WorldWideScience

Sample records for bispectral index-guided protocol

  1. Protocol for the BAG-RECALL clinical trial: a prospective, multi-center, randomized, controlled trial to determine whether a bispectral index-guided protocol is superior to an anesthesia gas-guided protocol in reducing intraoperative awareness with explicit recall in high risk surgical patients

    Directory of Open Access Journals (Sweden)

    Villafranca Alex

    2009-11-01

    Full Text Available Abstract Background Awareness with explicit recall of intra-operative events is a rare and distressing complication that may lead to severe psychological symptoms. Candidate depth of anesthesia monitors have been developed, partly with the aim of preventing this complication. Despite conflicting results from clinical trials and the lack of incisive validation, such monitors have enjoyed widespread clinical adoption, in particular the bispectral index. The American Society of Anesthesiologists has called for adequately powered and rigorously designed clinical trials to determine whether the use of such monitors decreases the incidence of awareness in various settings. The aim of this study is to determine with increased precision whether incorporating the bispectral index into a structured general anesthesia protocol decreases the incidence of awareness with explicit recall among a subset of surgical patients at increased risk for awareness and scheduled to receive an inhalation gas-based general anesthetic. Methods/Design BAG-RECALL is a multi-center, randomized, controlled clinical trial, in which 6,000 patients are being assigned to bispectral index-guided anesthesia (target range, 40 to 60 or end-tidal anesthetic gas-guided anesthesia (target range, 0.7 to 1.3 age-adjusted minimum alveolar concentration. Postoperatively, patients are being assessed for explicit recall at two intervals (0 to 72 hours, and 30 days after extubation. The primary outcome of the trial is awareness with explicit recall. Secondary outcomes include postoperative mortality, psychological symptoms, intensive care and hospital length of stay, average anesthetic gas administration, postoperative pain and nausea and vomiting, duration of stay in the recovery area, intra-operative dreaming, and postoperative delirium. Discussion This trial has been designed to complement two other clinical trials: B-Unaware and MACS (ClinicalTrials.gov numbers, NCT00281489 and NCT00689091

  2. Feasibility of bispectral index-guided propofol infusion for flexible bronchoscopy sedation: a randomized controlled trial.

    Directory of Open Access Journals (Sweden)

    Yu-Lun Lo

    Full Text Available There are safety issues associated with propofol use for flexible bronchoscopy (FB. The bispectral index (BIS correlates well with the level of consciousness. The aim of this study was to show that BIS-guided propofol infusion is safe and may provide better sedation, benefiting the patients and bronchoscopists.After administering alfentanil bolus, 500 patients were randomized to either propofol infusion titrated to a BIS level of 65-75 (study group or incremental midazolam bolus based on clinical judgment to achieve moderate sedation. The primary endpoint was safety, while the secondary endpoints were recovery time, patient tolerance, and cooperation.The proportion of patients with hypoxemia or hypotensive events were not different in the 2 groups (study vs. control groups: 39.9% vs. 35.7%, p = 0.340; 7.4% vs. 4.4%, p = 0.159, respectively. The mean lowest blood pressure was lower in the study group. Logistic regression revealed male gender, higher American Society of Anesthesiologists physical status, and electrocautery were associated with hypoxemia, whereas lower propofol dose for induction was associated with hypotension in the study group. The study group had better global tolerance (p<0.001, less procedural interference by movement or cough (13.6% vs. 36.1%, p<0.001; 30.0% vs. 44.2%, p = 0.001, respectively, and shorter time to orientation and ambulation (11.7±10.2 min vs. 29.7±26.8 min, p<0.001; 30.0±18.2 min vs. 55.7±40.6 min, p<0.001, respectively compared to the control group.BIS-guided propofol infusion combined with alfentanil for FB sedation provides excellent patient tolerance, with fast recovery and less procedure interference.ClinicalTrials. gov NCT00789815.

  3. Clinical vs. bispectral index-guided propofol induction of anesthesia: A comparative study

    Directory of Open Access Journals (Sweden)

    Snehdeep Arya

    2013-01-01

    Full Text Available Background: Clinically optimized focusing of drug administration to specific need of patient with bispectral index (BIS monitoring results in reduced dose and faster recovery of consciousness. This study was planned with an aim to study and compare the conventional clinical end point or BIS on the requirement of dosage of propofol, hemodynamic effects, and BIS alterations following propofol induction. Methods: 70 patients, ASA I and II, 20-60 years undergoing elective surgical procedure under general anesthesia with endotracheal intubation were selected and divided into two groups. Group A received (inj. fentanyl (2 μg/kg, followed 3 min later by inj. propofol at the rate of 30 mg/kg/hr infusion till the loss of response to verbal command while group B received inj. fentanyl (2 μg/kg, followed 3 min later by inj. propofol at the rate of 30 mg/kg/hr infusion. The end point of hypnosis was when the BIS value was sustained for 1 min at 48±2. The patients were intubated. Total induction dose of propofol was noted in each group. The value of BIS and hemodynamic parameters (heart rate, systolic/diastolic blood pressure were noted at the time of loss of consciousness, at the time of intubation, and 1 min after intubation, thereafter every minute for first 10 min and thereafter every 10 min till end of surgery. Any involuntary muscle activity such as jerky movements, dystonic posturing, and opisthotonos were also recorded. Results: The mean dose of propofol used in groups A and B were 1.85±0.48 mg/kg and 1.79±0.41 mg/kg, respectively. The dosage used in group B were less but not clinically significant (P=0.575. On comparing the dosage of propofol in males among the groups there was a significantly lower dosage of propofol required in group B (2.06±0.45 mg/kg and 1.83±0.32 mg/kg, respectively, P=0.016. This decrease however was not seen in female patients dosage being 1.65±0.44 mg/kg and 1.75±0.49 mg/kg, respectively (P=0.372. The hemodynamic

  4. Neuroprotective effect of bispectral index-guided fast-track anesthesia using sevoflurane combined with dexmedetomidine for intracranial aneurysm embolization

    Directory of Open Access Journals (Sweden)

    Chao-liang Tang

    2018-01-01

    Full Text Available Dexmedetomidine has sedative, anxiolytic, analgesic, anti-sympathetic, and anti-shivering effects. Dexmedetomidine might be effective in combination with sevoflurane for anesthesia, but prospective randomized controlled clinical trials with which to verify this hypothesis are lacking. In total, 120 patients who underwent embolization of an intracranial aneurysm were recruited from Anhui Provincial Hospital and Renmin Hospital of Wuhan University of China and randomly allocated to two groups. After intraoperative administration of 2% to 3% sevoflurane inhalation, one group of patients received pump-controlled intravenous injection of 1.0 μg/kg dexmedetomidine for 15 minutes followed by maintenance with 0.3 μg/kg/h until the end of surgery; the other group of patients only underwent pump-controlled infusion of saline. Bispectral index monitoring revealed that dexmedetomidine-assisted anesthesia can shorten the recovery time of spontaneous breathing, time to eye opening, and time to laryngeal mask removal. Before anesthetic induction and immediately after laryngeal mask airway removal, the glucose and lactate levels were low, the S100β and neuron-specific enolase levels were low, the perioperative blood pressure and heart rate were stable, and postoperative delirium was minimal. These findings indicate that dexmedetomidine can effectively assist sevoflurane for anesthesia during surgical embolization of intracranial aneurysms, shorten the time to consciousness and extubation, reduce the stress response and energy metabolism, stabilize hemodynamic parameters, and reduce adverse reactions, thereby reducing the damage to the central nervous system. This trial was registered at the Chinese Clinical Trial Registry (http://www.chictr.org.cn/ (registration number: ChiCTR-IPR-16008113.

  5. Effect site concentrations of remifentanil maintaining cardiovascular homeostasis in response to surgical stimuli during bispectral index guided propofol anestesia in seriously obese patients.

    Science.gov (United States)

    Albertin, A; La Colla, G; La Colla, L; Bergonzi, P C; Deni, F; Moizo, E

    2006-11-01

    The aim of this prospective study was to determine the effect site concentrations of remifentanil maintaining cardiovascular homeostasis in response to surgical stimuli during bispectral index (BIS) guided propofol anesthesia in seriously obese patients. Twenty-two patients, female/male 15/7, ASA physical status II - III, aged 29-69 years, body mass index (BMI) 54.5+/-12, undergoing major open bariatric surgery, were enrolled to receive a propofol-remifentanil total intravenous anesthesia. All patients were intubated by using a flexible fiberoptic bronchoscopic technique facilitated by a target controlled effect site concentration of remifentanil set at 2.5 ng/mL. After endotracheal intubation, anesthesia was started with a target controlled infusion of propofol initially set at 6 microg/mL, then adjusted to maintain a BIS value between 40 and 50. The mean effect site concentration of remifentanil was recorded at different intervals time during surgery: skin incision-opening of peritoneum (T1), bowel resection (T2), cholecystojejunal anastomosis (T3), ileojejunal anastomosis (T4), closing of peritoneum (T5). The mean plasma concentrations of propofol required to maintain a BIS value between 40 and 50 were 4+/-0.55, 3.8+/-0.64, 3.8+/- 0.63, 3.8+/-0.65 and 3.8+/-0.63 microg/mL at T1, T2, T3, T4 and T5 interval time, respectively. The mean values of remifentanil target effect site concentration were 5.2+/-1.3, 7.7+/-1.7, 9.1+/-1.8, 9.7+/- 2.2 and 9.9+/-2.5 ng/mL at T1, T2, T3, T4 and T5 interval time. This study suggests that tolerance to remifentanil infusion is profound and develops very rapidly in morbidly obese patients submitted to open bariatric surgery during BIS guided propofol anesthesia. The administration of opiates during anesthesia based on target-controlled infusion should include corrections for the development of tolerance.

  6. A bispectral index guided comparison of target-controlled versus manually-controlled infusion of propofol and remifentanil for attenuation of pressor response to laryngoscopy and tracheal intubation in non cardiac surgery

    Directory of Open Access Journals (Sweden)

    Naser Yeganeh

    2006-12-01

    Full Text Available BACKGROUND: Target-controlled infusion is a new delivery system for intravenous anesthetic agents with which the anesthetist targets a plasma or effect-site drug concentration to achieve a predetermined effect. With this system, the tedious task of calculating the amount of administered drug required to achieve the target concentration is left in charge of a microprocessor which commands the infusion device. In this prospective study we compared alterations in blood pressure and heart rate from initiation of induction of anesthesia until 3 minutes after tracheal intubation in two methods of drug infusion, target-controlled infusion (TCI and manually controlled infusion (MCI. Total anesthetic drug used until 3 minutes after intubation and level of produced hypnosis also were compared between two methods. METHODS: 40 patients were enrolled in this clinical trial study and were allocated randomly in two groups, each group consisting of 20 patients. In TCI group, patients received propofol and remifentanil with TCI pump to achieve 7 µg/ml and 4 ng/ml as plasmatic target drug levels, respectively. In MCI group, patients received propofol 2 mg/kg and remifentanil 1 µg/kg of body weight with manually controlled infusion. Both groups received succinylcholine as muscle relaxant to facilitate laryngoscopy and tracheal intubation. Bispectral index (BIS was passively recorded in two groups to compare the level of hypnosis. Blood pressure (BP and heart rate (HR were recorded at 5 different times (T-1, T0, T1, T2 and T3. Independent t-test and paired t-test were used for data analysis. RESULTS: Systolic arterial pressure (SAP was not different at T-1 between two groups but systolic hypotension was seen in MCI group more than TCI group at T0 (P<0.05. Systolic hypertension was more common in MCI group after intubation; i.e. SAP showed significant differences in T1, T2 and T3 between two groups (P<0.05. Mean arterial pressure (MAP showed significant

  7. Dow's chemical exposure index guide

    International Nuclear Information System (INIS)

    Marshall, J.T.; Mundt, A.

    1995-01-01

    A number of events in the 1970's and 1980's impacted the course of process safety. Incidents such as Flixborough, Seveso, Three-Mile Island, and Bhopal are well known throughout industry and are recognized as examples of major disasters. Even though events leading up to these disasters were completely different they had one common element between them: a substance was released from a manufacturing unit, became airborne and presented a hazard of such magnitude as to place the safety of both employees and the surrounding public in jeopardy. As a result, industry became increasingly concerned regarding potential loss, in human and economic terms, as plants and equipment grew in size. The Flixborough incident raised the level of concern for process safety, particularly in terms of the hazards presented by fire and explosion. Seveso and Three-Mile Island emphasized the need to consider far-field exposure. The Bhopal incident created an urgent need to recognize and understand the expected downwind impact of potential releases of acutely toxic substances to the air. In order to meet this need, the Dow Chemical Company, a recognized leader in the area of safety and loss prevention, presented a Chemical Exposure Index in 1986. AIChE has recently published an updated version entitled Dow's Chemical Exposure Index Guide. 7 refs., 5 figs

  8. Characterization of Sleep Using Bispectral Analysis

    National Research Council Canada - National Science Library

    McPherson, Cameron

    2001-01-01

    This study investigated the relationship between a Bispectral Index (BIS), as measured by Aspect Medical Systems' A-1000 EEG monitor, and clinical sleep staging based on the Rechtschaffen and Kales (RK...

  9. Intravenous lidocaine infusion reduces bispectral index-guided requirements of propofol only during surgical stimulation(dagger)

    NARCIS (Netherlands)

    Hans, G. A.; Lauwick, S. M.; Kaba, A.; Bonhomme, V.; Struys, M. M. R. F.; Hans, P. C.; Lamy, M. L.; Joris, J. L.

    2010-01-01

    I.V. lidocaine reduces volatile anaesthetics requirements during surgery. We hypothesized that lidocaine would also reduce propofol requirements during i.v. anaesthesia. A randomized controlled study of 40 patients tested the effect of i.v. lidocaine (1.5 mg kg(-1) then 2 mg kg(-1) h(-1)) on

  10. High-resolution bispectral imager at 1000 frames per second.

    Science.gov (United States)

    Strojnik, Marija; Paez, Gonzalo

    2015-09-21

    We describe a bispectral, 1000-frames per second imaging instrument working simultaneously in two spectral bands. These bands may be selected for a specific application; however, we implement a pair centered at 4.3 μm and 4.66 μm. Synchronization is accomplished by employing a single focal plane array. To demonstrate the performance of the bispectral imager, we apply it to the methane flame of a Bunsen burner in a near conjugate configuration with flame image length subtending at about 200 pixels. The instrument detects bispectral puffing at 2 Hz, pulsations, and bispectral radiation oscillations, first reported here in two spectral intervals. The period of oscillatory spectral components in two bands is the same, about 3 Hz for this flame, with delay of a quarter period between them, first reported here. With 1-ms integration time, we detect significant formation of turbulence and vortices, especially pronounced in the region where the flame transitions into a plume. We display bispectral ratioed images of flames in near-real time with either the laboratory or the field device.

  11. Clinical usefulness of the bispectral index for titrating propofol target effect-site concentration.

    Science.gov (United States)

    Struys, M; Versichelen, L; Byttebier, G; Mortier, E; Moerman, A; Rolly, G

    1998-01-01

    The bispectral index, a new processed electroencephalographic parameter which may give information on depth of anaesthesia, was used in 58 patients undergoing outpatient gynaecological surgery in order to study if the addition of bispectral index monitoring to standard clinical monitoring could improve the titration of target propofol concentration when using effect-site target-controlled propofol infusion for sedation. In Group 1 (n = 30), the bispectral index was recorded but the anaesthetist was unaware of the readings and therefore only classical signs of depth of anaesthesia were used to guide the anaesthetist in controlling the effect-site concentration. In Group 2 (n = 28), bispectral index readings were available to the anaesthetist and effect-site concentration was adjusted to ensure that bispectral index was maintained between 40 and 60. Similar propofol induction and maintenance doses, blood and effect-site concentrations and mean bispectral index were found in the two groups. A greater percentage of bispectral index readings lying outside the target range (i.e. 60) and more movement at incision and during maintenance were found in Group 1. There was a trend towards more implicit awareness in patients in Group 1. Bispectral index was found to be useful for measuring depth of sedation when using propofol target-controlled infusion. Propofol dosage could not be decreased but a more consistent level of sedation could be maintained due to a more satisfactory titration of target effect-site concentration.

  12. Energy effective dual-pulse bispectral laser for EUV lithography

    Science.gov (United States)

    Zhevlakov, A. P.; Seisyan, R. P.; Bespalov, V. G.; Elizarov, V. V.; Grishkanich, A. S.; Kascheev, S. V.; Sidorov, I. S.

    2016-03-01

    The power consumption in the two-pulse bispectral primary source could be substantially decreased by replacing the SRS converters from 1.06 μm into 10.6 μm wavelength as the preamplifier cascades in CO2 laser channel at the same efficiency radiation of EUV source. The creation of high volume manufacturing lithography facilities with the technological standard of 10-20 nm is related to the implementation of resist exposure modes with pulse repetition rate of 100 kHz. Low power consumption of the proposed scheme makes it promising for the creation of LPP EUV sources.

  13. Spin Calogero Particles and Bispectral Solutions of the Matrix KP Hierarchy

    International Nuclear Information System (INIS)

    Bergvelt, Maarten; Gekhtman, Michael; Kasman, Alex

    2009-01-01

    Pairs of nxn matrices whose commutator differ from the identity by a matrix of rank r are used to construct bispectral differential operators with rxr matrix coefficients satisfying the Lax equations of the Matrix KP hierarchy. Moreover, the bispectral involution on these operators has dynamical significance for the spin Calogero particles system whose phase space such pairs represent. In the case r = 1, this reproduces well-known results of Wilson and others from the 1990's relating (spinless) Calogero-Moser systems to the bispectrality of (scalar) differential operators

  14. Bispectral Index Monitoring: validity and utility in pediatric dentistry.

    Science.gov (United States)

    Goyal, Ashima; Mittal, Neeti; Mittal, Parteek; Gauba, K

    2014-01-01

    Reliable and safe provision of sedation and general anesthesia is dependent on continuous vigilance of patient's sedation depth. Failure to do so may result in unintended oversedation or undersedation. It is a common practice to observe sedation depth by applying subjective sedation scales and in case of general anesthesia, practitioner is dependent on vital sign assessment. The Bispectral Index System (BIS) is a recently introduced objective, quantitative, easy to use, and free from observer bias, and clinically useful tool to assess sedation depth and it precludes the need to stimulate the patient to assess his sedation level. The present article is an attempt to orient the readers towards utility and validity of BIS for sedation and general anesthesia in pediatric dentistry. In this article, we attempt to make the readers understand the principle of BIS, its variation across sedation continuum, its validity across different age groups and for a variety of sedative drugs.

  15. Bispectral index monitoring of unihemispheric effects in dolphins.

    Science.gov (United States)

    Howard, Red S; Finneran, James J; Ridgway, Sam H

    2006-09-01

    When dolphins sleep, their electroencephalographic activity may change in only one cerebral hemisphere; i.e., the left and right brain hemispheres can take turns sleeping. We demonstrate that the bispectral index (BIS) monitor can detect interhemispheric asymmetry in the dolphin species Tursiops truncatus. Using two BIS sensors placed simultaneously over each side of the dolphin's head, we often, but not always, found significant differences between the two BIS values (e.g., left side 60 and right side 90) in non-medicated animals and in animals given propofol, atropine, and/or diazepam. Observations were each made over a period of approximately 3 h on dolphins resting out of the water. Unihemispheric effects may be inducible pharmacologically in dolphins. The dolphin, with its human-sized brain, may provide an animal model for study of unihemispheric effects in humans.

  16. Monitor de profundidade da hipnose. A eletroencefalografia bispectral

    Directory of Open Access Journals (Sweden)

    Pedro Thadeu Galvão Vianna

    2001-10-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: A monitorização da profundidade da hipnose e da anestesia é um ato complexo. A maioria das propostas para monitorizar os níveis adequados da hipnose, durante a anestesia, envolve o EEG usando as ondas do EEG, ou mais recentemente, usando a forma processada. A análise bispectral é o método que permite analisar o EEG nas diferentes fases de freqüências. CONTEÚDO: O EEG processado é iniciado com a conversão do sinal de EEG para a forma digital. O EEG digitalizado pode ser matematicamente transformado pelo processo conhecido como análise de Fourier, que separa o complexo sinal do EEG em vários componentes da onda, ou seja, em cada porção de diferente amplitude, mas cuja soma corresponde à forma original da onda. Com o emprego deste método surgem vários parâmetros. O Índice Bispectral, ou simplesmente BIS (100 - acordado até 0 - isoelétrico, é derivado dos melhores parâmetros (p.ex.: freqüência da borda spectral, freqüência mediana e o "burst supression" ou surto de supressão que foram avaliados através de análise estatística. CONCLUSÕES: A experiência clínica tem mostrado que o BIS pode predizer uma resposta à incisão da pele durante a anestesia. Entretanto, o BIS não é independente da técnica anestésica usada. Há diferentes respostas, a depender do hipnótico e analgésico empregado.

