specific form of Kripke semantics for epistemic logic, to analyze communication protocols over hostile networks. The paper particularly focuses on automatic verification of authentication protocols. Our approach is based on the actual definitions of a protocol, not on some difficultto-establish justifications. The proposed methodology is different from many previous approaches to automatic verification of security protocols in that it is justification-oriented instead of falsification-oriented, i.e., finding bugs in a protocol. The main idea is based on observations: separating a principal executing a run of protocol from the role in the protocol, and inferring a principal's knowledge from the local observations of the principal. And we show analytically and empirically that this model can be easily reduced to Satisfiability (SAT) problem and efficiently implemented by a modern SAT solver.

  2. The Extended Clustering AD HOC Routing Protocol (ECRP

    Directory of Open Access Journals (Sweden)

    Buthayna Al-Sharaa

    2013-06-01

    Full Text Available Ad hoc networks are acollection of mobile nodes communicating via wireless channels without any fixedinfrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractiveapplications in different fields. The topology of ad hoc networks changes dynamically, and each node in thenetwork can act as a host or router.With the increase in the number of wirelessdevices andlarge amountof traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents ascalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc RoutingProtocol (ECRP. This is a hybrid protocol, which combines reactive and proactive approaches in routing.The protocol uses theGlobal PositioningSystem todetermine the position of certain nodesin the network.The evaluation methodology and simulation results obtained showthat the protocol is efficient and scaleswell in large networks

  3. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    CERN Document Server

    Yu, Hong

    2012-01-01

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  4. Lightweight Distance bound Protocol for Low Cost RFID Tags

    CERN Document Server

    Ahmed, Eslam Gamal; Hashem, Mohamed

    2010-01-01

    Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short authenticated messages. All the existing distance bounding protocols use random number generator and hash functions at the tag side which make them inapplicable at low cost RFID tags. This paper proposes a lightweight distance bound protocol for low cost RFID tags. The proposed protocol based on modified version of Gossamer mutual authentication protocol. The implementation of the proposed protocol meets the limited abilities of low-cost RFID tags.

  5. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  6. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  7. A Comparison of Performance between Macro-mobility Protocol and Micro-mobility Protocol

    Institute of Scientific and Technical Information of China (English)

    TANG Hong; NIE Neng; WU Zhong-fu; ZHAO Jun; LIAO Xiao-feng

    2003-01-01

    Mobile IP is the proposed standard for IP mobility support. When a Mobile Node (MN) is far away from home, registration at its home agent can cause a long handoff delay that leads to significant packet drop and throughput reduction. In order to improve standard mobile IP, the mobility of MN has been divided into micro-mobility and macro-mobility. Some micro-mobility management protocols have been developed. We compare the performance between standard mobile IP (RFC2002,RFC3220,RFC3344) and micro-mobility management protocols and give some equations along with the analysis of calculating results.

  8. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  9. Efficient Controlled Quantum Secure Direct Communication Protocols

    OpenAIRE

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Prasanta K. Panigrahi

    2015-01-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete...

  10. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.;

    2015-01-01

    trials. RT-QA of large multicentre-trials, however, requires substantial effort and resources. Recently, we presented a digital QA platform, the CIRRO dose plan bank, which allows for central review of such trials. Here, we present our RT-QA results from the latest completed clinical protocol from...... in CTV1 dose coverage were due to clinical considerations of the tolerance dose to the spinal cord, thus compromising target dose. Five of the major deviations in total treatment time were related to comorbidities, such as alcohol- or cardiac related matters and hospitalization. The remaining two cases...

  11. Satellite-Friendly Protocols and Standards

    Science.gov (United States)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The

  12. Comparison of Different Treatment Protocols in Osteoporosis

    Directory of Open Access Journals (Sweden)

    Ali Aydeniz

    2003-12-01

    Full Text Available The aim of this study was to compare the effectiveness of different medical treatment protocols in osteoporosis. For this purpose 153 postmenopausal women who were diagnosed as osteoporosis were randomly divided into 4 groups and given different medical treatments for 1 year period. Before and after the treatment bone mineral density was measured . Bone mineral density increased in all 4 groups after treatment. But increament in the groups was not statistically different from each other. As a result we concluded that patients choice, side effects and cost must be regarded for drug preference.