  17. Evaluation of bispectral LIDAR data for urban vegetation mapping

    Science.gov (United States)

    Nabucet, Jean; Hubert-Moy, Laurence; Corpetti, Thomas; Launeau, Patrick; Lague, Dimitri; Michon, Cyril; Quenol, Herve

    2016-10-01

    Because of the large increase of urban population in the last decades, the question of sustainable development in urban areas is crucial. In this context, vegetation plays a significant role in urban planning, environmental protecting, and sustainable development policy making, heating and cooling requirements of buildings, displacement of animals dispersion, concentration of pollutants, and well-being. In numerous cities, vegetation is limited to public areas using GPS surveys or aerial remote sensing data. Recently, very high-resolution sensors as Light Detection and Ranging (LiDAR) data have permitted significant improvements in vegetation mapping in urban areas. This paper presents an evaluation of a new generation of airborne LIDAR bi-spectral discrete point (Optech titan) for mapping and characterizing urban vegetation. The methodology is based on a four-step approach: 1) the analysis of the quality of data in order to estimate noise between the green and near-infrared LIDAR point clouds; 2) this enables to remove the topographic effects and 3) a first classification, devoted to the elimination of the non-vegetation class, is performed based on the intensity value of the two channels; finally, in 4), the tree coverage is classified into seven categories of strata combination. To this end specific descriptors related to the organization of the point clouds are used. These first results show that compared to monospectral LiDAR data, bi-spectral LiDAR enables to improve significantly both the extraction and the characterization of urban objects. This reveals new perspectives for mapping and characterizing urban patterns and other complex structures.

  18. Bispectral methods of signal processing applications in radar, telecommunications and digital image restoration

    CERN Document Server

    Totsky, Alexander V; Kravchenko, Victor F

    2015-01-01

    By studying applications in radar, telecommunications and digital image restoration, this monograph discusses signal processing techniques based on bispectral methods. Improved robustness against different forms of noise as well as preservation of phase information render this method a valuable alternative to common power-spectrum analysis used in radar object recognition, digital wireless communications, and jitter removal in images.

  19. [Usefulness of monitoring anaesthesia with the bispectral index in upper gastrointestinal endoscopies with spontaneous breathing].

    Science.gov (United States)

    Alados-Arboledas, F J; Millán-Bueno, M P; Expósito-Montes, J F; Santiago-Gutierrez, C; Arévalo-Garrido, A; Pérez-Parras, A; Millán-Miralles, L; Martínez-Padilla, M C; de la Cruz-Moreno, J

    2013-08-01

    The objective of this investigation is to determine whether bispectral index (BIS®) monitoring during intravenous anaesthesia with spontaneous breathing for upper gastrointestinal endoscopy (UGE) in a pediatric population is useful for: a) decreasing the amount of drug, b) decreasing the time for awakening, and c) improving patient safety. A quasi-experimental case-control prospective study was conducted in the setting of a second level hospital pediatric intensive care unit. Children aged 1-13 years. ASA I patient who needed a diagnostic UGE; eligible, 36, participants, 30. historical cohort of patients who needed UGE (years 2008-2010): 50 patients. UGE performed with anaesthetic protocol, vital signs monitoring, sedation level (Ramsay scale) and BIS monitoring. propofol total dose (mg/kg), induction time, time in performing the UGE, awakening time (min); initial BIS (iBIS), and BIS during the UGE; adverse effects. There were no significant differences in sex, age or weight between case (B) and control (C) population. No significant differences in total propofol doses: (B 4.9 ± 1.4 mg/kg; C 5.2 ± 1.6 mg/kg, P=.492), awakening time (B 12.2 ± 4.6 min; C 12.8 ± 4.4 min, P=.402), time for execution of UGE (B 9.5 ± 4.8 min; C 11.3 ± 6.5 min, P=.335) and induction time (B 11.1 ± 2.6 min; C 10.1 ± 4.2 min, P=.059), iBIS 55.4 ± 6.9. There were no significant differences in adverse effects: 2 patients suffered from mild desaturation in the control group. BIS monitoring for diagnostic UGE in spontaneous breathing in a pediatric population is feasible, but does not appear to decrease awakening time or the amount of propofol needed. Furthermore, there was no statistically significant decrease in the number of adverse effects. Copyright © 2012 Asociación Española de Pediatría. Published by Elsevier Espana. All rights reserved.

  20. Monitoring sleep depth: analysis of bispectral index (BIS) based on polysomnographic recordings and sleep deprivation

    OpenAIRE

    Giménez Badia, Sandra; Romero Lafuente, Sergio; Alonso López, Joan Francesc; Mañanas Villanueva, Miguel Ángel; Pujol, Anna; Baxarias, Pilar; Antonijoan Arbós, Rosa Maria

    2015-01-01

    © 2015 Springer Science+Business Media Dordrecht The assessment and management of sleep are increasingly recommended in the clinical practice. Polysomnography (PSG) is considered the gold standard test to monitor sleep objectively, but some practical and technical constraints exist due to environmental and patient considerations. Bispectral index (BIS) monitoring is commonly used in clinical practice for guiding anesthetic administration and provides an index based on relationships between...

  1. Prediction of Bispectral Index during Target-controlled Infusion of Propofol and Remifentanil: A Deep Learning Approach.

    Science.gov (United States)

    Lee, Hyung-Chul; Ryu, Ho-Geol; Chung, Eun-Jin; Jung, Chul-Woo

    2018-03-01

    The discrepancy between predicted effect-site concentration and measured bispectral index is problematic during intravenous anesthesia with target-controlled infusion of propofol and remifentanil. We hypothesized that bispectral index during total intravenous anesthesia would be more accurately predicted by a deep learning approach. Long short-term memory and the feed-forward neural network were sequenced to simulate the pharmacokinetic and pharmacodynamic parts of an empirical model, respectively, to predict intraoperative bispectral index during combined use of propofol and remifentanil. Inputs of long short-term memory were infusion histories of propofol and remifentanil, which were retrieved from target-controlled infusion pumps for 1,800 s at 10-s intervals. Inputs of the feed-forward network were the outputs of long short-term memory and demographic data such as age, sex, weight, and height. The final output of the feed-forward network was the bispectral index. The performance of bispectral index prediction was compared between the deep learning model and previously reported response surface model. The model hyperparameters comprised 8 memory cells in the long short-term memory layer and 16 nodes in the hidden layer of the feed-forward network. The model training and testing were performed with separate data sets of 131 and 100 cases. The concordance correlation coefficient (95% CI) were 0.561 (0.560 to 0.562) in the deep learning model, which was significantly larger than that in the response surface model (0.265 [0.263 to 0.266], P < 0.001). The deep learning model-predicted bispectral index during target-controlled infusion of propofol and remifentanil more accurately compared to the traditional model. The deep learning approach in anesthetic pharmacology seems promising because of its excellent performance and extensibility.

  2. A bispectral q-hypergeometric basis for a class of quantum integrable models

    Science.gov (United States)

    Baseilhac, Pascal; Martin, Xavier

    2018-01-01

    For the class of quantum integrable models generated from the q-Onsager algebra, a basis of bispectral multivariable q-orthogonal polynomials is exhibited. In the first part, it is shown that the multivariable Askey-Wilson polynomials with N variables and N + 3 parameters introduced by Gasper and Rahman [Dev. Math. 13, 209 (2005)] generate a family of infinite dimensional modules for the q-Onsager algebra, whose fundamental generators are realized in terms of the multivariable q-difference and difference operators proposed by Iliev [Trans. Am. Math. Soc. 363, 1577 (2011)]. Raising and lowering operators extending those of Sahi [SIGMA 3, 002 (2007)] are also constructed. In the second part, finite dimensional modules are constructed and studied for a certain class of parameters and if the N variables belong to a discrete support. In this case, the bispectral property finds a natural interpretation within the framework of tridiagonal pairs. In the third part, eigenfunctions of the q-Dolan-Grady hierarchy are considered in the polynomial basis. In particular, invariant subspaces are identified for certain conditions generalizing Nepomechie's relations. In the fourth part, the analysis is extended to the special case q = 1. This framework provides a q-hypergeometric formulation of quantum integrable models such as the open XXZ spin chain with generic integrable boundary conditions (q ≠ 1).

  3. Quando o índice bispectral (BIS pode fornecer valores espúrios Cuando el índice bispectral (BIS puede suministrar valores falsos When the bispectral index (Bis can give false results

    Directory of Open Access Journals (Sweden)

    Leonardo Teixeira Domingues Duarte

    2009-02-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: O índice bispectral (BIS é um parâmetro multifatorial derivado do eletroencefalograma (EEG que permite a monitorização do componente hipnótico da anestesia. Foi obtido a partir de algoritmo derivado da análise de grande número de EEGs de voluntários e pacientes submetidos a sedações e anestesia geral com diferentes agentes anestésicos. Além de outros benefícios, o uso do BIS para monitorização da profundidade da anestesia reduz a ocorrência de despertar e memória intra-operatória. Esta revisão teve o objetivo de apresentar situações clínicas em que o BIS aponta valores espúrios, falsamente elevados ou reduzidos, em decorrência de condições do paciente ou ações de anestésicos não-previstos quando da elaboração do seu algoritmo. CONTEÚDO: Os valores do BIS podem sofrer alteração e influência em variadas situações clínicas em que há padrões anormais do EEG; efeito de diferentes anestésicos e outros fármacos não-incluídos na elaboração de seu algoritmo; interferência de equipamentos elétricos; bem como decorrentes de peculiaridades do monitor. CONCLUSÃO: Apesar de o algoritmo do BIS ter sofrido diversas alterações desde a sua primeira versão, essas situações que determinam variações espúrias dos valores do BIS devem ser reconhecidas pelo anestesiologista a fim de evitar complicações, sejam conseqüentes à sobredose anestésica, sejam por subdoses que poderão causar despertar e memória intra-operatória.JUSTIFICATIVA Y OBJETIVOS: El índice bispectral (BIS es un parámetro multifactorial derivado del electroencefalograma (EEG, que permite la monitorización del componente hipnótico de la anestesia. Fue obtenido a partir de algoritmo derivado del análisis de un gran número de EEG de voluntarios y pacientes sometidos a sedaciones y anestesia general con diferentes agentes anestésicos. Además de otros beneficios, el uso del BIS para la monitorización de la

  4. Capnography and the Bispectral Index—Their Role in Pediatric Sedation: A Brief Review

    Directory of Open Access Journals (Sweden)

    Maria Sammartino

    2010-01-01

    Full Text Available Sedation in children is increasingly emerging as a minimally invasive technique that may be associated with local anaesthesia or diagnostic and therapeutic procedures which do not necessarily require general anaesthesia. Standard monitoring requirements are not sufficient to ensure an effective control of pulmonary ventilation and deep sedation. Capnography in pediatric sedation assesses the effect of different drugs on the occurrence of respiratory failure and records early indicators of respiratory impairment. The Bispectral index (BIS allows the reduction of dose requirements of anaesthetic drugs, the reduction in the time to extubation and eye opening, and the reduction in the time to discharge. In the field of pediatric sedation, capnography should be recommended to prevent respiratory complications, particularly in spontaneous ventilation. The use of the BIS index, however, needs further investigation due to a lack of evidence, especially in infants. In this paper, we will investigate the role of capnography and the BIS index in improving monitoring standards in pediatric sedation.

  5. [Is there an appropriate bispectral index for upper gastrointestinal endoscopy in spontaneous breathing in the pediatric patient?].

    Science.gov (United States)

    Alados-Arboledas, F J; Millán-Bueno, M P; Expósito-Montes, J F; Arévalo-Garrido, A; Pérez-Parras, A; de la Cruz-Moreno, J

    2015-03-01

    The bispectral index (BIS) values that predict appropriate anesthetic level to perform an upper gastrointestinal endoscopy in spontaneous breathing are not well established in Pediatrics. The objective of this study is to determine whether it is possible to find an appropriate, less profound, BIS level in the pediatric patient that would enable an upper gastrointestinal endoscopy (UGE) to be performed in spontaneous breathing without causing gag reflex or motor response. A prospective study was designed and included 61 patients from 12-167 months old, and an ASAI-II who needed a diagnostic UGE. The study was conducted from October 2011 to March 2013. UGE performed with an anesthetic protocol using propofol. The vital signs measured were heart and respiratory rate, pulse oximetry, non-invasive blood pressure. The sedation level score (Ramsay scale) and BIS values were also measured. The first attempt was performed at BIS level 60-69, and this was not feasible, then the anesthetic was deepened and a second attempt made at BIS level 50-59. If this was still not possible a deeper anesthetic level was then achieved and a third attempt made at BIS level 45-49. Variables of interest were: effective BIS level (eBIS), BIS level at which UGE was performed without gag reflex or motor response; propofol total dose (mgkg(-1)), induction time (time from onset of sedation to effective start of UGE). A logistic regression analysis was performed to obtain an equation to estimate the possibility of UGE success. The distribution of the patient was: male 40%, female 60%, with 11 (18%) patients under 36 months. The statistical values are expressed as mean and standard deviation, with following results; age (months): 95.9±45.86; weight (kg): 30.5±14.68; effective BIS: 56.41±4.63; induction time (minutes): 11.07±2.69; total propofol dose (per kg): 4.86±1.21. An additional intra-procedure propofol bolus was given in 38 patients (62%), with 7/38 of them (18%) due to movement, and 31

  6. Electroconvulsive Therapy Under General Anesthesia With Cisatracurium, Laryngeal Mask Airways, and Bispectral Index.

    Science.gov (United States)

    Liu, Cai-Cai; Qian, Xiao-Yan; An, Jian-Xiong; Yu, Zeng-Lei; Wu, Jian-Ping; Wen, Hui; Cao, Zong-Xin; Wang, Yong; Fang, Qi-Wu; Williams, John P

    2016-03-01

    Electroconvulsive therapy (ECT) has dramatically reduced musculoskeletal complications when carried out with muscle relaxants under general anesthesia. However, seizure quality can be affected by the depth of anesthesia and choice of anesthetic agent. The purpose of this study was to describe a general anesthetic technique for ECT by using laryngeal mask, bispectral index (BIS), and muscle relaxant monitoring. Twenty-one patients, between ages 18 and 70 years (American Society of Anesthesiologists physical status I-III), who underwent a total of 89 sessions of ECT were examined in a retrospective study. Anesthesia was induced by use of propofol (1.0 mg/kg) followed by cisatracurium (0.2 mg/kg). The BIS, train-of-four, and end-tidal carbon dioxide were all monitored continuously. A laryngeal mask airway was used to maintain and protect the airway during the procedure. Electroconvulsive therapy stimuli were applied bilaterally when the train-of-four was assessed as being zero and BIS scores were 70. All patients then received 5 μg sufentanil and 2 mg midazolam, while titrated to maintain the BIS value at 40 to 50, before the muscle relaxation exhibited complete recovery. The mean duration of treatment process takes approximately 82.5 minutes. Mean (SD) seizure length was 58.8 (28.3) seconds, with 4.5% incidence of restimulation per treatment. Incidence of awareness was 0%. No patients exhibited delirium, nausea, vomiting, or myalgia in the postseizure phase. Bispectral index monitoring of the depth of anesthesia may have improved seizure quality, and awareness did not occur.

  7. Sudden cerebral depression detected by bispectral index monitoring in cryptococcal meningitis with elevated near-fatal cerebrospinal fluid pressure.

    Science.gov (United States)

    Matsumoto, Hironori; Annen, Suguru; Umakoshi, Kensuke; Takeba, Jun; Kikuchi, Satoshi; Nakabayashi, Yuki; Moriyama, Naoki; Ohshita, Muneaki; Aibiki, Mayuki

    2017-07-01

    An increase in cerebrospinal fluid pressure (CSFP) is usually prominent in cryptococcal meningitis, which has a high mortality rate, so aggressive management to control CSFP is crucial. In this case, a 40-year-old-man survived cryptococcal meningitis treated with continuous spinal drainage under bispectral index (BIS) monitoring. He unexpectedly showed hypertension, went into a coma, and even loss his light reflexes due to CSFP elevation. His BIS values had abruptly dropped before developing these symptoms, but dramatically recovered after lumbar puncture drainage, suggesting that BIS monitoring could reflect cerebral function changes due to CSFP alternations. Inducing continuous spinal drainage to control CSFP provided stable control of blood pressure and brain activity, which was continuously monitored by BIS, enabling us to provide prompt treatment. Cerebral depressions due to elevated CSFP may suddenly develop, so continuous spinal drainage is needed for preventing catastrophic events. Bispectral index could be useful for detecting early changes from CSFP elevation in meningitis cases with intracranial hypertension.

  8. Effects of bispectral index monitoring on isoflurane consumption and recovery profiles for anesthesia in an elderly asian population

    OpenAIRE

    Shafiq, Faraz; Naqvi, Hamid Iqil; Ahmed, Aliya

    2012-01-01

    Background: Age related limited physiological reserves and associated co-morbidities in elderly patients require careful titration of inhalational anesthetic agents to minimize their side effects. The use of Bispectral index (BIS) monitoring may be helpful in this regard. The objectives of this study were to evaluate the effect of BIS monitoring on Isoflurane consumption during maintenance and recovery profile at the end of anesthesia. This Quasi experimental study was conducted for a 1 year ...

  9. Changes to the bispectral index and regional cerebral blood flow in a sedative state, caused by midazolam administration

    OpenAIRE

    池田, 淳子; イケダ, ジュンコ; Junko, IKEDA

    2006-01-01

    Psychosedation, as used in the field of dentistry, is intended to provide trouble-free dental care while maintaining a proper level of sedation. One drug used in psychosedation is midazolam, which is known to have a strong amnestic effect. In the current research, I sought to clarify whether the bispectral index (BIS) using EEC analysis can be used for assessment of optimal sedation in psychosedation, and what effects midazolam has on the cerebrum's mechanism of memory. The subjects were 17 h...

  10. Benefit of general anesthesia monitored by bispectral index compared with monitoring guided only by clinical parameters. Systematic review and meta-analysis.

    Science.gov (United States)

    Oliveira, Carlos Rogério Degrandi; Bernardo, Wanderley Marques; Nunes, Victor Moisés

    The bispectral index parameter is used to guide the titration of general anesthesia; however, many studies have shown conflicting results regarding the benefits of bispectral index monitoring. The objective of this systematic review with meta-analysis is to evaluate the clinical impact of monitoring with the bispectral index parameter. The search for evidence in scientific information sources was conducted during December 2013 to January 2015, the following primary databases: Medline/PubMed, LILACS, Cochrane, CINAHL, Ovid, SCOPUS and TESES. The criteria for inclusion in the study were randomized controlled trials, comparing general anesthesia monitored, with bispectral index parameter with anesthesia guided solely by clinical parameters, and patients aged over 18 years. The criteria for exclusion were studies involving anesthesia or sedation for diagnostic procedures, and intraoperative wake-up test for surgery of the spine. The use of monitoring with the bispectral index has shown benefits reducing time to extubation, orientation in time and place, and discharge from both the operating room and post anesthetic care unit. The risk of nausea and vomiting after surgery was reduced by 12% in patients monitored with bispectral index. Occurred a reduction of 3% in the risk of cognitive impairment postoperatively at 3 months postoperatively and 6% reduction in the risk of postoperative delirium in patients monitored with bispectral index. Furthermore, the risk of intraoperative memory has been reduced by 1%. Clinically, anesthesia monitoring with the BIS can be justified because it allows advantages from reducing the recovery time after waking, mainly by reducing the administration of general anesthetics as well as the risk of adverse events. Copyright © 2016 Sociedade Brasileira de Anestesiologia. Published by Elsevier Editora Ltda. All rights reserved.

  11. [Benefit of general anesthesia monitored by bispectral index compared with monitoring guided only by clinical parameters. Systematic review and meta-analysis].

    Science.gov (United States)

    Oliveira, Carlos Rogério Degrandi; Bernardo, Wanderley Marques; Nunes, Victor Moisés

    The bispectral index parameter is used to guide the titration of general anesthesia; however, many studies have shown conflicting results regarding the benefits of bispectral index monitoring. The objective of this systematic review with meta-analysis is to evaluate the clinical impact of monitoring with the bispectral index parameter. The search for evidence in scientific information sources was conducted during December 2013 to January 2015, the following primary databases: Medline/PubMed, LILACS, Cochrane, CINAHL, Ovid, SCOPUS and TESES. The criteria for inclusion in the study were randomized controlled trials, comparing general anesthesia monitored, with bispectral index parameter with anesthesia guided solely by clinical parameters, and patients aged over 18 years. The criteria for exclusion were studies involving anesthesia or sedation for diagnostic procedures, and intraoperative wake-up test for surgery of the spine. The use of monitoring with the bispectral index has shown benefits reducing time to extubation, orientation in time and place, and discharge from both the operating room and post anesthetic care unit. The risk of nausea and vomiting after surgery was reduced by 12% in patients monitored with bispectral index. Occurred a reduction of 3% in the risk of cognitive impairment postoperatively at 3 months postoperatively and 6% reduction in the risk of postoperative delirium in patients monitored with bispectral index. Furthermore, the risk of intraoperative memory has been reduced by 1%. Clinically, anesthesia monitoring with the BIS can be justified because it allows advantages from reducing the recovery time after waking, mainly by reducing the administration of general anesthetics as well as the risk of adverse events. Copyright © 2016 Sociedade Brasileira de Anestesiologia. Publicado por Elsevier Editora Ltda. All rights reserved.

  12. Benefit of general anesthesia monitored by bispectral index compared with monitoring guided only by clinical parameters. Systematic review and meta-analysis

    Directory of Open Access Journals (Sweden)

    Carlos Rogério Degrandi Oliveira

    Full Text Available Abstract Background: The bispectral index parameter is used to guide the titration of general anesthesia; however, many studies have shown conflicting results regarding the benefits of bispectral index monitoring. The objective of this systematic review with meta-analysis is to evaluate the clinical impact of monitoring with the bispectral index parameter. Methods: The search for evidence in scientific information sources was conducted during December 2013 to January 2015, the following primary databases: Medline/PubMed, LILACS, Cochrane, CINAHL, Ovid, SCOPUS and TESES. The criteria for inclusion in the study were randomized controlled trials, comparing general anesthesia monitored, with bispectral index parameter with anesthesia guided solely by clinical parameters, and patients aged over 18 years. The criteria for exclusion were studies involving anesthesia or sedation for diagnostic procedures, and intraoperative wake-up test for surgery of the spine. Results: The use of monitoring with the bispectral index has shown benefits reducing time to extubation, orientation in time and place, and discharge from both the operating room and post anesthetic care unit. The risk of nausea and vomiting after surgery was reduced by 12% in patients monitored with bispectral index. Occurred a reduction of 3% in the risk of cognitive impairment postoperatively at 3 months postoperatively and 6% reduction in the risk of postoperative delirium in patients monitored with bispectral index. Furthermore, the risk of intraoperative memory has been reduced by 1%. Conclusion: Clinically, anesthesia monitoring with the BIS can be justified because it allows advantages from reducing the recovery time after waking, mainly by reducing the administration of general anesthetics as well as the risk of adverse events.

  13. [Application of bispectral index monitoring in sedation and analgesia for flexible bronchoscopy].

    Science.gov (United States)

    Fang, S R; Liu, Y J; Su, N J; Shu, Y; Gu, W

    2017-12-12

    Objective: To investigate the feasibility of using bispectral index monitoring in sedation and analgesia for bronchoscopy. Methods: Totally 285 patients admitted to the Respiratory Medicine Department of Nanjing First Hospital for bronchoscopy between June 2016 and December 2016 were assigned, according to their own wishes, into a conscious sedation group (171 cases receiving local anesthesia and conscious sedation, 89 males, 82 females, mean age 59±10 years) and a control group (114 cases undergoing local anesthesia, 59 males, 55 females, average age 61±12 years). The 2 groups were compared in terms of operation time, blood pressure, heart rate and other indicators during bronchoscopy including incidence of adverse events, memory of the procedure, willingness to be re-examined, safety of sedation and analgesia for bronchoscopy under bispectral index monitoring, and patient satisfaction in the postoperative follow-up. Results: The conscious sedation group and the control group had no difference in age and sex ratio( P >0.05). Compared with the patients in the control group(operation time 16±5 min and systolic blood pressure 153±21 mmHg, 1 mmHg=0.133 kPa), those in the conscious sedation group had a shorter operation time(14±5 min) and a lower systolic blood pressure(144±22 mmHg), with statistically significant difference ( P sedation group and 92±12 mmHg and 87±14 times/min in the control group, P >0.05). Adverse events, overall intraoperative cough and bleeding were found to be significantly reduced in the conscious sedation group (27%, 4% and 13% and 60%, 13% and 35% in the control group, P sedation group, and 14% in the control group, P =0.72). Patient satisfaction and willingness to be re-examined were markedly higher in the conscious sedation group (97%) than in the controls (4%, P sedation and analgesia for bronchoscopy and has higher patient satisfaction, suggesting that it is a potential tool for use in clinical practice.

  14. Lower Bispectral index values in psychiatric patients: A prospective, observational study

    Directory of Open Access Journals (Sweden)

    Venkatapura J Ramesh

    2014-01-01

    Full Text Available Background : Bispectral index score (BIS is a processed electroencephalographic parameter used to measure level of sedation in anaesthetised patients. In few studies of psychiatric patients undergoing electroconvulsive therapy (ECT, it was observed that the BIS values were lower at baseline. It is not clear from those studies whether the BIS values are really low. Also, it is not clear whether the lower values are related to the primary psychiatric illness or the due to the effect of ECT. Therefore, we studied the BIS values in psychiatric illnesses and compared them with the normal controls. Materials and Methods : BIS index was recorded in 237 patients with various psychiatric illness (Group P and 40 control patients without any psychiatric illness undergoing spinal surgery (Group C. BIS values were recorded in supine position before breakfast and before the morning doses of antipsychotic/benzodiazepine medications. It was recorded during resting state in all the subjects. Results : BIS values were lower in group P compared to control group (a mean of 89.8 ± 7.8 vs 95.7 ± 2.4, P < 0.0001. In the group P, the patients with psychosis and bipolar disorder had significantly lower BIS values than the patients with depression (P = 0.04. Conclusions : BIS values in psychiatric patients are lower than those in the control group. Psychotic and bipolar disorders are associated with significantly lower BIS values than the depression.

  15. Bispectral index monitoring for conscious sedation in intervention: better, safer, faster

    Energy Technology Data Exchange (ETDEWEB)

    Bell, J.K.; Laasch, H.-U.; Wilbraham, L.; England, R.E.; Morris, J.A.; Martin, D.F. E-mail: derrick.martin@smtr.nhs.uk

    2004-12-01

    AIM: The aim of this study was to compare subjective (Ramsay sedation score, RSS) with objective electroencephalogram-based bispectral index (BIS) assessment, and to validate the appropriate BIS range for measurement of conscious sedation in interventional procedures. MATERIALS AND METHODS: One hundred patients undergoing sedo-analgesia (midazolam and fentanyl) for interventional gastrointestinal procedures were divided into two groups. In group A (n=30) sedation was guided by the RSS with the operator blinded to the BIS recording. In group B (n=70) the operator titrated intravenous sedation to maintain an optimal BIS, predetermined from the results in group A. Recovery time, procedure duration, physiological parameters and unplanned events were recorded in both groups. RESULTS: There was a significant correlation between the BIS and RSS (p<0.001). BIS values of 87.2 and 80.9 corresponded to an RSS of 3 and 4, respectively. The optimal BIS level was defined as 80-85. Fifty-seven point five percent of readings were within this range in group B compared with 26.5% in group A (p<0.001). Sedation approaching general anaesthesia (BIS<60) occurred in 5.5% of patients in group A but not in group B. Mean recovery time, duration of procedure, midazolam and fentanyl doses were significantly reduced in group B. Unplanned events were reduced from 27 to 17%, but this was not statistically significant (p=0.29). CONCLUSION: BIS monitoring enables more effective titration of sedatives to maintain a suitable level of consciousness, whilst reducing procedure time. The BIS offers an objective, safe and reliable measure of sedation, without disturbing either patient or operator. BIS monitoring raises the standard of patient care, and in our view, should be used to augment standard assessment.

  16. Bispectral index monitoring for conscious sedation in intervention: better, safer, faster

    International Nuclear Information System (INIS)

    Bell, J.K.; Laasch, H.-U.; Wilbraham, L.; England, R.E.; Morris, J.A.; Martin, D.F.

    2004-01-01

    AIM: The aim of this study was to compare subjective (Ramsay sedation score, RSS) with objective electroencephalogram-based bispectral index (BIS) assessment, and to validate the appropriate BIS range for measurement of conscious sedation in interventional procedures. MATERIALS AND METHODS: One hundred patients undergoing sedo-analgesia (midazolam and fentanyl) for interventional gastrointestinal procedures were divided into two groups. In group A (n=30) sedation was guided by the RSS with the operator blinded to the BIS recording. In group B (n=70) the operator titrated intravenous sedation to maintain an optimal BIS, predetermined from the results in group A. Recovery time, procedure duration, physiological parameters and unplanned events were recorded in both groups. RESULTS: There was a significant correlation between the BIS and RSS (p<0.001). BIS values of 87.2 and 80.9 corresponded to an RSS of 3 and 4, respectively. The optimal BIS level was defined as 80-85. Fifty-seven point five percent of readings were within this range in group B compared with 26.5% in group A (p<0.001). Sedation approaching general anaesthesia (BIS<60) occurred in 5.5% of patients in group A but not in group B. Mean recovery time, duration of procedure, midazolam and fentanyl doses were significantly reduced in group B. Unplanned events were reduced from 27 to 17%, but this was not statistically significant (p=0.29). CONCLUSION: BIS monitoring enables more effective titration of sedatives to maintain a suitable level of consciousness, whilst reducing procedure time. The BIS offers an objective, safe and reliable measure of sedation, without disturbing either patient or operator. BIS monitoring raises the standard of patient care, and in our view, should be used to augment standard assessment

  17. Nonlinear cardio-respiratory interactions revealed by time-phase bispectral analysis

    International Nuclear Information System (INIS)

    Jamsek, Janez; Stefanovska, Aneta; McClintock, Peter V E

    2004-01-01

    Bispectral analysis based on high order statistics, introduced recently as a technique for revealing time-phase relationships among interacting noisy oscillators, has been used to study the nature of the coupling between cardiac and respiratory activity. Univariate blood flow signals recorded simultaneously by laser-Doppler flowmetry on both legs and arms were analysed. Coupling between cardiac and respiratory activity was also checked by use of bivariate data and computation of the cross-bispectrum between the ECG and respiratory signals. Measurements were made on six healthy males aged 25-27 years. Recordings were taken during spontaneous breathing (20 min), and during paced respiration at frequencies both lower and higher than that of spontaneous respiration (either two or three recordings with a constant frequency in the interval between 0.09 and 0.35 Hz). At each paced frequency recordings were taken for 12 min. It was confirmed that the dynamics of blood flow can usefully be considered in terms of coupled oscillators, and demonstrated that interactions between the cardiac and respiratory processes are weak and time-varying, and that they can be nonlinear. Nonlinear coupling was revealed to exist during both spontaneous and paced respiration. When present, it was detected in all four blood flow signals and in the cross-bispectrum between the ECG and respiratory signal. The episodes with nonlinear coupling were detected in 11 out of 22 recordings and lasted between 19 s in the case of high frequency (0.34 Hz) and 106 s in the case of low frequency paced respiration (0.11 Hz)

  18. Comparison of Bispectral Index and Entropy values with electroencephalogram during surgical anaesthesia with sevoflurane.

    Science.gov (United States)

    Aho, A J; Kamata, K; Jäntti, V; Kulkas, A; Hagihira, S; Huhtala, H; Yli-Hankala, A

    2015-08-01

    Concomitantly recorded Bispectral Index® (BIS) and Entropy™ values sometimes show discordant trends during general anaesthesia. Previously, no attempt had been made to discover which EEG characteristics cause discrepancies between BIS and Entropy. We compared BIS and Entropy values, and analysed the changes in the raw EEG signal during surgical anaesthesia with sevoflurane. In this prospective, open-label study, 65 patients receiving general anaesthesia with sevoflurane were enrolled. BIS, Entropy and multichannel digital EEG were recorded. Concurrent BIS and State Entropy (SE) values were selected. Whenever BIS and SE values showed ≥10-unit disagreement for ≥60 s, the raw EEG signal was analysed both in time and frequency domain. A ≥10-unit disagreement ≥60 s was detected 428 times in 51 patients. These 428 episodes accounted for 5158 (11%) out of 45 918 analysed index pairs. During EEG burst suppression, SE was higher than BIS in 35 out of 49 episodes. During delta-theta dominance, BIS was higher than SE in 141 out of 157 episodes. During alpha or beta activity, SE was higher than BIS in all 49 episodes. During electrocautery, both BIS and SE changed, sometimes in the opposite direction, but returned to baseline values after electrocautery. Electromyography caused index disagreement four times (BIS > SE). Certain specific EEG patterns, and artifacts, are associated with discrepancies between BIS and SE. Time and frequency domain analyses of the original EEG improve the interpretation of studies involving BIS, Entropy and other EEG-based indices. NCT01077674. © The Author 2015. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Bispectral index monitoring in dogs/ Monitoramento do índice biespectral em cães

    Directory of Open Access Journals (Sweden)

    Newton Nunes

    2003-05-01

    Full Text Available Nowadays, in the attempt to complement anesthetic patient monitoring, clinical variables analyzes and electrophysiologic techniques are being used. However it is difficult to obtain determinant and uniform information about anesthetic plans for all types of anesthetic agents. Consequently, a monitor of anesthetic depth known as bispectral index (BIS has been developed through multiple studies and technical advances. Therefor, this review aimed to provide information about the BIS in dogs. Additionally, considerations related to its development, function and proper manipulation were made, and also behavior aspects of this parameter when applied in different anesthetics.Atualmente, na tentativa de complementar a monitoração anestésica dos pacientes, utilizam-se a análise de variáveis clínicas ou técnicas eletrofisiológicas. Entretanto, é difícil utilizá-las para se obterem informações determinantes e uniformes dos planos anestésicos, para todos os agentes anestésicos. Conseqüentemente, foi desenvolvido, através de múltiplas investigações e avanços tecnológicos, o que se pode definir como monitor de profundidade anestésica, o monitor de índice biespectral (BIS. Desta forma, objetivou-se com este trabalho, fornecer informações a respeito do monitoramento do BIS, em cães. Além disso, foram abordadas considerações relativas ao seu desenvolvimento, função, manipulação adequada e aspectos referentes ao comportamento desta variável quando usada com diferentes agentes anestésicos.

  20. Rain/No-Rain Identification from Bispectral Satellite Information using Deep Neural Networks

    Science.gov (United States)

    Tao, Y.

    2016-12-01

    Satellite-based precipitation estimation products have the advantage of high resolution and global coverage. However, they still suffer from insufficient accuracy. To accurately estimate precipitation from satellite data, there are two most important aspects: sufficient precipitation information in the satellite information and proper methodologies to extract such information effectively. This study applies the state-of-the-art machine learning methodologies to bispectral satellite information for Rain/No-Rain detection. Specifically, we use deep neural networks to extract features from infrared and water vapor channels and connect it to precipitation identification. To evaluate the effectiveness of the methodology, we first applies it to the infrared data only (Model DL-IR only), the most commonly used inputs for satellite-based precipitation estimation. Then we incorporates water vapor data (Model DL-IR + WV) to further improve the prediction performance. Radar stage IV dataset is used as ground measurement for parameter calibration. The operational product, Precipitation Estimation from Remotely Sensed Information Using Artificial Neural Networks Cloud Classification System (PERSIANN-CCS), is used as a reference to compare the performance of both models in both winter and summer seasons.The experiments show significant improvement for both models in precipitation identification. The overall performance gains in the Critical Success Index (CSI) are 21.60% and 43.66% over the verification periods for Model DL-IR only and Model DL-IR+WV model compared to PERSIANN-CCS, respectively. Moreover, specific case studies show that the water vapor channel information and the deep neural networks effectively help recover a large number of missing precipitation pixels under warm clouds while reducing false alarms under cold clouds.

  1. Can bispectral index or auditory evoked potential index predict implicit memory during propofol-induced sedation?

    Science.gov (United States)

    Wang, Yun; Yue, Yun; Sun, Yong-hai; Wu, An-shi

    2006-06-05

    Some patients still suffer from implicit memory of intraoperative events under adequate depth of anaesthesia. The elimination of implicit memory should be a necessary aim of clinical general anaesthesia. However, implicit memory cannot be tested during anaesthesia yet. We propose bispectral index (BIS) and auditory evoked potential index (AEPI), as predictors of implicit memory during anaesthesia. Thirty-six patients were equally divided into 3 groups according to the Observer's Assessment of Alertness/Sedation Score: A, level 3; B, level 2; and C, level 1. Every patient was given the first auditory stimulus before sedation. Then every patient received the second auditory stimulus after the target level of sedation had been reached. BIS and AEPI were monitored before and after the second auditory stimulus presentation. Four hours later, the inclusion test and exclusion test were performed on the ward using process dissociation procedure and the scores of implicit memory estimated. In groups A and B but not C, implicit memory estimates were statistically greater than zero (P memory scores in group A did not differ significantly from those in group B (P > 0.05). Implicit memory scores correlated with BIS and AEPI (P AEPI. The 95% cutoff points of BIS and AEPI for predicting implicit memory are 47 and 28, respectively. Implicit memory does not disappear until the depth of sedation increases to level 1 of OAA/S score. Implicit memory scores correlate well with BIS and AEPI during sedation. BIS is a better index for predicting implicit memory than AEPI during propofol induced sedation.

  2. Bispectral Index Monitoring Reduces the Dosage of Propofol and Adverse Events in Sedation for Endobronchial Ultrasound.

    Science.gov (United States)

    Quesada, Natividad; Júdez, Diego; Martínez Ubieto, Javier; Pascual, Ana; Chacón, Enrique; De Pablo, Francisco; Mincholé, Elisa; Bello, Salvador

    2016-01-01

    Current guidelines recommend monitoring the anesthetic depth of sedation during respiratory endoscopy by using clinical scales despite their subjective nature and the potential change in the level of sedation caused by frequent stimulation. Monitoring by means of the bispectral index (BIS) has shown its utility in reducing the use of drugs and their adverse events in general anesthesia, but evidence in prolonged sedation is insufficient. Our objective was to evaluate BIS in patients undergoing endobronchial ultrasound (EBUS). A randomized cohort study of 90 patients with mediastinal lymph node involvement and/or lung or mediastinal lesions for whom EBUS was indicated, comparing the modified observer's assessment of alertness/sedation scale clinical evaluation (n = 45) versus the BIS evaluation (n = 45) of sedation with propofol-remifentanil, was conducted in order to evaluate the clinical parameters, doses used, adverse events, and tolerance of the procedure. We found a shorter waking time and a significantly lower dose of total propofol in the BIS group. Significantly fewer overall adverse events were recorded in the BIS group and included desaturation, hypotension, and bradypnea. Tolerance was better in the BIS group. No significant differences were found in terms of cough, memory of the procedure, or the level of difficulty of EBUS on the part of the pulmonologists. BIS monitoring of sedation in EBUS makes it possible to reduce the dosage of propofol, thereby shortening the waking time and reducing adverse events. This form of monitoring should be taken into consideration in the future for systematic use in prolonged sedation, as in the case of EBUS. © 2016 S. Karger AG, Basel.

  3. The accuracy and clinical feasibility of a new Bayesian-based closed-loop control system for propofol administration using the bispectral index as a controlled variable

    NARCIS (Netherlands)

    De Smet, Tom; Struys, Michel M. R. F.; Neckebroek, Martine M.; Van den Hauwe, Kristof; Bonte, Sjoert; Mortier, Eric P.

    2008-01-01

    BACKGROUND: Closed-loop control of the hypnotic component of anesthesia has been proposed in an attempt to optimize drug delivery. Here, we introduce a newly developed Bayesian-based, patient-individualized, model-based, adaptive control method for bispectral index (BIS) guided propofol infusion

  4. Comparison of a new composite index based on midlatency auditory evoked potentials and electroencephalographic parameters with bispectral index (BIS) during moderate propofol sedation.

    Science.gov (United States)

    Hadzidiakos, D; Petersen, S; Baars, J; Herold, K; Rehberg, B

    2006-11-01

    Derived parameters of the electroencephalogram and auditory evoked potentials can be used to determine depth of anaesthesia and sedation. However, it is not known whether any parameter can identify the occurrence of awareness in individual patients. We have compared the performance of bispectral index and a new composite index derived from auditory evoked potentials and the electroencephalogram (AAI 1.61) in predicting consciousness, explicit and implicit memory during moderate sedation with propofol. Twenty-one patients with spinal anaesthesia received intraoperatively propofol at the age-corrected C(50) for loss of consciousness and were presented test words via headphones. Bispectral index and AAI 1.61 (auditory evoked potentials, AEP-Monitor2) were recorded in parallel as well as the Observer's Assessment of Alertness/Sedation-score. Postoperatively, testing for explicit and implicit memory formation was performed. Bispectral index and AAI 1.61 correlated well with loss of consciousness defined by an Observer's Assessment of Alertness/Sedation-score of 2 (identical P(K) of 0.87), but did not allow a prediction of postoperative explicit or implicit recall. Both bispectral index and AAI may be indices of depth of sedation rather than indicators of memory formation, which persists during propofol sedation even after loss of consciousness.

  5. Monitoring sleep depth: analysis of bispectral index (BIS) based on polysomnographic recordings and sleep deprivation.

    Science.gov (United States)

    Giménez, Sandra; Romero, Sergio; Alonso, Joan Francesc; Mañanas, Miguel Ángel; Pujol, Anna; Baxarias, Pilar; Antonijoan, Rosa Maria

    2017-02-01

    The assessment and management of sleep are increasingly recommended in the clinical practice. Polysomnography (PSG) is considered the gold standard test to monitor sleep objectively, but some practical and technical constraints exist due to environmental and patient considerations. Bispectral index (BIS) monitoring is commonly used in clinical practice for guiding anesthetic administration and provides an index based on relationships between EEG components. Due to similarities in EEG synchronization between anesthesia and sleep, several studies have assessed BIS as a sleep monitor with contradictory results. The aim of this study was to evaluate objectively both the feasibility and reliability of BIS for sleep monitoring through a robust methodology, which included full PSG recordings at a baseline situation and after 40 h of sleep deprivation. Results confirmed that the BIS index was highly correlated with the hypnogram (0.89 ± 0.02), showing a progressive decrease as sleep deepened, and an increase during REM sleep (awake: 91.77 ± 8.42; stage N1: 83.95 ± 11.05; stage N2: 71.71 ± 11.99; stage N3: 42.41 ± 9.14; REM: 80.11 ± 8.73). Mean and median BIS values were lower in the post-deprivation night than in the baseline night, showing statistical differences for the slow wave sleep (baseline: 42.41 ± 9.14 vs. post-deprivation: 39.49 ± 10.27; p = 0.02). BIS scores were able to discriminate properly between deep (N3) and light (N1, N2) sleep. BIS values during REM overlapped those of other sleep stages, although EMG activity provided by the BIS monitor could help to identify REM sleep if needed. In conclusion, BIS monitors could provide a useful measure of sleep depth in especially particular situations such as intensive care units, and they could be used as an alternative for sleep monitoring in order to reduce PSG-derived costs and to increase capacity in ambulatory care.