  13. Impact of Communication Protocol on Performance

    Energy Technology Data Exchange (ETDEWEB)

    Worley, P.H.

    1999-02-01

    We use the PSTSWM compact application benchmark code to characterize the performance behavior of interprocessor communication on the SGI/Cray Research Origin 2000 and T3E-900. We measure 1. single processor performance, 2. point-to-point communication performance, 3. performance variation as a function of communication protocols and transport layer for collective communication routines, and 4. performance sensitivity of full application code to choice of parallel implementation. We also compare and contrast these results with similar results for the previous generation of parallel platforms, evaluating how the relative importance of communication performance has changed.

  14. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...... hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection...

  15. Comparison of High Speed Congestion Control Protocols

    Directory of Open Access Journals (Sweden)

    Jawhar Ben Abed

    2012-10-01

    Full Text Available Congestion control limits the quantity of information input at a rate less important than that of thetransmission one to ensure good performance as well as protect against overload and blocking of thenetwork. Researchers have done a great deal of work on improving congestion control protocols,especially on high speed networks.In this paper, we will be studying the congestion control alongside low and high speed congestion controlprotocols. We will be also simulating, evaluating, and comparing eight of high speed congestion controlprotocols : Bic TCP, Cubic TCP, Hamilton TCP, HighSpeed TCP, Illinois TCP, Scalable TCP,Compound TCP and YeAH TCP, with multiple flows.

  16. Network protocols. Special issue; Netwerkprotocollen. Themanummer

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, G.A. [RTB Van Heugten, Nijmegen (Netherlands); Rooijakkers, G.W.J. [GTI Building Automation, Amsterdam (Netherlands); Peterse, A. [Regel Partners, Hoevelaken (Netherlands); Smits, P. [Konnex Nederland, Valkenswaard (Netherlands); Hamers, E.P. [Van Dorp Installaties, Breda (Netherlands); Van der Velden, J.A.J. [Kropman, Rijswijk (Netherlands); Van Lingen, G.; Wijn, D.M. [Engineer Johnson Controls, Gorinchem (Netherlands); Deckere, W.J.M.A. [Deerns raadgevende ingenieurs, Rijswijk (Netherlands); Driessen, B. [Saia Burgess, Gouda (Netherlands); Van Olst, K. [K en R Consultants, Deventer (Netherlands); Mosterman, F. [Wago Building Technology, Harderwijk (Netherlands); Staub, R. [BUS-House, Zuerich (Switzerland); Meiring, O.B.; Hut, W.H. [Sauter Building Control Nederland, Amsterdam (Netherlands); Tukker, A. [Webeasy Products, Sliedrecht (Netherlands); Bakker, L.G.; Soethout, L.L.; Elkhuizen, P.A. [TNO Bouw en Ondergrond, Delft (Netherlands); Haeseler, U. [TAC GmbH, Berlin (Germany); Kerdel, J.F. [Siemens Building Technologies, Zoetermeer (Netherlands); Lugt, G.L.; Draijer, G.W.

    2007-11-15

    In 20 articles attention is paid to several aspects of network protocols by means of which building automation systems can exchange data: building automation and management, history of technical installations management, the open communication standard BACnet (Building Automation and Control network), the so-called ISO/IEC domotics and communication standard KNX or Konnex, the integration of electrotechnical and engineering installations by the LonWorks technology, other standard protocols as Modbus, M-bus, OPC (OLE for Process Control), an outline of TCP/IP, smart design of networks, automation and networks and building owners, the use of BACnet and Ethernet in a renovated office building, the use of an open management network in buildings, wireless open integrated systems, terminology in network communication, the use of BACnet in combination with KNX, the impact of BACnet on building automation, the role of the installation sector in the ICT-environment, knowledge of building automation and management, regulations with respect to building automation, and BACnet MSTP (Multiple Spanning Tree Protocol) [Dutch] In 20 artikelen wordt in dit themanummer aandacht besteed aan diverse aspecten m.b.t. netwerkprotocollen waarmee verschillende automatiseringssystemen gegevens met elkaar uitwisselen: gebouwautomatisering en beheer, geschiedenis van technisch installatie beheer, de open communicatie standaard BACnet (Building Automation and Control network), de zogenaamde ISO/IEC domotica en communicatie standaard KNX of Konnex, de integratie van electrotechnische en werktuigbouwkundige installaties met behulp van de LonWorks technologie, andere standaard protocollen zoals Modbus, M-bus, OPC (OLE for Process Control), uitleg over TCP/IP, slim ontwerpen van netwerken, gebouweigenaren over automatisering en netwerken, het gebruik van BACnet en Ethernet in een tot kantoorgebouw gerenoveerd monumentaal gebouw, het gebruik van een open management netwerk in gebouwen, draadloos met