  6. Comparison of bispectral index and entropy monitoring in patients undergoing internalisation of deep brain stimulators

    Directory of Open Access Journals (Sweden)

    Suparna Bharadwaj

    2016-01-01

    Full Text Available Introduction: Depth of anaesthesia (DOA monitors are shown to reduce the intra-operative dose of anaesthetic agents, provide haemodynamic stability and shorten emergence times. Electroencephalography (EEG based DOA monitors such as bispectral index (BIS and entropy have been calibrated and validated in healthy subjects. Hence the clinical effectiveness of these monitors may be affected when monitoring patients with neurological disorders (e.g., epilepsy, dystonia, dementia and Parkinson's disease. The aim of this study was to determine whether BIS and entropy correlate with each other and with clinical indices of DOA in patients with movement disorders under general anaesthesia (GA. Materials and Methods: We conducted a prospective, observational study in patients with movement disorders undergoing internalization of deep brain stimulators. All patients received standard GA with age-adjusted mean alveolar concentration (aaMAC of an inhalational agent between 0.7 and 1.1. BIS and entropy sensors were applied on the patient's left forehead. Data collected included clinical parameters and EEG-based DOA indices. Correlation analysis was performed between entropy, BIS and the clinical indices of DOA. Bland Altman analysis was performed to determine the agreement between BIS and entropy. Results: Thirty patients were studied (mean age was 58.4 ± 11 years, male: female 18:12 and weight 79.2 ± 17 kg. Indications for deep brain stimulation were Parkinson's disease (n = 25, essential tremors (n = 2 and dystonia (n = 3. There was a very strong positive correlation between BIS and response entropy (RE (r = 0.932 and BIS and state entropy (SE (r = 0.950 and a strong negative correlation among aaMAC and BIS, RE and SE with r values of −0.686, −0.788 and −0.732, respectively. However, there was no correlation between BIS, RE, SE and haemodynamic values. Conclusion: Our study showed that BIS and entropy perform well in patients with movement disorders

  7. Effects of Phenytoin Therapy on Bispectral Index and Haemodynamic Changes Following Induction and Tracheal Intubation

    Directory of Open Access Journals (Sweden)

    Parmod P Bithal

    2009-01-01

    Full Text Available Laryngoscopy and tracheal intubation (LTI increase blood pressure and heart rate (HR. Intensity of these changes is influenced by the anaesthetic depth assessed by the bispectral index (BIS. We determined the effect of phenytoin on anaesthetic depth and its influence on haemodynamics following LTI. Fifty patients of ASA grades I and II on oral phenytoin 200 to 300mg per day for more than one week were compared with 48 control patients. Standard anaesthesia technique was followed. BIS, non invasive mean blood pressure (MBP and HR were recorded 30, 60, 90 and 120 sec after LTI. Phenytoin group needed lesser thiopentone for induction, 5 mg (1.1 vs. 4.3 mg (0.7 [p=0.036]. BIS was significantly lower in the phenytoin group vs. the control 30, 60, 90 and 120 sec after LTI [43.1 (16.0 vs. 48.9 (14.9, p=0.068, 56.3 (16.7 vs. 64.3 (14.4, p=0.013, 59.8 (15.8 vs. 67.5 (12.1, p=0.008, 62.6 (14 vs. 68.9 (11.2, p=0.017, and 64.2 (11.3 vs. 69 (11.7, p=0.033], respectively. MBP was also lower in the phenytoin group 30, 60, 90 and 120 sec after LTI [112.8 mmHg (13.8, vs. 117.9 mmHg (18 p=0.013, 108.6 (12.8 vs. 117.5 (16 p=0.003, 106.1 mmHg (14.1 vs. 113.2 mmHg (14.9, p=0.017, 101.8 mmHg (13.8 vs. 109.5 mmHg (14.1, p=0.007], respectively. HR was lower in phenytoin group at 30 sec. (p=0.027, 60 sec (p=0.219, and again at 120 sec (p=0.022. Oral phenytoin therapy for over a week results in greater anaesthetic depth as observed using BIS, which also attenuated haemodynamic response of LTI.

  8. Validation of the bispectral index as an indicator of anesthetic depth in Thoroughbred horses anesthetized with sevoflurane.

    Science.gov (United States)

    Tokushige, Hirotaka; Kakizaki, Masashi; Ode, Hirotaka; Okano, Atsushi; Okada, Jun; Kuroda, Taisuke; Wakuno, Ai; Ohta, Minoru

    2016-01-01

    To evaluate the bispectral index (BIS) as an indicator of anesthetic depth in Thoroughbred horses, BIS values were measured at multiple stages of sevoflurane anesthesia in five horses anesthetized with guaifenesin and thiopental following premedication with xylazine. There was no significant difference between the BIS values recorded at end-tidal sevoflurane concentrations of 2.8% (median 60 ranging from 47 to 68) and 3.5% (median 71 ranging from 49 to 82) in anesthetized horses. These BIS values during anesthesia were significantly lower (Phorses (median 98 ranging from 98 to 98) or sedated horses (median 92 ranging from 80 to 93). During the recovery phase, the BIS values gradually increased over time but did not significantly increase until the horses showed movement. In conclusion, the BIS value could be useful as an indicator of awakening during the recovery period in horses, as previous reported.

  9. [Clinical evaluation of midazolam intravenous sedation under bispectral index monitoring on romoval of anterior supernumerary teeth in children].

    Science.gov (United States)

    Guan, Ming; Wang, En-bo; Liu, Yu; Cui, Nian-hui; Ding, Bei; Zhang, Wei

    2012-02-18

    To evaluate the efficacy and safety of midazolam intravenous sedation plus local anaesthesia on romoval of children's anterior supernumerary teeth in dental clinic. A total of 41 ASA I children with anterior supernumerary teeth aged 6 to 14 were selected for removal surgery, anaesthesia was done by moderate sedation by midazolam intravenous titration plus local anaesthesia. Heart rate (HR), blood pressure (BP), pulse oxygen saturation rate (SpO(2)), bispectral index (BIS) and Ramsay sedation score (RSS) at different time points were recorded (5 min after patient is in operation room, at local anaesthesia injection, at incision, 10 min after incision and at the end of operation). After operation, the overall efficacy of sedation by Houpt rating scale was evaluated by surgeon, anaesthesiologist and anaesthetic nurse. Among the 41 children, 29 were male, 12 were female, mean age (9.76 ± 2.46) years old; The average operation time was (23.83 ± 9.98) min, total dose of midazolam was (2.96 ± 0.92) mg with a dosage rate being (0.084 ± 0.016) mg/kg. There was a positive correlation between age and total dose (r=0.69, Psupernumerary teeth when BIS value is above 75.

  10. Awareness of bispectral index monitoring system among the critical care nursing personnel in a tertiary care hospital of India

    Directory of Open Access Journals (Sweden)

    Shikha Thakur

    2011-01-01

    Full Text Available Background: Bispectral index monitoring system (BIS is one of the several systems used to measure the effects of anaesthetic and sedative drugs on the brain and to track changes in the patient′s level of sedation and hypnosis. BIS monitoring provides information clinically relevant to the adjustment of dosages of sedating medication. It can help the nursing personnel in preventing under- and over sedation among intensive care unit (ICU patients. Objective: The present study was conducted to assess the knowledge of nursing personnel working in the ICU regarding BIS. Methods: Fifty-four subjects participated in the study. A structured questionnaire was developed to assess the knowledge of the nursing personnel regarding BIS. Focus group discussions were held among the nursing personnel to know their views regarding BIS. Results: Mean age (years of the subjects was 30.7΁7.19 (21-47 years, with a female preponderance. Although the use of BIS in ICU is not common, majority (94.44% were aware of BIS and its purpose. 79.62% of the subjects knew about its implication in patient care. The mean knowledge score of the subjects was 11.87΁2.43 (maximum score being 15. Conclusion: There exists an awareness among the critical care nursing staff in our institution regarding BIS and its clinical implications. Its use in the critical care setting may benefit the patients in terms of providing optimal sedation.

  11. Pharmacodynamic interaction between propofol and remifentanil regarding hypnosis, tolerance of laryngoscopy, bispectral index, and electroencephalographic approximate entropy.

    Science.gov (United States)

    Bouillon, Thomas W; Bruhn, Jörgen; Radulescu, Lucian; Andresen, Corina; Shafer, Thomas J; Cohane, Carol; Shafer, Steven L

    2004-06-01

    The purpose of this investigation was to describe the pharmacodynamic interaction between propofol and remifentanil for probability of no response to shaking and shouting, probability of no response to laryngoscopy, Bispectral Index (BIS), and electroencephalographic approximate entropy (AE). Twenty healthy volunteers received either propofol or remifentanil alone and then concurrently with a fixed concentration of remifentanil or propofol, respectively, via a target-controlled infusion. Responses to shaking and shouting and to laryngoscopy were assessed multiple times after allowing for plasma effect site equilibration. The raw electroencephalogram and BIS were recorded throughout the study, and AE was calculated off-line. Response surfaces were fit to the clinical response data using logistic regression or hierarchical response models. Response surfaces were also estimated for BIS and AE. Surfaces were visualized using three-dimensional rotations. Model parameters were estimated with NONMEM. Remifentanil alone had no appreciable effect on response to shaking and shouting or response to laryngoscopy. Propofol could ablate both responses. Modest remifentanil concentrations dramatically reduced the concentrations of propofol required to ablate both responses. The hierarchical response surface described the data better than empirical logistic regression. BIS and AE are more sensitive to propofol than to remifentanil. Remifentanil alone is ineffective at ablating response to stimuli but demonstrates potent synergy with propofol. BIS and AE values corresponding to 95% probability of ablating response are influenced by the combination of propofol and remifentanil to achieve this endpoint, with higher propofol concentrations producing lower values for BIS and AE.

  12. Effects of bispectral index monitoring on isoflurane consumption and recovery profiles for anesthesia in an elderly asian population

    Science.gov (United States)

    Shafiq, Faraz; Naqvi, Hamid Iqil; Ahmed, Aliya

    2012-01-01

    Background: Age related limited physiological reserves and associated co-morbidities in elderly patients require careful titration of inhalational anesthetic agents to minimize their side effects. The use of Bispectral index (BIS) monitoring may be helpful in this regard. The objectives of this study were to evaluate the effect of BIS monitoring on Isoflurane consumption during maintenance and recovery profile at the end of anesthesia. This Quasi experimental study was conducted for a 1 year period at the main operating units of a tertiary care hospital. Materials and Methods: Total 60 patients of age 60 years and above were enrolled in either standard practice (SP) or (BIS) group. In the SP group, the anesthesia depth was maintained as a routine clinical practice, while in BIS group it was maintained by monitoring the BIS score between 45 and 55. Standard anesthesia care was provided to all of the patients. Data including demographics, isoflurane consumption, hemodynamic variables and recovery profiles were recorded in both groups. Results: The mean isoflurane consumption was lower (P = 0.001) in the BIS group. The time to eye opening, extubation and ready to shift was shorter (P = 0.0001) in BIS group. The patients in BIS group had higher Post anesthesia recovery score (P = 0.0001) than the SP group. Conclusion: The use of BIS in an elderly Asian population resulted in 40% reduction of isoflurane usage. The patients having BIS monitoring awoke earlier and had better recovery profiles at the end of anesthesia. PMID:22869943

  13. Comparison of Bispectral Index™ values during the flotation restricted environmental stimulation technique and results for stage I sleep: a prospective pilot investigation.

    Science.gov (United States)

    Dunham, C Michael; McClain, Jesse V; Burger, Amanda

    2017-11-29

    To determine whether Bispectral Index™ values obtained during flotation-restricted environment stimulation technique have a similar profile in a single observation compared to literature-derived results found during sleep and other relaxation-induction interventions. Bispectral Index™ values were as follows: awake-state, 96.6; float session-1, 84.3; float session-2, 82.3; relaxation-induction, 82.8; stage I sleep, 86.0; stage II sleep, 66.2; and stages III-IV sleep, 45.1. Awake-state values differed from float session-1 (%difference 12.7%; Cohen's d = 3.6) and float session-2 (%difference 14.8%; Cohen's d = 4.6). Relaxation-induction values were similar to float session-1 (%difference 1.8%; Cohen's d = 0.3) and float session-2 (%difference 0.5%; Cohen's d = 0.1). Stage I sleep values were similar to float session-1 (%difference 1.9%; Cohen's d = 0.4) and float session-2 (%difference 4.3%; Cohen's d = 1.0). Stage II sleep values differed from float session-1 (%difference 21.5%; Cohen's d = 4.3) and float session-2 (%difference 19.6%; Cohen's d = 4.0). Stages III-IV sleep values differed from float session-1 (%difference 46.5%; Cohen's d = 5.6) and float session-2 (%difference 45.2%; Cohen's d = 5.4). Bispectral Index™ values during flotation were comparable to those found in stage I sleep and nadir values described with other relaxation-induction techniques.

  14. Effect of age on the performance of bispectral and entropy indices during sevoflurane pediatric anesthesia: a pharmacometric study.

    Science.gov (United States)

    Sciusco, Alberto; Standing, Joseph F; Sheng, Yucheng; Raimondo, Pasquale; Cinnella, Gilda; Dambrosio, Michele

    2017-04-01

    Bispectral index (BIS) and entropy monitors have been proposed for use in children, but research has not supported their validity for infants. However, effective monitoring of young children may be even more important than for adults, to aid appropriate anesthetic dosing and reduce the chance of adverse consequences. This prospective study aimed to investigate the relationships between age and the predictive performance of BIS and entropy monitors in measuring the anesthetic drug effects within a pediatric surgery setting. We concurrently recorded BIS and entropy (SE/RE) in 48 children aged 1 month-12 years, undergoing general anesthesia with sevoflurane and fentanyl. Nonlinear mixed effects modeling was used to characterize the concentration-response relationship independently between the three monitor indicators with sevoflurane. The model's goodness-of-fit was assessed by prediction-corrected visual predictive checks. Model fit with age was evaluated using absolute conditional individual weighted residuals (|CIWRES|). The ability of BIS and entropy monitors to describe the effect of anesthesia was compared with prediction probabilities (P K ) in different age groups. Intraoperative and awakening values were compared in the age groups. The correlation between BIS and entropy was also calculated. |CIWRES| vs age showed an increasing trend in the model's accuracy for all three indicators. P K probabilities were similar for all three indicators within each age group, though lower in infants. The linear correlations between BIS and entropy in different age groups were lower for infants. Infants also tended to have lower values during surgery and at awakening than older children, while toddlers had higher values. Performance of both monitors improves as age increases. Our results suggest a need for the development of new monitor algorithms or calibration to better account for the age-specific EEG dynamics of younger patients. © 2017 John Wiley & Sons Ltd.

  15. Listening to music during anesthesia does not reduce the sevoflurane concentration needed to maintain a constant bispectral index.

    Science.gov (United States)

    Szmuk, Peter; Aroyo, Nimrod; Ezri, Tiberiu; Muzikant, Gleb; Weisenberg, Marian; Sessler, Daniel I

    2008-07-01

    Music reduces stress responses in awake subjects. However, there remains controversy about the role of music or therapeutic suggestions during general anesthesia and postoperative recovery. We thus tested the hypothesis that intraoperative exposure to soothing music reduces the end-tidal concentration of sevoflurane (ETSevo) necessary to maintain bispectral index (BIS) near 50 during laparoscopic surgery. Forty patients, aged 40-60 yrs, ASA I and II, undergoing laparoscopic hernias or cholecystectomy under general anesthesia were studied. All patients were connected to a BIS monitor. Anesthesia was induced with fentanyl 2 microg/kg, sevoflurane in oxygen, rocuronium (0.6 mg/kg), and maintained with sevoflurane in oxygen and 50% nitrous oxide, with an infusion of fentanyl (1 microg x kg(-1) x h(-1)). Sevoflurane was titrated to maintain BIS near 50 throughout the procedure. Patients were randomly assigned to either listen to music or not. The ETSevo necessary to maintain a BIS near 50 was virtually identical in patients who listened to music (1.29 +/- 0.33%) and those who did not (1.27 +/- 0.33%, P = 0.84). Patients who listened to music reported slightly less pain, but the difference was not statistically significant. Mean arterial blood pressure was slightly higher in patients who listened to music (101 +/- 11 mm Hg) than in those who did not (94 +/- 10 mm Hg, P = 0.040). The end-tidal concentration of sevoflurane required to maintain BIS near 50 during laparoscopic cholecystectomy was virtually identical in patients exposed to music or not. Although previous work suggests that music reduces preoperative stress and may be useful during sedation, our results do not support the use of music during surgery.

  16. [Anesthesia recovery comparison between remifentanil-propofol and remifentanil-desflurane guided by Bispectral Index® monitoring].

    Science.gov (United States)

    Rocha, Raphael Grossi; Almeida, Eduardo Giarola; Carneiro, Lara Moreira Mendes; Almeida, Natália Farias de; Boas, Walkíria Wingester Vilas; Gomez, Renato Santiago

    There is a strong demand for fast and predictable anesthesia recovery with few side effects. Choice of the hypnotic agent could impact on that. This study investigated the differences between recoveries after remifentanil-propofol and remifentanil-desflurane anesthesias guided by bispectral index (BIS ® ). Forty patients were randomly assigned into 2 groups according to the anesthesia technique applied: remifentanil-propofol (REM-PRO) and remifentanil-desflurane (REM-DES). After the discontinuation of the anesthetics, the times to extubation, to obey commands and to recover the airway protection reflex were recorted. In the post-anesthetic recovery room (PACU) it was recorded the occurrence of nausea and vomiting (PONV), scores of Ramsay sedation scale and of numeric pain scale (NPS), morphine dose and length of stay in the unit. Data from 38 patients were analyzed: 18 from REM-PRO and 20 from REM-DES group. Anesthesia times were similar (REM-PRO=193min, SD 79.9 vs. 175.7min, SD 87.9 REM-DES; p=0.5). REM-DES had shorter times than REM-PRO group: time to follow command (8.5min; SD 3.0 vs. 5.6min; SD 2.5; p=0.0) and extubation time (6.2 minutes; 3.1-8.5 vs. 9.5 minutes; 4.9-14.4; p=0.0). Times to recover airway protective reflex were similar: 16 patients from REM-PRO (88.9%) restored the airway protective reflex 2min after extubation vs. 17 from REM-DES (89.5%); and 2 patients from REM-PRO (11.1%) vs. 2 from REM-DES (10.5%) 6min after extubation, p=1. Ramsay sedation score, NPS, PONV incidents, morphine dose and PACU stay of length PACU were also similar. Remifentanil-desflurane-based anesthesia has a faster extubation time and to follow command than remifentanil-propofol-based anesthesia when both guided by BIS ® . Copyright © 2016 Sociedade Brasileira de Anestesiologia. Publicado por Elsevier Editora Ltda. All rights reserved.

  17. Differences between state entropy and bispectral index during analysis of identical electroencephalogram signals: a comparison with two randomised anaesthetic techniques.

    Science.gov (United States)

    Pilge, Stefanie; Kreuzer, Matthias; Karatchiviev, Veliko; Kochs, Eberhard F; Malcharek, Michael; Schneider, Gerhard

    2015-05-01

    It is claimed that bispectral index (BIS) and state entropy reflect an identical clinical spectrum, the hypnotic component of anaesthesia. So far, it is not known to what extent different devices display similar index values while processing identical electroencephalogram (EEG) signals. To compare BIS and state entropy during analysis of identical EEG data. Inspection of raw EEG input to detect potential causes of erroneous index calculation. Offline re-analysis of EEG data from a randomised, single-centre controlled trial using the Entropy Module and an Aspect A-2000 monitor. Klinikum rechts der Isar, Technische Universität München, Munich. Forty adult patients undergoing elective surgery under general anaesthesia. Blocked randomisation of 20 patients per anaesthetic group (sevoflurane/remifentanil or propofol/remifentanil). Isolated forearm technique for differentiation between consciousness and unconsciousness. Prediction probability (PK) of state entropy to discriminate consciousness from unconsciousness. Correlation and agreement between state entropy and BIS from deep to light hypnosis. Analysis of raw EEG compared with index values that are in conflict with clinical examination, with frequency measures (frequency bands/Spectral Edge Frequency 95) and visual inspection for physiological EEG patterns (e.g. beta or delta arousal), pathophysiological features such as high-frequency signals (electromyogram/high-frequency EEG or eye fluttering/saccades), different types of electro-oculogram or epileptiform EEG and technical artefacts. PK of state entropy was 0.80 and of BIS 0.84; correlation coefficient of state entropy with BIS 0.78. Nine percent BIS and 14% state entropy values disagreed with clinical examination. Highest incidence of disagreement occurred after state transitions, in particular for state entropy after loss of consciousness during sevoflurane anaesthesia. EEG sequences which led to false 'conscious' index values often showed high

  18. Recorded time periods of bispectral index values equal to zero predict neurological outcome after out-of-hospital cardiac arrest.

    Science.gov (United States)

    Eertmans, Ward; Genbrugge, Cornelia; Haesevoets, Gilles; Dens, Jo; Boer, Willem; Jans, Frank; De Deyne, Cathy

    2017-08-22

    Prognostication in out-of-hospital cardiac arrest (OHCA) survivors is often difficult. Recent studies have shown the predictive ability of bispectral index (BIS) monitoring to assist with early neuroprognostication. The aim of this study was to investigate whether characteristics of BIS values equal to zero (BIS 0) (i.e. duration and/or uni- versus bilateral presence) instead of simply their occurrence are better indicators for poor neurological outcome after OHCA by aiming at a specificity of 100%. Between 2011 and 2015, all successfully resuscitated OHCA patients were treated with targeted temperature management (TTM) at 33 °C for 24 hours followed by rewarming over 12 hours (0.3 °C/h). In total, BIS values were registered in 77 OHCA patients. The occurrence of unilateral (BIS 0 at one hemisphere) and bilateral (BIS 0 at both hemispheres) BIS 0 values as well as their total duration were calculated. Receiver operating characteristic (ROC) curves were constructed using the total duration with BIS 0 values calculated from the initiation of TTM onwards to determine poor neurological outcome. In 30 of 77 OHCA patients (39%), at least one BIS 0 value occurred during the first 48 hours after admission. Of these 30 patients, six (20%) had a good (cerebral performance category (CPC) 1-2) and 24 (80%) a poor neurological outcome (CPC3-5) at 180 days post-CA. Within these 30 patients, the incidence of bilateral BIS 0 values was higher in patients with poor neurological outcome (CPC1-2: 2 (33%) vs. CPC3-5: 19 (79%); p = 0.028). The presence of a BIS 0 value predicted poor neurological outcome with a sensitivity of 62% and specificity of 84% (AUC: 0.729; p = 0.001). With a ROC analysis, a total duration of 30,3 minutes with BIS 0 values calculated over the first 48 hours predicted poor neurological outcome with a sensitivity of 63% and specificity of 100% (AUC: 0.861; p = 0.007). This study shows that a prolonged duration with (bilateral) BIS 0 values

  19. Changes to the bispectral index and regional cerebral blood flow in a sedative state, caused by midazolam administration

    International Nuclear Information System (INIS)

    Ikeda, Junko

    2006-01-01

    Psychosedation, as used in the field of dentistry, is intended to provide trouble-free dental care while maintaining a proper level of sedation. One drug used in psychosedation is midazolam, which is known to have a strong amnestic effect. In the current research, I sought to clarify whether the bispectral index (BIS) using electroencephalogram (EEG) analysis can be used for assessment of optimal sedation in psychosedation, and what effects midazolam has on the cerebrum's mechanism of memory. The subjects were 17 healthy adult volunteers. Intravenous sedation involved a single administration of 0.06 mg/kg midazolam, or 6 mg/kg/h propofol, administered for 5 minutes and then continuously administered for 25 minutes at 3 mg/kg/h. For nitrous oxide inhalation sedation, 10-30% nitrous oxide was used. Clinical sedation and the BIS were measured in a variety of circumstances. To examine the effects of midazolam on the central nervous system, changes in brain oxygen consumption in visual memory tasks were assessed through observing changes in areas of brain activation using 3T fMRI. With intravenous sedation using midazolam or propofol, the BIS decreased immediately after drug administration, and the BIS at which optimal sedation was clinically determined was about 65. In contrast, no decrease in the BIS was noted with nitrous oxide inhalation sedation. In observing areas of brain activation by fMRI, the oxygen consumption mainly of visual cortices in the occipital lobe increased as a result of stimulation by visual memory tasks. Regardless of the amnestic effect midazolam produced in subjects, it did not suppress activation of the visual cortices in the occipital lobe. In intravenous sedation using midazolam or propofol, the BIS is effective in determining optimal sedation, and appropriate perioperative management can be performed using the BIS. However, in nitrous oxide inhalation sedation it appears that the BIS cannot be used to monitor levels of sedation. Amnestic

  20. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  1. The Use of the Bispectral Index in the Detection of Pain in Mechanically Ventilated Adults in the Intensive Care Unit: A Review of the Literature

    Directory of Open Access Journals (Sweden)

    Robin Marie Coleman

    2015-01-01

    Full Text Available BACKGROUND: Pain assessment is an immense challenge for clinicians, especially in the context of the intensive care unit, where the patient is often unable to communicate verbally. Several methods of pain assessment have been proposed to assess pain in this environment. These include both behavioural observation scales and evaluation of physiological measurements such as heart rate and blood pressure. Although numerous validation studies pertaining to behavioural observation scales have been published, several limitations associated with using these measures for pain assessment remain. Over the past few years, researchers have been interested in the use of the bispectral index monitoring system as a proxy for the evaluation of encephalography readings to assess the level of anesthesia and, potentially, analgesia.

  2. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    with a variant of the classic BGW protocol. The protocol is secure against a semi-honest adversary. In Chapter 4 we describe a new protocol for VIFF that is secure against malicious adversaries. The protocol guarantees termination if the adversary allows a preprocessing phase to terminate, in which...... systems hosted by an untrusted provider. It guarantees atomic read and write operations on the shared data when the service is correct and preserves fork-linearizability when the service is faulty. A prototype has been implemented on top of the Subversion revision control system; benchmarks show...

  3. Geneva protocols

    International Nuclear Information System (INIS)

    Kimminich, O.

    1990-01-01

    The First Protocol Additional to the Geneva Conventions of 1949 and relating to the Protection of Victims of International Armed Conflicts contains provisions prohibiting indiscriminate attacks. Nuclear warfare as such is not mentioned in the Protocol. It has been asserted that the Protocol does not apply to nuclear weapons for several reasons. However, close analysis shows that the rules governing the application of means and methods of warfare cannot exempt the nuclear weapons. If nuclear weapons are applied in a manner not consistent with article 51 of Protocol I, their use is forbidden by this article even in situations in which general international law might grant an exception from the ban on nuclear weapons, as in the case of reprisal. (orig./HSCH) [de

  4. Effects of Hypothermic Cardiopulmonary Bypass on Internal Jugular Bulb Venous Oxygen Saturation, Cerebral Oxygen Saturation, and Bispectral Index in Pediatric Patients Undergoing Cardiac Surgery: A Prospective Study

    Science.gov (United States)

    Hu, Zhiyong; Xu, Lili; Zhu, Zhirui; Seal, Robert; McQuillan, Patrick M.

    2016-01-01

    Abstract The objective of this study was to evaluate the effect of hypothermic cardiopulmonary bypass (CPB) on cerebral oxygen saturation (rSO2), internal jugular bulb venous oxygen saturation (SjvO2), mixed venous oxygen saturation (SvO2), and bispectral index (BIS) used to monitor cerebral oxygen balance in pediatric patients. Sixty American Society of Anesthesiologists Class II-III patients aged 1 to 4 years old with congenital heart disease scheduled for elective cardiac surgery were included in this study. Temperature, BIS, rSO2, mean arterial pressure, central venous pressure, cerebral perfusion pressure (CPP), and hematocrit were recorded. Internal jugular bulb venous oxygen saturation and SvO2 were obtained from blood gas analysis at the time points: after induction of anesthesia (T0), beginning of CPB (T1), ascending aortic occlusion (T2), 20 minutes after initiating CPB (T3), coronary reperfusion (T4), separation from CPB (T5), and at the end of operation (T6). The effect of hypothermia or changes in CPP on rSO2, SjvO2, SvO2, and BIS were analyzed. Compared with postinduction baseline values, rSO2 significantly decreased at all-time points: onset of extracorporeal circulation, ascending aortic occlusion, 20 minutes after CPB initiation, coronary reperfusion, and separation from CPB (P  0.05). Correlation analysis demonstrated that rSO2 was positively related to CPP (r = 0.687, P = 0.000), with a low linear correlation to temperature (r = 0.453, P = 0.000). Internal jugular bulb venous oxygen saturation was negatively related to temperature (r = −0.689, P = 0.000). Bispectral index was positively related to both temperature (r = 0.824, P = 0.000) and CPP (r = 0.782, P = 0.000). Cerebral oxygen saturation had a positive linear correlation with CPP and a low linear correlation to temperature. Internal jugular bulb venous oxygen saturation had a negative linear correlation to temperature. Pre-and and early

  5. Comparative evaluation of the cerebral state index/sup TM/ and bispectral index/sup TM/ monitoring during propofol-remifentanil anesthesia for open heart surgery

    International Nuclear Information System (INIS)

    Shahbazi, S.; Saem, J.

    2007-01-01

    The Cerebral State index (CSI) is a new index based on electroencephalogram to monitor depth of anesthesia. Transferring guidelines for titration of the Bispectral index (BIS) to the CSI depends on their compatibility. We compared the relationship between BIS and CSI values during propofol-remifentanil anesthesia. Forty one adult patients about to have open heart surgeries were enrolled. The skin was prepped and electrodes of both monitors were applied according to the manufacturers recommendations. The anesthesia was induced by midazolam, propofol, remifentanil and pancuronium and maintained by propofol and remifentanil and 50% nitrous oxide in oxygen. The BIS and CSI values were recorded in 37 pre-determined milestones during the operation and the anesthetic drugs were adjusted according to clinical signs of light anesthesia regardless of the CSI or BIS values. The BIS and CSI values decreased progressively from pre induction values of 93.15 (55-100) and 88.86 (52-100) to post induction values of 38.72 (16-71) and 40.27 (5-69), respectively. These values showed good linear correlation during laryngoscopy, before and after surgical incision and during CPB; R=0.695 with determination coefficient of 0.483. We found a good correlation between BIS and CSI values. Our results might serve as a blue print for a rational translation of BIS into CSI values. (author)

  6. Effects of closed-loop intravenous anesthesia guided by the Bispectral index in adult patients on emergence delirium. A randomized controlled study.

    Science.gov (United States)

    Cotoia, Antonella; Mirabella, Lucia; Beck, Renata; Matrella, Pompeo; Assenzo, Valentina; Chazot, Thierry; Cinnella, Gilda; Liu, Ngai; Dambrosio, Michele

    2017-12-13

    Emergence delirium (ED) is an acute change in cognition after general anesthesia (GA) occurring in operative room, recovery room or in postanesthesia care. The automated propofolremifentanil titration by Bispectral index (BIS) (AutoTIVA) avoids period of deep (BISMini-Mental State Examination (MMSE) changes. One hundred thirty two adult patients scheduled for elective urologic surgery wererandomized in: AutoTIVA, desflurane (DES), sevoflurane (SEVO), ManualTIVA anesthesia. TheMMSE was performed before GA and 15 min after tracheal extubation. The percentage of BIS 40-60 was significantly higher in the AutoTIVA compared to DES, SEVO and ManualTIVA (respectively 87% vs 78 %, 58%, 39%, p≤0.001). The percentage of BIS<40 was significantly lower in AutoTIVA than in the other groups (p<0.001). No difference in hemodynamics was found among groups. Postoperative MMSE scores were similar to baseline in the AutoTIVA (26 [24-28] vs 26 [23-28]) while they markedly decreased in all other groups (p<0.001). Postoperative MMSE decreased at any age. None experienced awareness was recorded. Our results suggest that patients treated with AutoTIVA performed better in the cognitive test compared to the other groups receiving manual target-controlled GA due to a higher adequatelevel of anesthesia measured by BIS. Cognitive tests should be performed to test ED in all patients undergoing GA.

  7. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  8. Bispectral index values during sevoflurane-nitrous oxide general anesthesia in women undergoing cesarean delivery: a comparison between women with and without prior labor.

    Science.gov (United States)

    Yoo, Kyung Y; Jeong, Cheol W; Kang, Myung W; Kim, Seok J; Chung, Sung T; Shin, Min H; Lee, JongUn

    2008-06-01

    An end-tidal concentration of 1% sevoflurane (1% ET(SEVO)) in 50% nitrous oxide (N(2)O) during elective cesarean delivery has been associated with bispectral index (BIS) values >60, which are associated with an increased risk of awareness. We hypothesized that BIS values during sevoflurane-N(2)O general anesthesia for cesarean delivery would be lower in women with prior labor compared with women without prior labor. Forty patients undergoing cesarean delivery were enrolled in this observational study. One group had urgent surgery after labor (labor group, n = 20) and the other had elective surgery without labor (control group, n = 20). General anesthesia was induced with thiopental 4 mg/kg, followed by succinylcholine 1.5 mg/kg, and maintained with 1% ET(SEVO) and 50% N(2)O in oxygen. BIS values, systolic arterial blood pressure, heart rate, plasma stress hormone concentrations, Apgar scores, and postoperative analgesia variables were assessed and compared between groups. BIS values during the period between intubation and delivery were lower in the labor group than in the control group (P labor group than in the control group both at baseline and at delivery. Systolic arterial blood pressure, heart rate, Apgar scores, surgical characteristics, and plasma concentrations of vasopressin and cortisol were not different between groups. Postoperative visual analog scale pain scores were similar between groups, while the labor group consumed less analgesics (P labor was associated with lower intraoperative BIS values during sevoflurane/N(2)O general anesthesia and reduced postoperative analgesic consumption in women undergoing cesarean delivery compared with women without prior labor.

  9. The effect of different doses of esmolol on hemodynamic, bispectral index and movement response during orotracheal intubation: prospective, randomized, double-blind study

    Directory of Open Access Journals (Sweden)

    Mensure Yılmaz Çakırgöz

    2014-12-01

    Full Text Available Objective: A prospective, randomized and double-blind study was planned to identify the optimum dose of esmolol infusion to suppress the increase in bispectral index values and the movement and hemodynamic responses to tracheal intubation. Materials and methods: One hundred and twenty patients were randomly allocated to one of three groups in a double-blind fashion. 2.5 mg kg-1 propofol was administered for anesthesia induction. After loss of consciousness, and before administration of 0.6 mg kg-1 rocuronium, a tourniquet was applied to one arm and inflated to 50 mm Hg greater than systolic pressure. The patients were divided into 3 groups; 1 mg kg-1 h-1 esmolol was given as the loading dose and in Group Es50 50 μg kg-1 min-1, in Group Es150 150 μg kg-1 min-1, and in Group Es250 250 μg kg-1 min-1 esmolol infusion was started. Five minutes after the esmolol has been begun, the trachea was intubated; gross movement within the first minute after orotracheal intubation was recorded. Results: Incidence of movement response and the ΔBIS max values were comparable in Group Es250 and Group Es150, but these values were significantly higher in Group Es50 than in the other two groups. In all three groups in the 1st minute after tracheal intubation heart rate and mean arterial pressure were significantly higher compared to values from before intubation (p < 0.05. In the study period there was no significant difference between the groups in terms of heart rate and mean arterial pressure. Conclusion: In clinical practise we believe that after 1 mg kg-1 loading dose, 150 μg kg-1 min-1 iv esmolol dose is sufficient to suppress responses to tracheal intubation without increasing side effects.

  10. Changes in the Bispectral Index in Response to Loss of Consciousness and No Somatic Movement to Nociceptive Stimuli in Elderly Patients.

    Science.gov (United States)

    Yang, Ning; Yue, Yun; Pan, Jonathan Z; Zuo, Ming-Zhang; Shi, Yu; Zhou, Shu-Zhen; Peng, Wen-Ping; Gao, Jian-Dong

    2016-02-20

    Bispectral index (BIS) is considered very useful to guide anesthesia care in elderly patients, but its use is controversial for the evaluation of the adequacy of analgesia. This study compared the BIS changes in response to loss of consciousness (LOC) and loss of somatic response (LOS) to nociceptive stimuli between elderly and young patients receiving intravenous target-controlled infusion (TCI) of propofol and remifentanil. This study was performed on 52 elderly patients (aged 65-78 years) and 52 young patients (aged 25-58 years), American Society of Anesthesiologists physical status I or II. Anesthesia was induced with propofol administered by TCI. A standardized noxious electrical stimulus (transcutaneous electrical nerve stimulation, [TENS]) was applied (50 Hz, 80 mA, 0.25 ms pulses for 4 s) to the ulnar nerve at increasing remifentanil predicted effective-site concentration (Ce) until patients lost somatic response to TENS. Changes in awake, prestimulus, poststimulus BIS, heart rate, mean arterial pressure, pulse oxygen saturation, predicted plasma concentration, Ce of propofol, and remifentanil at both LOC and LOS clinical points were investigated. BISLOCin elderly group was higher than that in young patient group (65.4 ± 9.7 vs. 57.6 ± 12.3) (t = 21.58, P elderly patients, which was significantly lower than that in young patients (2.3 ± 0.5 μg/ml) (t = 7.474, P elderly patients (65.6 ± 10.7 vs. 65.4 ± 9.7), and there were no marked differences between elderly and young patient groups in BISawake, BISLOS, and Ce of remifentanil required for LOS. In elderly patients, BIS can be used as an indicator for hypnotic-analgesic balance and be helpful to guide the optimal administration of propofol and remifentanil individually. CTRI Reg. No: ChiCTR-OOC-14005629; http://www.chictr.org.cn/showproj.aspx?proj=9875.

  11. Hemodynamics and bispectral index (BIS of dogs anesthetized with midazolam and ketamine associated with medetomidine or dexmedetomidine and submitted to ovariohysterectomy Avaliação hemodinâmica e do índice bispectral (BIS de cadelas anestesiadas com midazolam e cetamina associados à medetomidina ou dexmedetomidina e submetidas a ovário-salpingo-histerectomia

    Directory of Open Access Journals (Sweden)

    Fernando do Carmo Silva

    2010-04-01

    Full Text Available PURPOSE: To evaluate hemodynamics and bispectral index (BIS in bitches anesthetized with ketamine and midazolam in combination with dexmedetomidine or medetomidine and submitted to ovariohysterectomy. METHODS: Twenty bitches pretreated with levomedetomidine and buprenorphine were anesthetized with 5 mg.kg-1 ketamine and 0.2 mg.kg-1 midazolam i.v. Continuous infusion of 0.4 mg.kg-1.h-1 midazolam and 20 mg.kg-1.h-1 ketamine was initiated in combination with DEX (n=10: 20 µg.kg-1.h-1 dexmedetomidine or MED (n=10: 30 µg.kg-1.h-1 medetomidine over 30 minutes. A pharmacokinetic study provided dexmedetomidine plasma concentration, set to be 3.0 ng.mL-1. RESULTS: BIS decreased in both groups (P0.05, but heart rate decreased in both groups, as compared to control values (POBJETIVO: Verificar o comportamento hemodinâmico e o índice bispectral de cadelas anestesiadas com cetamina e midazolam associados à dexmedetomidina ou medetomidina. MÉTODOS: Vinte cadelas receberam pré-tratamento com levomepromazina e buprenorfina e foram anestesiadas com cetamina, 5 mg.kg-1 i.v., e midazolam, 0,2 mg.kg-1 i.v., seguidos da administração contínua de midazolam, 0,4 mg.kg-1.h-1, e cetamina, 20 mg.kg-1.h-1, associados, conforme o grupo, à: DEX (n=10: dexmedetomidina 20 µg.kg-1.h-1 ou MED (n=10: medetomidina 30 µg.kg-1.h-1, mantidos por 30 minutos. A dose de dexmedetomidina foi obtida por meio de estudo farmacocinético planejando-se concentração plasmática de 3,0 ng.mL-1. RESULTADOS: Os valores do BIS diminuíram em ambos os grupos (P0,05, sem a presença de efeitos adversos. CONCLUSÃO: A administração contínua de dexmedetomidina em concentração plasmática calculada de 3 ng.mL-1, em combinação com midazolam e cetamina, resulta em plano anestésico adequado para castração de cadelas, estabilidade hemodinâmica e despertar tranquilo, sem efeitos adversos.

  12. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impacts...... process can be applied to better capture opinions of different experts, thereby maximizing the evidential basis. Elaborating on manageability of invasive species is further needed to fully answer all risk analysis requirements. Tackling the issue of invasive species urges better handling of the acquired...

  13. ANALYSIS OF INDEXED-GUIDED HIGHLY BIREFRINGENT ...

    African Journals Online (AJOL)

    Research. 2008, 80, 307-320. [5] Nozhat N. and Granpayeh N. Progress In Electromagnetics Research. 2009, 99, 225-. 244. [6] Chau et al. Progress In Electromagnetics Research B. 2010, 22, 39-52. [7] SUN Y. S. et al. Japanese Journal of Applied Physics. 2008, 47(5), 3755–3759. [8] Zhang X., Zhao J. Nucl. Instr. and Meth ...

  14. ANALYSIS OF INDEXED-GUIDED HIGHLY BIREFRINGENT ...

    African Journals Online (AJOL)

    ABSTRACT. In this paper, a comparative study of three geometries of highly birefringent photonic crystal fibers (HB PCF) is presented. The proposed geometries are: V type PCF,. Pseudo-Panda PCF and selectively liquid-filled PCF. Based on the famous Finite. Difference Time Domain (FDTD) method with the perfectly ...

  15. Is the patient state analyzer with the PSArray2 a cost-effective alternative to the bispectral index monitor during the perioperative period?