  17. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  18. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Engebrecht, C. Metzger [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  19. A LITERARY REVIEW OF MANET SECURITY PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Krishan Kumar

    2011-10-01

    Full Text Available Ad hoc networks offer various applications which are verymuch essential in wireless networks. But the vital problemconcerning their security aspects is the major issue whichmust be solved. A mobile adhoc network is a collection ofnodes that are connected through a wireless mediumforming rapidly changing topologies. The dynamic andcooperative nature of ad hoc networks present challenges insecuring these networks. Attacks on ad hoc network routingprotocols is the main problem which affects the networkperformance and reliability. Here a brief introduction ismade of the most popular protocols that follow the tabledrivenapproach and the source initiated on-demandapproach.

  20. A Safe Protocol for Amalgam Removal

    Directory of Open Access Journals (Sweden)

    Dana G. Colson

    2012-01-01

    Full Text Available Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body.

  1. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  2. ANALYSIS OF INDEXED-GUIDED HIGHLY BIREFRINGENT PHOTONIC CRYSTAL FIBER EMPLOYING DIFFERENT CLADDING GEOMETRIES

    Directory of Open Access Journals (Sweden)

    A. M. Jouri

    2015-07-01

    Full Text Available      In this paper, a comparative study of three geometries of highly birefringent photonic crystal fibers (HB PCF is presented. The proposed geometries are: V type PCF, Pseudo-Panda PCF and selectively liquid-filled PCF. Based on the famous Finite Difference Time Domain (FDTD method with the perfectly matched layer (PML boundary condition, the simulations are carried out in the aim to find a tradeoff between the chromatic dispersion, the birefringence and the confinement loss.

  3. Protocol for cardiac assessment of recreational athletes.

    Science.gov (United States)

    Chinea, Ana M; Lollett, Carlos; Herrera, Hector; Passariello, Gianfranco; Wong, Sara

    2012-01-01

    In this work, the development of a database on physical fitness is presented. As initial population to fill this database, people who practice recreational sports at the Universidad Simon Bolivar (USB) were chosen. The goal was studying individual physical fitness in order to structure exercise routines that gives certain benefits without risking the individual health, promoting a less sedentary way of life. Before the study, a low-cost noninvasive protocol was designed to determine the level of physical fitness. The methodology consisted of four steps: a) A review of existing protocols to propose a set of physical fitness (International Physical Activity Questionnaire (IPAQ)), cardiovascular (heart rate variability, heart rate recovery time and arterial blood pressure), anthropomorphic, aerobic (maximum oxygen consumption) and mood state (Profile of Mood State (POMS)) measurements, which allow sketching a complete profile on the sportsman physical fitness. b) Instrumental data collection. c) Electrocardiographic signal processing. d) Data post-processing using multivariate analysis. The database was composed of 26 subject from USB. Ten subjects were soccer players, ten were mountain climbers and six were sedentary people. Results showed that the heart rate recover time after 2-3 min, IPAQ and maximum oxygen consumption have higher weights for classifying individuals according to their habitual physical activity. Heart rate variability, as well as, POMS did not contribute greatly for discriminating recreational sport from sedentary persons.

  4. Fibred Coalgebraic Logic and Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Daniel Marsden

    2014-12-01

    Full Text Available Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  5. Chapter 18: Variable Frequency Drive Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  6. Croatia energy planning and Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Duic, Neven; Bogdan, Zeljko [Zagreb Univ., Faculty of Mechanical Engineering and Naval Architecture, Zagreb (Croatia); Juretic, Franjo [Imperial College, London (United Kingdom); Zeljko, Mladen [Energy Inst. Hrvoje Pozar, Zagreb (Croatia)