    Science.gov (United States)

    White, Paul F; Tang, Jun; Ma, Hong; Wender, Ronald H; Sloninsky, Alexander; Kariger, Robert

    2004-11-01

    New disposable electrodes, the PSArray and XP sensor, have been developed for the patient state analyzer (PSA) and the bispectral index (BIS) monitors, respectively. We designed this clinical study to compare the sensitivity and specificity of the patient state index (PSI) with the BIS during the perioperative period when the new electrode sensors were used. Twenty-two consenting patients scheduled for elective laparoscopic procedures were enrolled in this prospective study. The elapsed time to apply electrodes and obtain a baseline index value was recorded, as were the comparative PSI and BIS values at specific time intervals during the induction, maintenance, and emergence periods in patients who were administered a standardized general anesthetic. In addition, the changes in these indices were recorded after a bolus dose of propofol (20 mg IV) or a 2% increase or decrease in the inspired concentration of desflurane during the maintenance period. The total elapsed time to obtain an index value was similar with both devices (66 +/- 32 s versus 72 +/- 41 s for the PSA and BIS, respectively). By using logistic regression models, both the BIS and PSI were found to be equally effective as predictors of unconsciousness (i.e., failure to respond to verbal stimuli). The PSI also correlated with the BIS during both the induction of (R = 0.85) and the emergence from (R = 0.74) general anesthesia. The area under the receiver operating characteristic curve for detection of consciousness also indicated a similar performance with the PSI (0.98 +/- 0.05) and the BIS (0.97 +/- 0.05). During the maintenance period, the PSI values tended to be lower than the BIS value; however, the responses to changes in propofol and desflurane were similar. Finally, the PSI (versus BIS) values showed less interference from the electrocautery unit during the operation (31% versus 73%, respectively). Although the list price of the PSArray(2) disposable electrode strip (USD $24.95) was higher than

  16. A Framework Based on 2-D Taylor Expansion for Quantifying the Impacts of Subpixel Reflectance Variance and Covariance on Cloud Optical Thickness and Effective Radius Retrievals Based on the Bispectral Method

    Science.gov (United States)

    Zhang, Z.; Werner, F.; Cho, H.-M.; Wind, G.; Platnick, S.; Ackerman, A. S.; Di Girolamo, L.; Marshak, A.; Meyer, K.

    2016-01-01

    The bispectral method retrieves cloud optical thickness (t) and cloud droplet effective radius (re) simultaneously from a pair of cloud reflectance observations, one in a visible or near-infrared (VIS/NIR) band and the other in a shortwave infrared (SWIR) band. A cloudy pixel is usually assumed to be horizontally homogeneous in the retrieval. Ignoring subpixel variations of cloud reflectances can lead to a significant bias in the retrieved t and re. In the literature, the retrievals of t and re are often assumed to be independent and considered separately when investigating the impact of subpixel cloud reflectance variations on the bispectral method. As a result, the impact on t is contributed only by the subpixel variation of VIS/NIR band reflectance and the impact on re only by the subpixel variation of SWIR band reflectance. In our new framework, we use the Taylor expansion of a two-variable function to understand and quantify the impacts of subpixel variances of VIS/NIR and SWIR cloud reflectances and their covariance on the t and re retrievals. This framework takes into account the fact that the retrievals are determined by both VIS/NIR and SWIR band observations in a mutually dependent way. In comparison with previous studies, it provides a more comprehensive understanding of how subpixel cloud reflectance variations impact the t and re retrievals based on the bispectral method. In particular, our framework provides a mathematical explanation of how the subpixel variation in VIS/NIR band influences the re retrieval and why it can sometimes outweigh the influence of variations in the SWIR band and dominate the error in re retrievals, leading to a potential contribution of positive bias to the re retrieval. We test our framework using synthetic cloud fields from a large-eddy simulation and real observations from Moderate Resolution Imaging Spectroradiometer. The predicted results based on our framework agree very well with the numerical simulations. Our

  17. A Framework Based on 2-D Taylor Expansion for Quantifying the Impacts of Sub-Pixel Reflectance Variance and Covariance on Cloud Optical Thickness and Effective Radius Retrievals Based on the Bi-Spectral Method

    Science.gov (United States)

    Zhang, Z.; Werner, F.; Cho, H. -M.; Wind, G.; Platnick, S.; Ackerman, A. S.; Di Girolamo, L.; Marshak, A.; Meyer, Kerry

    2016-01-01

    The bi-spectral method retrieves cloud optical thickness and cloud droplet effective radius simultaneously from a pair of cloud reflectance observations, one in a visible or near-infrared (VISNIR) band and the other in a shortwave infrared (SWIR) band. A cloudy pixel is usually assumed to be horizontally homogeneous in the retrieval. Ignoring sub-pixel variations of cloud reflectances can lead to a significant bias in the retrieved and re. In the literature, the retrievals of and re are often assumed to be independent and considered separately when investigating the impact of sub-pixel cloud reflectance variations on the bi-spectral method. As a result, the impact on is contributed only by the sub-pixel variation of VISNIR band reflectance and the impact on re only by the sub-pixel variation of SWIR band reflectance. In our new framework, we use the Taylor expansion of a two-variable function to understand and quantify the impacts of sub-pixel variances of VISNIR and SWIR cloud reflectances and their covariance on the and re retrievals. This framework takes into account the fact that the retrievals are determined by both VISNIR and SWIR band observations in a mutually dependent way. In comparison with previous studies, it provides a more comprehensive understanding of how sub-pixel cloud reflectance variations impact the and re retrievals based on the bi-spectral method. In particular, our framework provides a mathematical explanation of how the sub-pixel variation in VISNIR band influences the re retrieval and why it can sometimes outweigh the influence of variations in the SWIR band and dominate the error in re retrievals, leading to a potential contribution of positive bias to the re retrieval. We test our framework using synthetic cloud fields from a large-eddy simulation and real observations from Moderate Resolution Imaging Spectroradiometer. The predicted results based on our framework agree very well with the numerical simulations. Our framework can be used

  18. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  19. Network Memory Protocol

    National Research Council Canada - National Science Library

    Wilcox, D

    1997-01-01

    This report presents initial research into the design of a new computer system local area network transport layer protocol, designated the network memory protocol, which provides clients with direct...

  20. Cirrus Cloud Optical and Microphysical Property Retrievals from eMAS During SEAC4RS Using Bi-Spectral Reflectance Measurements Within the 1.88 micron Water Vapor Absorption Band

    Science.gov (United States)

    Meyer, K.; Platnick, S.; Arnold, G. T.; Holz, R. E.; Veglio, P.; Yorks, J.; Wang, C.

    2016-01-01

    Previous bi-spectral imager retrievals of cloud optical thickness (COT) and effective particle radius (CER) based on the Nakajima and King (1990) approach, such as those of the operational MODIS cloud optical property retrieval product (MOD06), have typically paired a non-absorbing visible or near-infrared wavelength, sensitive to COT, with an absorbing shortwave or midwave infrared wavelength sensitive to CER. However, in practice it is only necessary to select two spectral channels that exhibit a strong contrast in cloud particle absorption. Here it is shown, using eMAS observations obtained during NASAs SEAC4RS field campaign, that selecting two absorbing wavelength channels within the broader 1.88 micron water vapor absorption band, namely the 1.83 and 1.93 micron channels that have sufficient differences in ice crystal single scattering albedo, can yield COT and CER retrievals for thin to moderately thick single-layer cirrus that are reasonably consistent with other solar and IR imager-based and lidar-based retrievals. A distinct advantage of this channel selection for cirrus cloud retrievals is that the below cloud water vapor absorption minimizes the surface contribution to measured cloudy TOA reflectance, in particular compared to the solar window channels used in heritage retrievals such as MOD06. This reduces retrieval uncertainty resulting from errors in the surface reflectance assumption, as well as reduces the frequency of retrieval failures for thin cirrus clouds.

  1. Network Authentication Protocol Studies

    Science.gov (United States)

    2009-04-01

    This is called the “Decision Diffie-Hellman Problem” ( DDH ) [68]. For the protocols discussed in this paper, the cryptographic strength of the generated...group key is solely dependent upon the strength of the underlying two-party protocols. That said, we will not address the DDH problem further in this

  2. Recombinant gene expression protocols

    National Research Council Canada - National Science Library

    Tuan, Rocky S

    1997-01-01

    .... A fundamental requirement for successful recombinant gene expression is the design of the cloning vector and the choice of the host organism for expression. Recombinant Gene Expression Protocols grows out of the need for a laboratory manual that provides the reader the background and rationale, as well as the practical protocols for the preparation of...

  3. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  4. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  5. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  6. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  7. Midazolam por via oral como medicação pré-anestésica em crianças e adolescentes com paralisia cerebral: estudo comparativo das variações do índice bispectral Midazolam por vía oral como medicación preanestésica en niños y adolescentes con parálisis cerebral: estudio comparativo de las variaciones del índice bispectral Oral midazolam as pre-anesthetic medication in children and teenagers with cerebral palsy: a comparative study on the variations of the bispectral index

    Directory of Open Access Journals (Sweden)

    Verônica Vieira da Costa

    2009-02-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: O midazolam é um derivado benzodiazepínico com ação hipnótica e muito utilizado como medicação pré-anestésica em anestesia pediátrica. As crianças com paralisia cerebral (PC também se beneficiam do uso do midazolam, mas seus efeitos são ainda desconhecidos sobre esse grupo de pacientes que apresentam uma série de particularidades, com alterações inclusive no local de ação do midazolam. O objetivo do estudo foi avaliar a ação do midazolam utilizado como medicação pré-anestésica sobre o índice bispectral (EEG-BIS dos pacientes com paralisia cerebral. MÉTODO: Foram avaliados dois grupos de pacientes: um com diagnóstico de PC e outro sem doença do sistema nervoso central (SNC e periférico. Foram registrados valores de EEG-BIS na enfermaria na véspera da operação e no dia da operação, 40 minutos depois da administração de 0,6 mg.kg-1 de midazolam via oral. Foram excluídos pacientes com história de reação paradoxal ao midazolam e pacientes do grupo-controle que estivessem em uso de outra medicação. RESULTADOS: Foram estudados 77 pacientes de ambos os sexos, entre 4 e 18 anos de idade. Não houve diferença entre os valores de EEG-BIS basal entre os grupos estudados. Após o uso do midazolam houve diminuição dos valores do EEG-BIS nos dois grupos estudados, com diferença estatística significativa em cada grupo. Na comparação entre grupos não houve diferença estatística. CONCLUSÕES: O midazolam administrado como medicação pré-anestésica na dose de 0,6 mg.kg-1 diminui os valores basais do EEG-BIS sem caracterizar hipnose e sem diferença estatística nos grupos estudados.JUSTIFICATIVA Y OBJETIVOS: El midazolam es un derivado benzodiazepínico con acción hipnótica y muy utilizado como medicación preanestésica en anestesia pediátrica. Los niños con parálisis cerebral (PC también se benefician del uso del midazolam, pero sus efectos todavía se desconocen sobre ese

  8. The impact of cloud vertical profile on liquid water path retrieval based on the bispectral method: A theoretical study based on large-eddy simulations of shallow marine boundary layer clouds.

    Science.gov (United States)

    Miller, Daniel J; Zhang, Zhibo; Ackerman, Andrew S; Platnick, Steven; Baum, Bryan A

    2016-04-27

    Passive optical retrievals of cloud liquid water path (LWP), like those implemented for Moderate Resolution Imaging Spectroradiometer (MODIS), rely on cloud vertical profile assumptions to relate optical thickness ( τ ) and effective radius ( r e ) retrievals to LWP. These techniques typically assume that shallow clouds are vertically homogeneous; however, an adiabatic cloud model is plausibly more realistic for shallow marine boundary layer cloud regimes. In this study a satellite retrieval simulator is used to perform MODIS-like satellite retrievals, which in turn are compared directly to the large-eddy simulation (LES) output. This satellite simulator creates a framework for rigorous quantification of the impact that vertical profile features have on LWP retrievals, and it accomplishes this while also avoiding sources of bias present in previous observational studies. The cloud vertical profiles from the LES are often more complex than either of the two standard assumptions, and the favored assumption was found to be sensitive to cloud regime (cumuliform/stratiform). Confirming previous studies, drizzle and cloud top entrainment of dry air are identified as physical features that bias LWP retrievals away from adiabatic and toward homogeneous assumptions. The mean bias induced by drizzle-influenced profiles was shown to be on the order of 5-10 g/m 2 . In contrast, the influence of cloud top entrainment was found to be smaller by about a factor of 2. A theoretical framework is developed to explain variability in LWP retrievals by introducing modifications to the adiabatic r e profile. In addition to analyzing bispectral retrievals, we also compare results with the vertical profile sensitivity of passive polarimetric retrieval techniques.

  9. The EC90 of remifentanil for blunting cardiovascular responses to head fixation for neurosurgery under total intravenous anesthesia with propofol and remifentanil based on bispectral index monitoring: estimation with the biased coin up-and-down sequential method.

    Science.gov (United States)

    Lee, Jung-Man; Bahk, Jae-Hyon; Lim, Young-Jin; Lee, Jiwon; Lim, Leerang

    2017-10-10

    Head fixation can induce hemodynamic instability. Remifentanil is commonly used with propofol for total intravenous anesthesia (TIVA) during neurosurgery. This study investigated the 90% effective concentration (EC 90 ) of remifentanil for blunting of cardiovascular responses to head fixation during neurosurgery via bispectral index (BIS) monitoring. Fifty patients undergoing neurosurgery requiring head fixation were enrolled. This study was performed using the biased coin up-and-down design sequential method (BCD). After tracheal intubation, the effect-site target concentration (Ce) of remifentanil was adjusted to achieve hemodynamic stability and reset to the level preoperatively assigned to each patient, according to the BCD method, approximately 10 min before head fixation. Baseline hemodynamic values were recorded before head fixation. An ineffective response was defined as a case with a > 20% increase in hemodynamic values from baseline. Otherwise, the response was determined to be effective. The EC 90 of remifentanil was calculated as a modified isotonic estimator. Forty-three patients completed this study. The EC 90 of remifentanil for blunting cardiovascular responses to head fixation was estimated to be 6.48 ng/mL (95% CI, 5.94-6.83 ng/mL). Adjustment of the Ce of remifentanil to approximately 6.5 ng/mL before head fixation could prevent noxious cardiovascular responses in 90% of neurosurgical ASA I-II patients aged 20 to 65 years old during propofol target-controlled infusion titrated to maintain BIS between 40 and 50. ClinicalTrials.gov Identifier NCT01489137 , retrospectively registered 5 December 2011.

  10. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  11. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  12. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one......, primarily based on descriptions of the protocols in the notation of CSP (Communicating Sequential Processes)....

  13. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  14. Protocols for quantum binary voting

    Science.gov (United States)

    Thapliyal, Kishore; Sharma, Rishi Dutt; Pathak, Anirban

    Two new protocols for quantum binary voting are proposed. One of the proposed protocols is designed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles. A few possible alternative approaches to accomplish the same task (quantum binary voting) have also been discussed. Security of the proposed protocols is analyzed. Further, the efficiencies of the proposed protocols are computed, and are compared with that of the existing protocols. The comparison has established that the proposed protocols are more efficient than the existing protocols.

  15. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  16. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  17. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  18. Frameworks for Protocol Implementation

    NARCIS (Netherlands)

    de Barros Barbosa, Ciro; de barros Barbosa, C.; Ferreira Pires, Luis; Pires, L.F.; van Sinderen, Marten J.

    1998-01-01

    This paper reports on the development of a catalogue of frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be re-used in the implementation of various different concrete systems in this domain. By using frameworks we aim

  19. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  20. Updating protocols prodigy.

    Science.gov (United States)

    Ambrose, Kate

    2005-04-01

    If you are updating protocols, why not try the Prodigy website, at www.prodigy.nhs.uk ? It is a source of clinical knowledge on a range oftopics that is based on best evidence and organised to support clinical decision making.

  1. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  2. An index guiding temporal planting policies for wind erosion reduction

    NARCIS (Netherlands)

    Zhao, C.X.; Zheng, D.W.; Stigter, C.J.; He, W.Q.; Tuo, D.B.; Zhao, P.

    2006-01-01

    Vegetation cover has spatial as well as temporal characteristics, but the latter are often neglected. Temporal cover characteristics were explored to recommend planting policies for returning arable land into land better protected from serious wind erosion during late autumn, winter, and

  3. Analysis of Indexed-Guided Highly Birefringent Photonic Crystal ...

    African Journals Online (AJOL)

    In this paper, a comparative study of three geometries of highly birefringent photonic crystal fibers (HB PCF) is presented. The proposed geometries are: V type PCF, Pseudo-Panda PCF and selectively liquid-filled PCF. Based on the famous Finite Difference Time Domain (FDTD) method with the perfectly matched layer ...

  4. Positive-Index Guiding in CDH-LOC Lasers

    Science.gov (United States)

    Botez, D.

    1986-01-01

    Nonabsorbing passive region has beam-guiding capability. Convex-lensshaped layer has refractive index higher than surrounding material so serves as optical waveguide. Four times more power achieved for devices of this type not incorporating the passive region.

  5. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  6. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  7. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  8. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  9. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  10. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  11. Relação entre a infusão contínua de dexmedetomidina e a fração expirada de sevoflurano monitorizada pelo índice bispectral

    Directory of Open Access Journals (Sweden)

    Magalhães Edno

    2004-01-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: A associação de agentes venosos à anestesia geral inalatória proporciona melhor qualidade de analgesia e hipnose. A dexmedetomidina é um agonista específico alfa2-adrenérgico com estas características e reconhecida por proporcionar estabilidade hemodinâmica. O objetivo do estudo foi avaliar o efeito da infusão contínua de dexmedetomidina na fração expirada de sevoflurano (FEsevo em anestesia geral, monitorizada pela análise bispectral do EEG (BIS. MÉTODO: Estudou-se, de modo prospectivo, 24 pacientes adultos, de ambos os sexos, estado físico ASA I e II, submetidos à cirurgias eletivas sob anestesia geral, monitorizados com ECG, PANI, SpO2, P ET CO2, FEsevo e BIS. Procedeu-se a indução venosa com alfentanil (30 µg.kg-1, tiopental (5 mg.kg-1 e vecurônio (0,1 mg.kg-1 e intubação traqueal. Iniciaram-se a administração de sevoflurano (manutenção do BIS entre 40 e 60, a ventilação controlada com volume corrente de 10 ml.kg-1 e a manutenção da P ET CO2 entre 35 e 45 mmHg. Na fase de manutenção da anestesia, após 60 minutos da indução anestésica (M60, foi iniciada a infusão contínua de dexmedetomidina em 2 fases: infusão inicial (1 µg.kg-1 em 20 minutos; e, infusão de manutenção (0,5 µg.kg-1.h-1. A concentração de sevoflurano foi ajustada para manter o valor de BIS entre 40 e 60. As variáveis de PA, FC, FEsevo, SpO2, P ET CO2 e BIS foram avaliadas nos momentos pré-indução (M-15, M15, M45, M75, M105 e M120. RESULTADOS: A associação da dexmedetomidina à anestesia geral com sevoflurano proporcionou redução significativa (p < 0,05 da FEsevo de M45 (1,604 ± 0,485 a M105 (1,073 ± 0,457 e de M45 (1,604 ± 0,485 a M120 (1,159 ± 0,475. As variáveis hemodinâmicas analisadas apresentaram diferenças estatisticamente significantes com p < 0,05, mas sem repercussões clínicas. CONCLUSÕES: A associação de dexmedetomidina em infusão contínua (0,5 µg.kg-1.h-1 à anestesia

  12. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  13. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  14. Neuro MR: protocols.

    Science.gov (United States)

    Mikulis, David J; Roberts, Timothy P L

    2007-10-01

    Clinical MRI depends on a symbiosis between MR physics and clinical requirements. The imaging solutions are based on a balance between the "palette" of available image contrasts derived from nuclear spin physics and tissue biophysics, and clinical determinants such as the anticipated pathology and efficient use of imaging time. Imaging is therefore optimized to maximize diagnostic sensitivity and specificity through the development of protocols organized along the lines of major disease categories. In the other part of this two-part review, the primary determinants of image contrast, including T1, T2, and T2*, were highlighted. The development of pulse sequences designed to optimize each of these image contrasts was discussed and the impact of technological innovation (parallel imaging and high-field systems) on the manner in which these sequences could be modified to improve clinical efficacy was further emphasized. The scope of that discussion was broadened to include the application of: 1) water diffusion imaging used primarily for detection of pathologies that restrict the free movement of water in the tissues and for defining fiber tracts in the brain; 2) the intravenous administration of exogenous contrast agents (gadolinium-diethylene triamine pentaacetic acid [GdDTPA]) for assessment of blood-brain-barrier (BBB) defects and brain blood flow; and 3) MR spectroscopy (MRS) for assessment of brain metabolites. The goal of this part is to discuss how these acquisitions are combined into specific protocols that can effectively detect and characterize, or in keeping with our artistic analogy, "paint" each of the major diseases affecting the central nervous system (CNS). This work concludes with a discussion of image artifacts and pitfalls in image interpretation, which, in spite our best efforts to minimize or eliminate them, continue to occur. Much of the ensuing discussion is based on our own institutional experience. Protocols, therefore, do not necessarily

  15. Heart Transplantation - Spectral and Bispectral Analysis

    National Research Council Canada - National Science Library

    Toledo, E

    2001-01-01

    .... 25 recordings were obtained from 13 male HT patients at time after transplant (TAT) ranging 0.5-65 months. We observed an interesting evolution with TAT in heart rate response to active standing...

  16. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  17. The Evolution of Web Protocols

    OpenAIRE

    Kelly, B

    1999-01-01

    This paper outlines the evolution of World Wide Web protocols. The paper reviews the original protocols developed for the web, in addressing, transport and data formats. A review of developments of the protocols is given, including developments of web data formats (HTML 4.0, cascading stylesheets and XML), transport (HTTP/1.1 and HTTP/NG) and addressing (URLs). The paper describes how the web initially lacked a metadata architecture and outlines the emergence of a metadata architecture for th...