    2005-05-01

    Croatia as an Annex I country of the UN Framework Convention on Climate Change and a country that has pledged in the Annex B of the Kyoto Protocol to reduce its GHG emissions by 5% will have to envisage a new energy strategy. Compared to the energy consumption collapse in some transitional countries, Croatia has passed through a relatively short-term reduction of GHG emissions since 1990 because of higher energy efficiency of its pretransition economy. It is expected that in case of baseline scenario, it will breach the Kyoto target in 2003. Several scenarios of power generation are compared from the point of view of GHG emissions. The cost-effective scenario expects a mixture of coal and gas fired power plants to be built to satisfy the new demand and to replace the old power plants that are being decommissioned. More Kyoto friendly scenario envisages forcing the compliance with the Protocol with measures only in power generation sector by the construction of mainly zero emission generating capacity in the future, while decommissioning the old plants as planned, and is compared to the others from the GHG emissions point of view. The conclusion is that by measures tackling only power generation, it will not be possible to keep GHG emission under the Kyoto target level. (Author)

  7. SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    RAVIKIRAN PEELUKHANA,

    2011-04-01

    Full Text Available The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP. The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.

  8. Protocol of Interventional Treatment for Hepatocellular Carcinoma

    Institute of Scientific and Technical Information of China (English)

    CHENXiaoming; LUOPengfei; LINHuahuan; SHAOPeijian; ZHOUZejian; FULi

    2005-01-01

    Objective: To establish a reasonable protocol for interventional treatment of hepatocellular carcinoma (HCC). Methods: The data of 1000 HCC patients treated by different kinds of interventional treatments were reviewed with their results of biochemistry, imaging, pathology and survival rate cvaluated.The values as well as the pros and cons of these various kinds of interventional treatments were compared in order to find an optimal protocol. Results: Segmental-transcatheter oil chemoembolization (S-TOCE) could more effectively eradicate the tumor yet inflicting less damage on the noncancerous hepatic tissue and giving much higher survival rate than the conventional transcatheter oil chemoembolization (C-TOCE).Precutaneous ethanol injection (PEI) in combination with chemoembolization could eliminate the residual tumor and significantly increase the survival rate without damaging the noncancerous hepatic tissue. The living quality or survival rate could be improved by choosing different ways of iuterventional treatments to cut down the complications. Conclusion: The selection of different interventional treatments should be done according to the size and type of HCC. Active management is indicated for different complications presenting along with HCC.

  9. [The protocol for multi organ donor management].

    Science.gov (United States)

    Kucewicz, Ewa; Wojarski, Jacek; Zegleń, Sławomir; Saucha, Wojciech; Maciejewski, Tomasz; Pacholewicz, Jerzy; Przybylski, Roman; Knapik, Piotr; Zembala, Marian

    2009-01-01

    Identification and preparation of a potential organ donor requires careful and meticulous intensive care, so that the organs may be harvested in the best possible condition for transplantation. The protocol consists of three key elements: (1) monitoring and haemodynamicstabilisation, (2) hormonal therapy, and (3) adequate mechanical ventilation and nosocomial pneumonia prophylaxis. Standard haemodynamic monitoring should consist of a 12 lead EGG, and direct monitoring of arterial and central venous pressures. Pulmonary artery catheterisation is indicated in donors with a left ventricular ejection fraction (LVEF) below 45%. PCWP should be kept at around 12 mm Hg, Cl at greater than 2.4 L m(-2), and SVR between 800 and 1200 dyn s(-1) cm(-5). When a vasopressor is necessary, vasopressin should be used as the drug of choice. If vasopressin is not available, noradrenaline or adrenaline may be used. Haemoglobin concentration should be maintained between 5.5-6.2 mmol L(-1). In a potential heart donor, troponin concentration should be checked daily. Neutral thermal conditions should be maintained using a warm air blower. A brain dead patient cannot maintain adequate pituitary function, therefore hormone replacement therapy with methylprednisolone, thyroxin and desmopressin is indicated. Glucose concentrations should be kept within the normal range, using insulin if necessary. The lung harvesting protocol should be similarto ARDS treatment guidelines (optimal PEEP, low tidal volumes). Lung recruitment manoeuvres, and aggressive prevention and treatment of nosocomial infection are essential.

  10. OIL SPILL DISPERSANT EFFECTIVENESS PROTOCOL. II: PERFORMANCE OF THE REVISED PROTOCOL

    Science.gov (United States)

    The current U.S. Environmental Protection Agency (EPA) protocol for testing the effectiveness of dispersants for use in treating oil spills on the open water, the swirling flask test (SFT), has been found to give widely varying results in the hands of different testing laborator...

  11. Kyoto protocol: at last the agreement has been reached; Protocole de Kyoto: un accord enfin conclu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    After more than 3 years of negotiations, 180 countries agreed at Bonn on the application of the Kyoto protocol to fight the climatic warming. The main aspects of this agreement are discussed: the carbon wells, the tools of the pollution control for the developed countries and the financial help to the developing countries. (A.L.B.)

  12. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  13. The Quantum Steganography Protocol via Quantum Noisy Channels

    Science.gov (United States)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  14. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  15. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  16. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  17. Knowledge structure approach to verification of authentication protocols

    Institute of Scientific and Technical Information of China (English)

    SU Kaile; L(U) Guanfeng; CHEN Qingliang

    2005-01-01

    The standard Kripke semantics of epistemic logics has been applied successfully to reasoning communication protocols under the assumption that the network is not hostile. This paper introduces a natural semantics of Kripke semantics called knowledge structure and, by this kind of Kripke semantics, analyzes communication protocols over hostile networks, especially on authentication protocols. Compared with BAN-like logics,the method is automatically implementable because it operates on the actual definitions of the protocols, not on some difficult-to-establish justifications of them. What is more,the corresponding tool called SPV (Security Protocol Verifier) has been developed. Another salient point of this approach is that it is justification-oriented instead of falsificationoriented, i.e. finding bugs in protocols.

  18. Reducing Network Traffic of Token Protocol Using Sharing Relation Cache

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Token protocol provides a new coherence framework for shared-memory multiprocessor systems.It avoids indirections of directory protocols for common cache-to-cache transfer misses, and achieves higher interconnect bandwidth and lower interconnect latency compared with snooping protocols. However, the broadcasting increases network traffic, limiting the scalability of token protocol. This paper describes an efficient technique to reduce the token protocol network traffic, called sharing relation cache. This cache provides destination set information for cache-to-cache miss requests by caching directory information for recent shared data. This paper introduces how to implement the technique in a token protocol. Simulations using SPLASH-2 benchmarks show that in a 16-core chip multiprocessor system, the cache reduced the network traffic by 15% on average.

  19. Probabilistic protocols in quantum information science: Use and abuse

    Science.gov (United States)

    Caves, Carlton

    2014-03-01

    Protocols in quantum information science often succeed with less than unit probability, but nonetheless perform useful tasks because success occurs often enough to make tolerable the overhead from having to perform the protocol several times. Any probabilistic protocol must be analyzed from the perspective of the resources required to make the protocol succeed. I present results from analyses of two probabilistic protocols: (i) nondeterministic (or immaculate) linear amplification, in which an input coherent state is amplified some of the time to a larger-amplitude coherent state, and (ii) probabilistic quantum metrology, in which one attempts to improve estimation of a parameter (or parameters) by post-selecting on a particular outcome. The analysis indicates that there is little to be gained from probabilistic protocols in these two situations.

  20. Evaluating Impact of Mobility on Wireless Routing Protocols

    CERN Document Server

    Javaid, N; Ahmad, A; Naveed, A; Djouani, K

    2011-01-01

    In this paper, we evaluate, analyze, and compare the impact of mobility on the behavior of three reactive protocols (AODV, DSR, DYMO) and three proactive protocols (DSDV, FSR, OLSR) in multi-hop wireless networks. We take into account throughput, end-to-end delay, and normalized routing load as performance parameters. Based upon the extensive simulation results in NS-2, we rank all of six protocols according to the performance parameters. Besides providing the interesting facts regarding the response of each protocol on varying mobilities and speeds, we also study the trade-offs, the routing protocols have to make. Such as, to achieve throughput, a protocol has to pay some cost in the form of increased end-to-end delay or routing overhead.