  18. A protected password change protocol

    OpenAIRE

    Wang, Ren-Chiun; Yang, Chou-Chen; Mo, Kun-Ru

    2005-01-01

    Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password...

  19. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  20. Host Identity Protocol Proxy

    Science.gov (United States)

    Salmela, Patrik; Melén, Jan

    The Host Identity Protocol (HIP) is one of the more recent designs that challenge the current Internet architecture. The main features of HIP are security and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support HIP. From a network administrator's perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.

  1. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  2. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  3. Resource Usage Protocols for Iterators

    NARCIS (Netherlands)

    Huisman, Marieke; Haack, C.; Müller, P.; Hurlin, C.

    We discuss usage protocols for iterator objects that prevent concurrent modifications of the underlying collection while iterators are in progress. We formalize these protocols in Java-like object interfaces, enriched with separation logic contracts. We present examples of iterator clients and

  4. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  5. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  6. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  7. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  8. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  9. Recommended protocols for sampling macrofungi

    Science.gov (United States)

    Gregory M. Mueller; John Paul Schmit; Sabine M. Hubndorf Leif Ryvarden; Thomas E. O' Dell; D. Jean Lodge; Patrick R. Leacock; Milagro Mata; Loengrin Umania; Qiuxin (Florence) Wu; Daniel L. Czederpiltz

    2004-01-01

    This chapter discusses several issues regarding reommended protocols for sampling macrofungi: Opportunistic sampling of macrofungi, sampling conspicuous macrofungi using fixed-size, sampling small Ascomycetes using microplots, and sampling a fixed number of downed logs.

  10. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As

  11. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  12. The mesh network protocol evaluation and development

    OpenAIRE

    Pei, Ping; Petrenko, Y. N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily to understand that how different protocols are used in mesh network. In addition to our comprehension, Multi – hop routing protocol could provide robustness and load balancing to communication in wireless mesh networks.

  13. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against act...

  14. Secret Public Key Protocols Revisited

    Science.gov (United States)

    Lim, Hoon Wei; Paterson, Kenneth G.

    Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks.

  15. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  16. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  17. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...

  18. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...

  19. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  20. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Despite its importance, the practice of a structured postoperative ... the handoff protocol; limited nurse checklist to six items; added ... anticipatory guidance for the ICU team. Once the ICU team clarified any questions from the anaesthesiologist, the surgeon. (and then the theatre nursing staff) proceeded to report on the.

  1. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  2. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...

  3. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  4. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  5. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  6. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret......, MPC can be based on arbitrary finite rings. This is in sharp contrast to the literature where essentially all MPC protocols require a much stronger mathematical structure, namely a field. Apart from its theoretical value, this can lead to efficiency improvements since it allows a greater freedom...... of all known schemes follows as corollaries whose proofs are pure linear algebra arguments, in contrast to some hybrid arguments used in the literature. (4) We construct a new unconditionally secure VSS scheme with minimized reconstruction complexity in the setting of a dishonest minority. This improves...

  7. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    ), primary objective, primary endpoint, and--for confirmatory trials only--hypothesis and sample size calculation. We used logistic regression, χ(2), and Fisher's exact test. RESULTS: A total of 282 applications of academic clinical drug trials were submitted to the Danish Health and Medicines Authority......BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols...... and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...

  8. Enterprise Considerations for Ports and Protocols

    Science.gov (United States)

    2016-10-21

    Internet and similar networks . The Internet model is commonly known as TCP/IP, because of its most important protocols, the Transmission Control...according to the scope of the networking involved. IETF documents RFC 1122 [25] and RFC 1123 [26] describe the Internet Protocol suite and model ...An alternative model , the Open Systems Interconnection ( OSI ) model [27], is often used to describe protocols. The OSI model defines protocols in

  9. Data Integrity Protocol for Sensor Networks

    OpenAIRE

    Durresi, Arjan; Paruchuri, Vamsi; Kannan, Rajgopal; Iyengar, S. S.

    2005-01-01

    In this paper, we present a novel lightweight protocol for data integrity in wireless sensor networks. Our protocol is based on a leapfrog strategy in which each cluster head verifies if its previous node has preserved the integrity of the packet using the secret key it shares with two hop uptree nodes. The proposed protocol is simple. The analysis and simulation results show that the protocol needs very few header bits, as low as three bits, thus resulting in negligible bandwidth overhead; t...

  10. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...... trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws....

  11. Approaches to Formal Verification of Security Protocols

    OpenAIRE

    Lal, Suvansh; Jain, Mohit; Chaplot, Vikrant

    2011-01-01

    In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal verification of security protocols has become a key issue in computer and communications security. In...

  12. Quantum bit commitment protocol without quantum memory

    OpenAIRE

    Ramos, Rubens Viana; Mendonca, Fabio Alencar

    2008-01-01

    Quantum protocols for bit commitment have been proposed and it is largely accepted that unconditionally secure quantum bit commitment is not possible; however, it can be more secure than classical bit commitment. In despite of its usefulness, quantum bit commitment protocols have not been experimentally implemented. The main reason is the fact that all proposed quantum bit commitment protocols require quantum memory. In this work, we show a quantum bit commitment protocol that does not requir...

  13. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  14. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  15. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...... how the Petri-net semantics can be used to prove security properties....

  16. Universal Energy Supply Protocol (UESP)

    Energy Technology Data Exchange (ETDEWEB)

    Holz, F.; Meyer, T.; Roth, W.; Benz, J. [Fraunhofer-Institut fuer Solare Energiesysteme (ISE), Freiburg im Breisgau (Germany); Mueller, M. [Steca GmbH, Solar Electronics, Memmingen (Germany)

    2004-07-01

    The idea behind the Universal Energy Supply Protocol (UESP) is to equip all components (all kinds of generators, batteries and loads) with an identical and well-defined electrical DC connection as well as with intelligence and a communication interface, speaking a defined protocol (UESP). Power flow and information flow are separated, leading to more flexibility in system sizing and standardisation. A centralised control and energy management system administers the system as a whole. Its software is able to manage the energy generation and consumption and ensures the required level of reliability while reducing the operational cost to a minimum. In contrast to existing management concepts, the central idea behind UESP is to outsource the intelligence and the knowledge on the operational behaviour of the components out of the central management system into the components themselves. The components provide information about their current status of operation, current and future operation cost and constraints to the central management system. Here, using 'virtual stock exchange' algorithms, an optimised schedule for all components is determined and fed back to the components for implementation. The central management is thus very generic and can handle any component using the UESP protocol. It automatically adapts to new or changed system configurations, as these changes impact the optimisation only by additional 'players' on the virtual stock market. Eight German companies have teamed up with Fraunhofer ISE in a challenging project (funded by the German Ministry for the Environment, Nature Conservation and Nuclear Safety, BMU) to define the previously described protocol and interfaces and to elaborate the various implementations. The applications range form village power supply systems to telecommunication stations and signalling systems. It is foreseen to establish UESP as standardised interface in the future. (orig.)

  17. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  18. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  19. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  20. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  1. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    2017-08-04

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  2. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali...

  3. PCR protocols: current methods and applications

    National Research Council Canada - National Science Library

    White, Bruce Alan

    1993-01-01

    ..." between "small" and "big" labs, since its use makes certain projects, especially those related to molecular cloning, now far more feasible for the small lab with a modest budget. This new volume on PCR Protocols does not attempt the impossible task of representing all PCR-based protocols. Rather, it presents a range of protocols, both analytical ...

  4. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    internet. 2. New Features in IPv6. Harsha Srinath. IPv4, the workhorse protocol of the currently popular TePI. IP protocol suite, is fast becoming obsolete. The exponen- ... designers of this Internet Protocol (lPv4) never envisioned the scale of the ..... using multiple access providers across the same interface to have separate ...

  5. Timed Model Checking of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.

    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol. Timing information allows the study of different attack scenarios. We illustrate the attacks by model

  6. 21 CFR 1301.18 - Research protocols.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... have such submission approved by, the Food and Drug Administration as required in 21 U.S.C. 355(i) and...

  7. Crypto-Verifying Protocol Implementations in ML

    NARCIS (Netherlands)

    Bhargavan, K.; Corin, R.J.; Fournet, C.

    2007-01-01

    We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational cryptography. We experiment with compilers from F#

  8. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  9. Reactive broadcasting protocol for video on demand

    Science.gov (United States)

    Paris, Jehan-Francois; Carter, Steven W.; Long, Darrell D. E.

    1999-12-01

    We propose a reactive broadcasting protocol that addresses the problem of distributing moderately popular videos in a more efficient fashion. Like all efficient broadcasting protocols, reactive broadcasting assumes that the customer set-top box has enough local storage to store at least one half of each video being watched. Unlike other broadcasting protocols, reactive broadcasting only broadcasts the later portions of each video. the initial segment of each video is distributed on demand using a stream tapping protocol. Our simulations show that reactive broadcasting outperforms both conventional broadcasting protocols and pure stream tapping for a wide range of video request rates.

  10. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... to a transition semantics which can easily be implemented. (An existing SPL implementation bridges the gap that often exists between abstract protocol models on which verification of security properties is carried out and the implemented protocol.) SPL-nets are a particular kind of contextual Petri...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  11. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  12. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  13. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...... of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ...

  14. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  15. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  16. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  17. INEEL AIR MODELING PROTOCOL ext

    Energy Technology Data Exchange (ETDEWEB)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  18. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  19. Estimation of radiation exposure for brain perfusion CT: standard protocol compared with deviations in protocol.

    Science.gov (United States)

    Hoang, Jenny K; Wang, Chu; Frush, Donald P; Enterline, David S; Samei, Ehsan; Toncheva, Greta; Lowry, Carolyn; Yoshizumi, Terry T

    2013-11-01

    The purpose of this study was to measure the organ doses and estimate the effective dose for the standard brain perfusion CT protocol and erroneous protocols. An anthropomorphic phantom with metal oxide semiconductor field effect transistor (MOSFET) detectors was scanned on a 64-MDCT scanner. Protocol 1 used a standard brain perfusion protocol with 80 kVp and fixed tube current of 200 mA. Protocol 2 used 120 kVp and fixed tube current of 200 mA. Protocol 3 used 120 kVp with automatic tube current modulation (noise index, 2.4; minimum, 100 mA; maximum, 520 mA). Compared with protocol 1, the effective dose was 2.8 times higher with protocol 2 and 7.8 times higher with protocol 3. For all protocols, the peak dose was highest in the skin, followed by the brain and calvarial marrow. Compared with protocol 1, the peak skin dose was 2.6 times higher with protocol 2 and 6.7 times higher with protocol 3. The peak skin dose for protocol 3 exceeded 3 Gy. The ocular lens received significant scatter radiation: 177 mGy for protocol 2 and 435 mGy for protocol 3, which were 4.6 and 11.3 times the dose for protocol 1, respectively. Compared with the standard protocol, erroneous protocols of increasing the tube potential from 80 kVp to 120 kVp will lead to a three- to fivefold increase in organ doses, and concurrent use of high peak kilovoltage with incorrectly programmed tube current modulation can increase dose to organs by 7- to 11-fold. Tube current modulation with a low noise index can lead to doses to the skin and ocular lens that are close to thresholds for tissue reactions.

  20. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  1. DAQ architecture and read-out protocole

    CERN Document Server

    Harris, F; Jost, B; Mato, P; Mato, Pere

    1998-01-01

    The proposed LHCb readout architecture is overviewed, followed by discussion and comparison of two candidate readout protocols, namely the 'Full Readout' and'Phased Readout' protocols.The philosophy of the Full Readout protocol is to send all of the event data to a processor before commencing the high level trigger algorithms.This results in simplicity in the protocol at the cost of the bandwidth requirement for the readout network. This is our preferred approach if the network costs are not prohibitive. Using the Phased Readout protocol the event data is sent in portions according to the demands of the trigger algorithms. This results in a more complex protocol, but in a reduction on the readout network bandwidth requirement.The effect of transmission errors on the behaviour of the system, and the implementation of system partitioning, are also discussed.1

  2. Merging Multiparty Protocols in Multiparty Choreographies

    Directory of Open Access Journals (Sweden)

    Fabrizio Montesi

    2013-02-01

    Full Text Available Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantiating a single protocol, which is the merge of the original ones. This gives an effective methodology for obtaining new protocols by composing existing ones. Moreover, by removing all synchronisations required for starting protocol instances, our transformation reduces the number of communications and resources needed to execute a choreography.

  3. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  4. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  5. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  6. Merging Multiparty Protocols in Multiparty Choreographies

    OpenAIRE

    Fabrizio Montesi; Marco Carbone

    2013-01-01

    Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantia...

  7. Composing security protocols: from confidentiality to privacy

    OpenAIRE

    Arapinis, Myrto; Cheval, Vincent; Delaune, Stéphanie

    2015-01-01

    Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these composi...

  8. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  9. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  10. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  11. A new quantum private comparison protocol

    Science.gov (United States)

    Xu, Ling; Wang, Jing; Ahmed, Hafeez; Zhao, Zhiwen

    2017-10-01

    For two participants to compare the equality of their private information without revealing them, a new quantum private protocol with the help of semi-honest third party TP is proposed. Different from previous protocols, the four particle |Wf⟩ state and the |χ+⟩ state are utilized in this protocol as the carriers of quantum information and form the entanglement swapping as basic principle. The simple measurement of quantum states and exclusive-or operation are only required to conduct in this protocol. What's more, this protocol can compare two bits of two participants' private information in every comparison time. Meanwhile, it needs no unitary operation to fulfill this protocol. This protocol is feasible and efficient to execute through these aspects. In the end, the security of this protocol is analyzed at great length from two kinds of attacks including the outside attack and the participant attack. And the analysis result shows that this protocol can withstand various kinds of attacks and be secure to perform efficiently.

  12. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  13. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  14. [Climate change and Kyoto protocol].

    Science.gov (United States)

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  15. Natural disturbances and Kyoto protocol

    Directory of Open Access Journals (Sweden)

    Teobaldelli M

    2008-06-01

    Full Text Available A recent letter published in Nature (Kurz et al. 2008a reports an outbreak of mountain pine beetles in British Columbia, destroying millions of trees; according to the authors, by 2020, the beetles will have done so much damage that the forest is expected to release more carbon dioxide than it absorbs. All those natural disturbances could overwhelmed all the efforts made by Canada to influence the carbon balance through forest management. Considering that Canada decided not to elect forest management within the Kyoto Protocol, it is clear that future climate mitigation agreements, aimed to encourage changes in forest management, should account for and protect against the impacts of natural disturbances.

  16. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  17. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    Science.gov (United States)

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  18. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  19. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  20. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  1. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  2. Welfare monitoring system : assessment protocol for horses

    OpenAIRE

    Livestock Research

    2012-01-01

    This document describes the protocol for horses in more detail. For the development of the protocol the Welfare Quality® framework was used. For each measure there is a description how to assess the measure including the method of classification.

  3. Protocols | Office of Cancer Clinical Proteomics Research

    Science.gov (United States)

    Each reagent on the Antibody Portal has been characterized by a combination of methods specific for that antibody. To view the customized antibody methods and protocols (Standard Operating Procedures) used to generate and characterize each reagent, select an antibody of interest and open the protocols associated with their respective characterization methods along with characterization data.

  4. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...

  5. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... have been identified as an effective therapy as early as. 1977. Instead, multiple ... The fifth step entails writing a study one-page summary which provides a succinct summary of what is intended. The sixth step involves writing the protocol. The rigid process of protocol writing will ensure that a number of ...

  6. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain...

  7. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  8. Algebraic techniques for low communication secure protocols

    NARCIS (Netherlands)

    Haan, Robbert de

    2009-01-01

    This thesis discusses new results in two areas within cryptography; securely transmitting a message between two parties and securely computing a function on the inputs of multiple parties. For both of these areas we mainly consider perfectly secure protocols, which are protocols that have a zero

  9. How to write a research protocol

    African Journals Online (AJOL)

    MMed degree. Although occasional reference will be made to qualitative approaches, it is likely that the majority of these studies will be quantitative designs and these form the focus of this paper. Keywords: MMed, protocol, protocol design, research, research design. Introduction. The introduction of compulsory research for ...

  10. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  11. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  12. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    level. In noisy-channel cryptography security proofs are based on the assumption that a given physical means of communication is at a sufficiently low level inherently noisy. In bounded-storage cryptography security proofs are based on the assumption that there exists streams of information, generated...... above mentioned research areas.   This report focuses on unconditionally secure cryptographic protocols. Such protocols are based on a limitation of the adversary's knowledge in an information-theoretic or quantum- theoretic sense. They provide a very strong form of security because they cannot even......This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...

  13. Accuracy of NHANES periodontal examination protocols.

    Science.gov (United States)

    Eke, P I; Thornton-Evans, G O; Wei, L; Borgnakke, W S; Dye, B A

    2010-11-01

    This study evaluates the accuracy of periodontitis prevalence determined by the National Health and Nutrition Examination Survey (NHANES) partial-mouth periodontal examination protocols. True periodontitis prevalence was determined in a new convenience sample of 454 adults ≥ 35 years old, by a full-mouth "gold standard" periodontal examination. This actual prevalence was compared with prevalence resulting from analysis of the data according to the protocols of NHANES III and NHANES 2001-2004, respectively. Both NHANES protocols substantially underestimated the prevalence of periodontitis by 50% or more, depending on the periodontitis case definition used, and thus performed below threshold levels for moderate-to-high levels of validity for surveillance. Adding measurements from lingual or interproximal sites to the NHANES 2001-2004 protocol did not improve the accuracy sufficiently to reach acceptable sensitivity thresholds. These findings suggest that NHANES protocols produce high levels of misclassification of periodontitis cases and thus have low validity for surveillance and research.

  14. Cryptanalysis of the arbitrated quantum signature protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  15. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  16. Emergency contraceptive pills (ECP) protocol.

    Science.gov (United States)

    1994-05-01

    Outlined is a protocol for the administration of emergency contraceptive pills. The indication for such treatment is unprotected intercourse within the past 72 hours. Absolute contraindications include the possibility of an existing pregnancy and a family history of stroke, heart attack, thrombophlebitis, breast or endometrial cancer, or liver tumor. Possibly excluded, depending on evaluation by a physician, are women with abnormal vaginal bleeding, active hepatitis, active gallbladder disease, high blood pressure, acute focal migraine, breastfeeding women, and those unable to understand instructions. The recommended regimen consists of six tablets of Ovral (two taken immediately, two more in 12 hours) or 12 tablets of Lo/Ovral, Nordette, or Levlen (four taken immediately, repeat dosage in 12 hours). The extra pills are to be used in cases of vomiting within three hours of pill ingestion. Women with a history of oral contraceptive-related nausea and vomiting should be provided with Compazine. Women should be informed that this method is effective in only about 92% of cases. All women who receive emergency contraception should be counseled that this is strictly a back-up method and helped to formulate a long-term birth control strategy.

  17. Protocol for a systematic review of N-of-1 trial protocol guidelines and protocol reporting guidelines.

    Science.gov (United States)

    Porcino, Antony J; Punja, Salima; Chan, An-Wen; Kravitz, Richard; Orkin, Aaron; Ravaud, Philippe; Schmid, Christopher H; Vohra, Sunita

    2017-07-06

    N-of-1 trials are multiple cross-over trials done in individual participants, generating individual treatment effect information. While reporting guidelines for the CONSORT Extension for N-of-1 trials (CENT) and the Standard Protocol Items: Recommendations for Interventional Trials (SPIRIT) already exist, there is no standardized recommendation for the reporting of N-of-1 trial protocols. The objective of this study is to evaluate current literature on N-of-1 design and reporting to identify key elements of rigorous N-of-1 protocol design. We will conduct a systematic search for all N-of-1 trial guidelines and protocol-reporting guidelines published in peer-reviewed literature. We will search Medline, Embase, PsycINFO, CINAHL, the Cochrane Methodology Register, CENTRAL, and the NHS Economic Evaluation Database. Eligible articles will contain explicit guidance on N-of-1 protocol construction or reporting. Two reviewers will independently screen all titles and abstracts and then undertake full-text reviews of potential articles to determine eligibility. One reviewer will perform data extraction of selected articles, checked by the second reviewer. Data analysis will ascertain common features of N-of-1 trial protocols and compare them to the SPIRIT and CENT items. This systematic review assesses recommendations on the design and reporting of N-of-1 trial protocols. These findings will inform an international Delphi development process for an N-of-1 trial protocol reporting guideline. The development of this guideline is critical for improving the quality of N-of-1 protocols, leading to improvements in the quality of published N-of-1 trial research.

  18. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number...

  19. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  20. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  1. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  2. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  4. Micromobility protocols performance in differentiated services networks

    Science.gov (United States)

    Mariz, Denio; Fernandes, Stenio F.; Santos, Klebson; Kelner, Judith; Sadok, Djamel

    2003-08-01

    This work analyses and compares the performance of the recently proposed micro-mobility protocols HAWAII and Hierarchical MIP when submitted to several levels of traffic load and scenarios that effectively degrade the low packet loss feature of these protocols. Furthermore, it is shown that the use of differentiated services within a given domain infrastructure results in a considerable increase of performance for mobile nodes. The preferential treatment offered to such mobile nodes protects micro-mobility protocols traffic from the fluctuations of background traffic with losses only occurring as a result of handoff events.