  1. RPWCN or Roaming Protocol in Wireless Community Network

    Directory of Open Access Journals (Sweden)

    Thomas Djotio

    2014-03-01

    Full Text Available Many Roaming protocols have already been proposed in wireless community networks (WCN, but none has yet been the subject of standardization. Also, the networks topologies required for deployments are all very costly when it is necessary to take into account the socio-economic conditions of developing countries. In this paper, we propose the RPWCN Protocol (Roaming Protocol in Wireless Community Network which design logic is strongly inspired by the functioning of the Roaming Protocol in GSM. The WCN architecture on which we modelled our Protocol takes into account the socio-economic conditions of developing countries. After the modelling of the RPWCN Protocol, the AVISPA tool has been solicited for its validation

  2. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  3. Routing Protocol Performance Issues and Evaluation Considerations in MANET

    Directory of Open Access Journals (Sweden)

    P.Venkata Maheswara,

    2013-07-01

    Full Text Available Mobile nodes in Wire less a d-hoc networ k need to operate as routers in or d er to maintain the informa tion ab out network connectivity as there is no centralized infrastructure. Therefore,Routing Protocols are required which could adapt dynamically to the changing topologies and works at low data rates. As are sult, there arises a need for the compreh ensive performance evaluation of the ad-doc routing protocols in same frame work to under stand their comparative merits and suitability for deployment in different scenarios. In this paper the protocols suite selected for comparison are AODV, DSR, TORA and OLSR ad- hoc routing protocols, as these were the most promising from all other protocols. The performance of these protocols is evaluated through exhaustive simulations using the OPNET Model network simulator under different parameters like routing over head, delay , throughput and network load under varying the mobile nodes .

  4. Use of YouScope to implement systematic microscopy protocols.

    Science.gov (United States)

    Lang, Moritz; Rudolf, Fabian; Stelling, Jörg

    2012-04-01

    Complex microscopy protocols, e.g., to dynamically track multiple signals in living cells under different conditions, are becoming more common. However, the implementation of complex protocols on modern, motorized microscopes often requires their reformulation into low-level machine language. This recoding is a time-consuming and error-prone task that often requires advanced programming skills. This unit describes how to use the high level, open-source microscope control platform YouScope to implement complex measurement protocols. Three protocols detail how to install and configure YouScope on a motorized microscope, how to use YouScope to quickly assess the quality of a sample, and how to set up imaging protocols for cells in a microplate. In addition to these protocols, descriptions are given for the use of various other tools YouScope provides to successfully accomplish various microscopy tasks.

  5. Security Analysis of two Distance-Bounding Protocols

    CERN Document Server

    Abyaneh, Mohammad Reza Sohizadeh

    2011-01-01

    In this paper, we analyze the security of two recently proposed distance bounding protocols called the Hitomi and the NUS protocols. Our results show that the claimed security of both protocols has been overestimated. Namely, we show that the Hitomi protocol is susceptible to a full secret key disclosure attack which not only results in violating the privacy of the protocol but also can be exploited for further attacks such as impersonation, ma?a fraud and terrorist fraud attacks. Our results also demonstrates that the probability of success in a distance fraud attack against the NUS protocol can be increased up to (3/4)^n and even slightly more, if the adversary is furnished with some computational capabilities.

  6. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  7. DESIGN OF PROTOCOL IN UNDERWATER WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    S. Fathima

    2015-10-01

    Full Text Available In this work we designed a routing protocol to overcome upcoming challenges in under water wireless sensor networks. The routing protocol designed for specific roles leads to issues in the network. The major issues for development of routing protocol for underwater sensor network are harsh deployment environment, low bandwidth, high propagation delay, low bandwidth, requires high bandwidth energy, temporary losses, fouling and corrosion and high bit error rates. In this project the certain issues to be rectified are low bandwidth, energy efficiency and data delivery. The limitations existing routing protocols are low data delivery, data delivery ratio, energy efficiency, bandwidth efficiency and reliability. Design of three new protocol is to overcome the limitations of existing protocols in underwater wireless sensor networks.

  8. New Routing Metrics for ADHOC Network Routing Protocols

    Science.gov (United States)

    Reddy, P. C.

    2014-12-01

    The performance and reliability of Internet is measured using different quantities. When the quantities measured are essential and have wide range of acceptance then they are called metrics. Performance metrics enable comparison and selection among the alternatives. In computer networks, metrics are used to evaluate an application, protocol etc. Routing in adhoc networks is nontrivial. Routing protocols for adhoc networks are still evolving and there is need for continuous evaluation of them. In the literature existing, several routing protocols are evaluated using standard metrics under different conditions. This paper proposes new metrics for evaluation of routing protocols and uses them to evaluate the adhoc network routing protocols AODV, DSR, DSDV and TORA. Simulation environment is created using NS-2 simulator. Typical range of speeds, pause times and data rates are used. The results provide new insights in to the working of the routing protocols.

  9. Hardware Abstraction and Protocol Optimization for Coded Sensor Networks

    DEFF Research Database (Denmark)

    Nistor, Maricica; Roetter, Daniel Enrique Lucani; Barros, João

    2015-01-01

    -efficient protocols that use such an abstraction, as well as mechanisms to optimize a communication protocol in terms of energy consumption. The problem is modeled for different feedback-based techniques, where sensors are connected to a base station, either directly or through relays. We show that for four example......The design of the communication protocols in wireless sensor networks (WSNs) often neglects several key characteristics of the sensor's hardware, while assuming that the number of transmitted bits is the dominating factor behind the system's energy consumption. A closer look at the hardware...... platforms, the use of relays may decrease up to 4.5 times the total energy consumption when the protocol and the hardware are carefully matched. We conclude that: 1) the energy budget for a communication protocol varies significantly on different sensor platforms; and 2) the protocols can be judiciously...

  10. Hybrid quantum repeater protocol with fast local processing

    DEFF Research Database (Denmark)

    Borregaard, Johannes; Brask, Jonatan Bohr; Sørensen, Anders Søndberg

    2012-01-01

    the need for classical communication during growth. Entanglement is generated in subsequent connection processes. Furthermore the growth procedure is optimized. We review the main elements of the original protocol and present the two modifications. Finally the two protocols are compared and the modified......We propose a hybrid quantum repeater protocol combining the advantages of continuous and discrete variables. The repeater is based on the previous work of Brask et al. [ Phys. Rev. Lett. 105 160501 (2010)] but we present two ways of improving this protocol. In the previous protocol entangled single......-photon states are produced and grown into superpositions of coherent states, known as two-mode cat states. The entanglement is then distributed using homodyne detection. To improve the protocol, we replace the time-consuming nonlocal growth of cat states with local growth of single-mode cat states, eliminating...

  11. AN INTERACTIVE VISUALIZATION TOOL FOR ANIMATING BEHAVIOR OF CRYPTOGRAPHIC PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Mabroka Maeref

    2015-03-01

    Full Text Available Cryptography and Network Security is a difficult subject to understand, mainly because of the complexity of security protocols and the mathematical rigour required to understand encryption algorithms. Realizing the need for an interactive visualization tool to facilitate the understanding of cryptographic concepts and protocols, several tools had been developed. However, these tools cannot be easily adapted to animate different protocols. The aim of this paper is to propose an interactive visualization tool, called the Cryptographic Protocol Animator (CPAnim. The tool enables a student to specify a protocol and gain knowledge about the impact of its behavior. The protocol is specified by using a scenario-based approach and it is demonstrated as a number of scenes displaying a complete scenario. The effectiveness of this tool was tested using an empirical evaluation method. The results show that this tool was effective in meeting its learning objectives.

  12. AHBP: An Efficient Broadcast Protocol for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    彭伟; 卢锡城

    2001-01-01

    Broadcast is an important operation in many network protocols. It is utilized to discover routes to unknown nodes in mobile ad hoc networks (MANETs) and is the key factor in scaling on-demand routing protocols to large networks. This paper presents the Ad Hoc Broadcast Protocol (AHBP) and its performance is discussed. In the protocol, messages are only rebroadcast by broadcast relay gateways that constitute a connected dominating set of the network. AHBP can efficiently reduce the redundant messages which make flooding-like protocols perform badly in large dense networks. Simulations are conducted to determine the performance characteristics of the protocol. The simulation results have shown excellent reduction of broadcast redundancy with AHBP. It also contributes to a reduced level of broadcast collision and congestion.

  13. Internet of Things: Architectures, Protocols, and Applications

    Directory of Open Access Journals (Sweden)

    Pallavi Sethi

    2017-01-01

    Full Text Available The Internet of Things (IoT is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly. As compared to similar survey papers in the area, this paper is far more comprehensive in its coverage and exhaustively covers most major technologies spanning from sensors to applications.

  14. New dimensions in SNMP Protocol in Romania

    Directory of Open Access Journals (Sweden)

    Alice Nastovici

    2009-06-01

    Full Text Available In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy for community names as used for passwords.Make sure that they are difficult to guess or crack and that they are chanced periodically- Validate and check community names using SNMPwalk. Additional information can be foundat http://www.2nd.com/functionSNMPwalk.php- Filter SNMP (port 161/udp at the border-router or firewall unless it is absolutely necessary topool or manage devices from outside of the local network, where possible read-only

  15. Melanins and melanogenesis: methods, standards, protocols.

    Science.gov (United States)

    d'Ischia, Marco; Wakamatsu, Kazumasa; Napolitano, Alessandra; Briganti, Stefania; Garcia-Borron, José-Carlos; Kovacs, Daniela; Meredith, Paul; Pezzella, Alessandro; Picardo, Mauro; Sarna, Tadeusz; Simon, John D; Ito, Shosuke

    2013-09-01

    Despite considerable advances in the past decade, melanin research still suffers from the lack of universally accepted and shared nomenclature, methodologies, and structural models. This paper stems from the joint efforts of chemists, biochemists, physicists, biologists, and physicians with recognized and consolidated expertise in the field of melanins and melanogenesis, who critically reviewed and experimentally revisited methods, standards, and protocols to provide for the first time a consensus set of recommended procedures to be adopted and shared by researchers involved in pigment cell research. The aim of the paper was to define an unprecedented frame of reference built on cutting-edge knowledge and state-of-the-art methodology, to enable reliable comparison of results among laboratories and new progress in the field based on standardized methods and shared information.

  16. Field protocols for the genomic era

    Directory of Open Access Journals (Sweden)

    N Bulatova

    2009-08-01

    Full Text Available For many decades karyotype was the only source of overall genomic information obtained from species of mammal. However, approaches have been developed in recent years to obtain molecular and ultimately genomic information directly from the extracted DNA of an organism. Molecular data have accumulated hugely for mammalian taxa. The growing volume of studies should motivate field researchers to collect suitable samples for molecular analysis from various species across all their ranges. This is the reason why we here include a molecular sampling procedure within a field work protocol, which also includes more traditional (including cytogenetic techniques. In this way we hope to foster the development of molecular and genomic studies in non-standard wild mammals.

  17. Protocols and plan of quantum cryptography

    Directory of Open Access Journals (Sweden)

    Milorad S. Markagić

    2012-01-01

    Full Text Available Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems. However, none of these systems provides a solution for the famous 'catch 22' of cryptography. Owing to the intensive development of quantum mechanics, in the last 30 years emerged an entirely new kind of cryptography-quantum cryptography. Its greatest contribution is a possibility to discover an intercepted communication channel from a third party. The question is: is this really true? The question arises: 'If the quantum cryptography is so good, why is not widely used?' The aim of this paper is, on the one hand, to define the basic mechanisms of quantum cryptography IP, and, on the other hand, to point to the shortcomings, as they related to the opportunities of today's devices and flaws in protocols.

  18. Signal transduction immunohistochemistry - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2011-11-01

    Full Text Available Alexander E. Kalyuzhny statement that immunohistochemical detection of labile, low abundance and short-lived signal transduction molecules appears to be a very challenging task actually captures the same reader’s feeling. Each of us daily using immunohistochemical protocols to reveal targets either useful for research or diagnostic aims will surely wonder by which tricky techniques it is possible to overcome the preservation and unmasking of those labile antigens involved in signal transduction. Well, by seventheen chapters grouped in five parts Prof. Alexander E. Kalyuzhny is presenting an invaluable technical and methodological source of hints to satisfy our needs: to overcome troubleshottings if we are already in the field or to orientate those entering the field....

  19. Chest magnetic resonance imaging: a protocol suggestion

    Directory of Open Access Journals (Sweden)

    Bruno Hochhegger

    2015-12-01

    Full Text Available Abstract In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation.

  20. Service Migration Protocol for NFC Links

    DEFF Research Database (Denmark)

    Nickelsen, Anders; Schwefel, Hans-Peter; Martin, Miquel

    2010-01-01

    of use while preserving state. This paper focuses on the scenario of migration between two devices in which the actual migration procedure is executed over near-field communication (NFC) ad-hoc links. The NFC link is interesting as it gives the user the perception of trust and enables service continuity...... in cases where mid- or long-range wireless connectivity is unavailable. Based on an experimental performance analysis of a specific NFC platform, the paper presents a migration orchestration protocol with low overhead and low delays to be used with NFC links. Experimental results allow to conclude...... on the sizes of application state that can be expected to be feasible for such ad-hoc NFC migration....