  5. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  6. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  7. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  8. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  9. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  10. A Hybrid Collision Resolution Protocol for Passive RFID Tag Identification

    OpenAIRE

    Xin-qing, Yan; Zhou-ping, Yin; You-lun, Xiong

    2009-01-01

    Wireless communication channel collision of RFID system is a key issue that affects the pervasive application of the system, especially for passive RFID system due to the constrained communication ability and energy supply of tags. The collision resolution protocols suggested can be categorized into deterministic tree based protocols and probabilistic frame slot ALOHA based protocols. A hybrid protocol, which combines the query tree protocol and dynamic framed slotted ALOHA protocol, is prese...

  11. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available Live, Virtual and Constructive (LVC) simulations can share tactical awareness data using command and control (C2) protocol gateways as bridges: Multiple training simulations can be linked to create large scale collaborative environments; simulations...

  12. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  13. UK Biobank's cardiovascular magnetic resonance protocol.

    Science.gov (United States)

    Petersen, Steffen E; Matthews, Paul M; Francis, Jane M; Robson, Matthew D; Zemrak, Filip; Boubertakh, Redha; Young, Alistair A; Hudson, Sarah; Weale, Peter; Garratt, Steve; Collins, Rory; Piechnik, Stefan; Neubauer, Stefan

    2016-02-01

    UK Biobank's ambitious aim is to perform cardiovascular magnetic resonance (CMR) in 100,000 people previously recruited into this prospective cohort study of half a million 40-69 year-olds. We describe the CMR protocol applied in UK Biobank's pilot phase, which will be extended into the main phase with three centres using the same equipment and protocols. The CMR protocol includes white blood CMR (sagittal anatomy, coronary and transverse anatomy), cine CMR (long axis cines, short axis cines of the ventricles, coronal LVOT cine), strain CMR (tagging), flow CMR (aortic valve flow) and parametric CMR (native T1 map). This report will serve as a reference to researchers intending to use the UK Biobank resource or to replicate the UK Biobank cardiovascular magnetic resonance protocol in different settings.

  14. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  15. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  16. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  17. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  18. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  19. Routing protocols in wireless sensor networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks.

  20. Protocol Coordinator | Center for Cancer Research

    Science.gov (United States)

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the consid erable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and

  1. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  2. SPION: Secure Protocols in OSI Networks

    OpenAIRE

    Ahlgren, Bengt; Lindgren, Per; Sirotkin, Teet

    1989-01-01

    SPION: Secure Protocols in OSI Networks This report describes how security services can be realized in a computer network using the protocols of the Open Systems Interconnection (OSI) reference model for communication. The report starts with defining security requirements for a "typical" local area network in a company, university or similar organization. It is assumed that the organization does not use the network for transfer of extremely sensitive information, such a...

  3. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  4. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  5. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  6. Protocol for communications in potentially noisy environments

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  7. Robust Routing Protocol For Digital Messages

    Science.gov (United States)

    Marvit, Maclen

    1994-01-01

    Refinement of ditigal-message-routing protocol increases fault tolerance of polled networks. AbNET-3 is latest of generic AbNET protocols for transmission of messages among computing nodes. AbNET concept described in "Multiple-Ring Digital Communication Network" (NPO-18133). Specifically aimed at increasing fault tolerance of network in broadcast mode, in which one node broadcasts message to and receives responses from all other nodes. Communication in network of computers maintained even when links fail.

  8. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  9. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    but then switches to a denser coding structure towards the end. Our systematic mechanism maintains the sparse structure during the recombination of packets at the intermediate nodes. The performance of our protocol is compared by means of simulations of IEEE reference grids against standard master-slave protocols...... used in real systems. Our results show that network coding achieves 100% reliability, even for hostile network conditions, while gathering data 10 times faster than standard master-slave schemes....

  10. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  11. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  12. Content evidence of a spectrographic analysis protocol

    Directory of Open Access Journals (Sweden)

    Leonardo Wanderley Lopes

    Full Text Available ABSTRACT Objective: to verify the content evidence of a spectrographic analysis protocol. Methods: a methodological study in which five speech therapists who assessed the clarity and the relevance of the protocol were selected. The Content Validity Index (CVI was used to investigate the level of agreement among judges regarding overall aspects, items and domains of the protocol. Results: most judges considered the overall aspects of the protocol as comprehensive. As for clarity, 17 items showed an excellent content validity (CVI ≥ 0.78, three showed a good content validity (0.60 ≤ CVI ≤ 0.77 and two items were judged as poor (CVI ≤ 0.59. As for relevance, 19 items obtained an excellent content validity (CVI ≥ 0.78 and three had a good content validity (0.60 ≤ CVI ≤ 0.77. The judges suggested adding items related to vocal signal normality in all domains. After the analysis, 18 items required no reformulation, five items were added, three were reformulated and one was excluded. Conclusion: the proposed protocol was regarded as a comprehensive one. The items presented a good to excellent content validity as for clarity and relevance. After this validation step, the protocol ended up presenting 25 items distributed into five domains.

  13. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  14. Epidemic Protocols for Pervasive Computing Systems - Moving Focus from Architecture to Protocol

    DEFF Research Database (Denmark)

    Mogensen, Martin

    2009-01-01

    Pervasive computing systems are inherently running on unstable networks and devices, subject to constant topology changes, network failures, and high churn. For this reason, pervasive computing infrastructures need to handle these issues as part of their design. This is, however, not feasible...... epidemic protocols as distribution mechanism for pervasive systems. The nature of epidemic protocols make them easy to implement, easy to deploy, and resilient to failures. By using epidemic protocols, it is possible to mitigate a wide range of the potential issues on the protocol layer. The result...... is lower complexity of building pervasive systems and higher robustness....

  15. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  16. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  17. The challenges of additional protocol implementation

    International Nuclear Information System (INIS)

    Renis, Therese

    2001-01-01

    Full text: The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. The objective is to provide the basis for gaining assurance of the absence of undeclared nuclear material and activities in a State. Although the Agency conducted field trials of various aspects of implementation of the Additional Protocol, the first actual implementation experience began with the entry into force of Australia's additional protocol in December of 1997. As of late August 2001,21 states have entered into force an additional protocol and another 35 states have signed the additional protocol but not yet entered the agreement into force. Because implementation of the Additional Protocol requires new activities to be carried out by the IAEA, new procedures, guidelines and training have been developed to support these activities. As more experience is gained these documents are being refined and additional ones developed to meet unforeseen needs. In addition, evaluation and follow-up of the expanded information and the results of increased access has required the Safeguards Department to expand and adapt its procedures and mode of operation. The challenge has been in establishing sufficient measures and the necessary infrastructure for consistent application of the additional protocol in such a way that they can be adapted as needed based on Agency experience. Initial development focused on the logistical aspects of implementing these new activities. These activities include the processing, handling and review of additional protocol declarations; planning, conducting and reporting on complementary access activities; and follow-up activities arising from information review or

  18. Standardized North American marsh bird monitoring protocol

    Science.gov (United States)

    Conway, Courtney J.

    2011-01-01

    Little is known about the population status of many marsh-dependent birds in North America but recent efforts have focused on collecting more reliable information and estimates of population trends. As part of that effort, a standardized survey protocol was developed in 1999 that provided guidance for conducting marsh bird surveys throughout North America such that data would be consistent among locations. The original survey protocol has been revised to provide greater clarification on many issues as the number of individuals using the protocol has grown. The Standardized North American Marsh Bird Monitoring Protocol instructs surveyors to conduct an initial 5-minute passive point-count survey followed by a series of 1-minute segments during which marsh bird calls are broadcast into the marsh following a standardized approach. Surveyors are instructed to record each individual bird from the suite of 26 focal species that are present in their local area on separate lines of a datasheet and estimate the distance to each bird. Also, surveyors are required to record whether each individual bird was detected within each 1-minute subsegment of the survey. These data allow analysts to use several different approaches for estimating detection probability. The Standardized North American Marsh Bird Monitoring Protocol provides detailed instructions that explain the field methods used to monitor marsh birds in North America.

  19. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  20. Information Flow in Secret Sharing Protocols

    Directory of Open Access Journals (Sweden)

    Elham Kashefi

    2009-11-01

    Full Text Available The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC, error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary conditions as to when a graph with flow, i.e. capable of performing a class of unitary operations, can be extended to include vertices which can be ignored, pointless measurements, and hence considered as unauthorised players in terms of secret sharing, or error qubits in terms of fault tolerance. This offers a way to extend existing MBQC patterns to secret sharing protocols. Our characterisation of pointless measurements is believed also to be a useful tool for further integrated measurement based schemes, for example in constructing fault tolerant MBQC schemes.

  1. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  2. Supporting Adaptation of Wireless Communication Protocols

    Directory of Open Access Journals (Sweden)

    LACHHMAN DAS DHOMEJA

    2016-10-01

    Full Text Available Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity, Bluetooth, IrDA (Infrared, etc. In order for pervasive devices to interact with each other, they need to have matching (alike communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth from what the server has (e.g. WiFi, connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange, L2CAP (Logical Link Control and Adaptation Protocol, RFCOM (Radio Frequency Communication and WiFi protocol and can run on (J2MW (Java 2 Micro Edition enabled mobile phones which support both Bluetooth and WiFi capabilities

  3. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  4. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  5. Evaluation of counterfactuality in counterfactual communication protocols

    Science.gov (United States)

    Arvidsson-Shukur, D. R. M.; Barnes, C. H. W.; Gottfries, A. N. O.

    2017-12-01

    We provide an in-depth investigation of parameter estimation in nested Mach-Zehnder interferometers (NMZIs) using two information measures: the Fisher information and the Shannon mutual information. Protocols for counterfactual communication have, so far, been based on two different definitions of counterfactuality. In particular, some schemes have been based on NMZI devices, and have recently been subject to criticism. We provide a methodology for evaluating the counterfactuality of these protocols, based on an information-theoretical framework. More specifically, we make the assumption that any realistic quantum channel in MZI structures will have some weak uncontrolled interaction. We then use the Fisher information of this interaction to measure counterfactual violations. The measure is used to evaluate the suggested counterfactual communication protocol of H. Salih et al. [Phys. Rev. Lett. 110, 170502 (2013), 10.1103/PhysRevLett.110.170502]. The protocol of D. R. M. Arvidsson-Shukur and C. H. W. Barnes [Phys. Rev. A 94, 062303 (2016), 10.1103/PhysRevA.94.062303], based on a different definition, is evaluated with a probability measure. Our results show that the definition of Arvidsson-Shukur and Barnes is satisfied by their scheme, while that of Salih et al. is only satisfied by perfect quantum channels. For realistic devices the latter protocol does not achieve its objective.

  6. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  7. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2017-12-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle (n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  8. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  9. Semen cryopreservation protocols of Mangalarga Marchador stallions

    Directory of Open Access Journals (Sweden)

    Marcela Leite Candeias

    2012-09-01

    Full Text Available The effect of the utilization of three semen protocols (Inra 82®, Merck Gema and Botu-crio® and two filling techniques (0.25 and 0.50 mL straws in Mangalarga Marchador stallions were studied in this experiment. Sperm parameters were assessed during processing and post-freezing. No interactions between the protocols and type of filling were observed, so they were assessed separately. Sperm parameters were not altered when the extender was added to the centrifugation; however, there was reduction of motility and strength when freezing extenders were added. The Botu-crio® protocol preserved the parameters of total and progressive sperm motility, smoothed path velocity (µm/s, straight line velocity (µm/s, track velocity (µm/s and the average and fast spermatozoa percentage better than the others. No difference between the extenders for the percentage of sperm integrity was observed. There was no difference in the responses studied on the filling techniques. The stallions presented better freezing with the use of the Botu-crio® protocol. The best post-freezing viability results were found for semen frozen using the Botu-crio® protocol and there were no differences concerning the sperm quality comparing 0.25 and 0.50 mL straws.

  10. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  11. Reflexions about imaging technique and examination protocol 2. MR-examination protocol

    International Nuclear Information System (INIS)

    Wichmann, Werner

    2004-01-01

    Adequate imaging protocol is crucial for any imaging technique. As MR is a time consuming examination, the physician serves the patient best, when he/she makes the best choice of sequences, which answer the question of the clinician and provide a definite diagnosis. Although any patient requires an individual protocol, some general rules should be known

  12. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  13. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  14. Energy Consumption in Location Sharing Protocols for Android Applications

    OpenAIRE

    Prihodko, Mihails

    2012-01-01

    This thesis studies the Message Queue Telemetry Transport protocol (MQTT) as an application layer protocol in geographical location sharing applications using third generation cellular communication (3G). The MQTT protocol is compared in terms of energy efficiency and amount of data generated with the Hypertext Transfer Protocol (HTTP), which is currently used in typical location sharing applications. In order to compare the communication energy efficiency of both protocols a location sharing...

  15. Privacy-preserving audit mechanisms for multi-party protocols

    OpenAIRE

    Cuvelier, Édouard

    2015-01-01

    This thesis sets as goal the study and development of cryptographic multi-party protocols offering the properties of verifiability and privacy. The verifiability property guarantees the protocols participants and/or observers that the result of the execution of the protocol is exactly what is expected from a honest execution of the protocol. On the other hand, the privacy property ensures the participants that their private information is not leaked by executing the protocol. The thesis targe...

  16. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  17. Network protocols for real-time applications

    Science.gov (United States)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  18. Changeable HA to improve MIPv6 protocol

    Science.gov (United States)

    Hu, Qing-gui

    2015-12-01

    For mobile IPv6, home agent (HA) plays an important role. Each mobile node (MN) has a home IP address, it will be not changeable. Also, the home agent (HA) of MN is not changeable. This rule provides the convenient for the ongoing communication without interruption. But it has some obvious drawbacks. Here, the new variable HA scheme is proposed. Every MN has a dynamic cache table, recording the information such as its home address, care-of address, and history address etc. If the accumulated time in one region exceeds that in the hometown, the foreign agent (FA) could become home agent (HA), the home agent could become history agent. Later, the performance of the new protocol is simulated with OPNET software, whose result shows the performance of the new protocol works better than that of the traditional protocol.

  19. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not....... The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA...

  20. Will OPEC lose from the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Barnett, Jon E-mail: jbarn@unimelb.edu.au; Dessai, Suraje E-mail: s.dessai@uea.ac.uk; Webber, Michael E-mail: mjwebber@unimelb.edu.au

    2004-12-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC.

  1. A template for writing radiotherapy protocols.

    Science.gov (United States)

    Nilsson, Per; Ceberg, Crister; Kjellén, Elisabeth; Gagliardi, Giovanna; Blomgren, Klas; Nilsson, Sten; Johansson, Mikael; Glimelius, Bengt

    2015-02-01

    Well-specified and unambiguous treatment protocols are essential both for current practice and for the future development of radiation therapy. In order to provide assistance for writing good protocols, irrespective of treatment intention and complexity, up-to-date guidelines are highly desirable. We have analysed the radiotherapy work-flow, including clinical and physical aspects, such as preparatory imaging, treatment planning, delivery and evaluation, with the aim to outline a consistent framework covering the entire radiotherapy process. Based on the analysis, a recipe-style template for specifying the description of the radiotherapy process has been designed. The template is written in a general format, which allows for modified phrasing, and should be customised for the specific clinical situation and diagnosis, as well as facility resources. The template can be used as a tool to ensure a consistent and comprehensive description of the radiotherapy section of clinical guidelines, care programmes and clinical trial protocols.

  2. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  3. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  4. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  5. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  6. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  7. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  8. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  9. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    This thesis presents results in two branches of cryptography. In the first part we construct two general multiparty computation protocols that can evaluate any arithmetic circuit over a finite field. Both are built in the preprocessing model and achieve active security in the setting of a dishonest....... In previous work this task was assumed to be performed by an ideal functionality. In the second part we shift our focus to a task that is related to multiparty computation in an indirect way: we propose a zero-knowledge protocol that allows a prover to show a verifier that he holds a tuple of three values...

  10. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  11. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  12. A Protocol for Evaluating Contextual Design Principles

    Directory of Open Access Journals (Sweden)

    Arthur Stamps

    2014-11-01

    Full Text Available This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.

  13. Cryptanalysis of the Quantum Group Signature Protocols

    Science.gov (United States)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  14. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  15. Quantum adiabatic protocols using emergent local Hamiltonians.

    Science.gov (United States)

    Modak, Ranjan; Vidmar, Lev; Rigol, Marcos

    2017-10-01

    We present two applications of emergent local Hamiltonians to speed up quantum adiabatic protocols for isolated noninteracting and weakly interacting fermionic systems in one-dimensional lattices. We demonstrate how to extract maximal work from initial band-insulating states, and how to adiabatically transfer systems from linear and harmonic traps into box traps. Our protocols consist of two stages. The first one involves a free expansion followed by a quench to an emergent local Hamiltonian. In the second stage, the emergent local Hamiltonian is "turned off" quasistatically. For the adiabatic transfer from a harmonic trap, we consider both zero- and nonzero-temperature initial states.

  16. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  17. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... We present a nine-step process to assist with developing an idea into a research protocol. This process ensures that ... research ideas with a potentially “weak” evidence base, rather than starting with a specific research question. The second ..... Cape Town: Juta and Company Ltd; 2011. 9. Kern S. Analytic ...

  18. The Kyoto protocol in a global perspective

    Directory of Open Access Journals (Sweden)

    Tjaša Redek

    2009-11-01

    Full Text Available The global climate has changed notably since the beginning of the Industrial Revolution. Atmospheric concentrations of greenhouse gasses (GHG have increased dramatically followed by an increase in global average temperature. In order to avoid negative potential outcomes of global warming, countries have adopted the United Nations Framework Convention on Climate Change that has so far been ratified by 192 countries. In 1997 the Kyoto Protocol, a binding GHG reduction plan, was adopted and entered into force in 2005. But several countries, including the USA, have had doubts about the potential negative consequences of the planned 5% global joint reduction of GHG. However, studies generally show that on a macroeconomic level: (1 welfare loss in terms of GDP and lost growth in EU is low; (2 it differs among economies; and (3 permit trading and permit price (in either global or regional markets is highly correlated with the welfare loss. The main objective of the paper is to describe the attitudes and responses to the Kyoto Protocol from a global perspective. The paper has three objectives. First, to provide an overview of global greenhouse gas emissions and the big drivers behind these emissions. Second, to present where different countries, both developed and less developed countries, such as India, China and the countries of South-east Europe currently stand as regards their efforts to achieve the Kyoto Protocol requirements. Third, to analyse the responses and attitudes to the Kyoto Protocol from a country development perspective.

  19. Development of quantitative computed tomography lung protocols.

    Science.gov (United States)

    Newell, John D; Sieren, Jered; Hoffman, Eric A

    2013-09-01

    The purpose of this review article is to review the process of developing optimal computed tomography (CT) protocols for quantitative lung CT (QCT). In this review, we discuss the following important topics: QCT-derived metrics of lung disease; QCT scanning protocols; quality control; and QCT image processing software. We will briefly discuss several QCT-derived metrics of lung disease that have been developed for the assessment of emphysema, small airway disease, and large airway disease. The CT scanning protocol is one of the most important elements in a successful QCT. We will provide a detailed description of the current move toward optimizing the QCT protocol for the assessment of chronic obstructive pulmonary disorder and asthma. Quality control of CT images is also a very important part of the QCT process. We will discuss why it is necessary to use CT scanner test objects (phantoms) to provide frequent periodic checks on the CT scanner calibration to ensure precise and accurate CT numbers. We will discuss the use of QCT image processing software to segment the lung and extract the desired QCT metrics of lung disease. We will discuss the practical issues of using this software. The data obtained from the image processing software are then combined with those from other clinical examinations, health status questionnaires, pulmonary physiology, and genomics to increase our understanding of obstructive lung disease and improve our ability to design new therapies for these diseases.

  20. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Jansen, P.G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  1. The Nagoya Protocol and Indigenous Peoples

    Directory of Open Access Journals (Sweden)

    Maria Yolanda Teran

    2016-07-01

    Full Text Available This article is about Indigenous peoples’ involvement in the Nagoya Protocol negotiations from 2006 to 2010, as well as in its implementation to stop biopiracy in order to protect Pachamama, Mother Earth, and to ensure our survival and the survival of coming generations. The Nagoya Protocol is an international instrument that was adopted in Nagoya, Japan in October 2010 by the Conference of Parties (COP 10 and ratified by 51 countries in Pyeongchang, South Korea in October 2014 at COP 12. This protocol governs access to genetic resources and the fair and equitable sharing of benefits arising from their utilization (access and benefit sharing [ABS]. It has several articles related to Indigenous peoples and traditional knowledge, as well as: The interrelation and inseparable nature between genetic resources and traditional knowledge; The diversity of circumstances surrounding traditional knowledge ownership, including by country; The identification of traditional knowledge owners; The declaration of Indigenous peoples' human rights; and The role of women in the biodiversity process. In addition, this protocol lays out obligations on access, specifically participation in equitable benefit sharing, the accomplishment of prior and informed consent, and the mutually agreed terms and elaboration of a national legal ABS framework with the participation of Indigenous peoples and local communities in order to have well-defined roles, responsibilities, and times of negotiations.

  2. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    GENERAL I ARTICLE. IPv6: The Next Generation Internet Protocol. 1. IPv4 and its Shortcomings. Harsha Srinath is currently pursuing his MS degree in Computer. Science at the Center for. Advanced Computer. Studies (CACS) in. University of Louisiana at. Lafayette, USA. His research interests include networking with an.

  3. Plant Fungal Pathogens: Methods and Protocols

    NARCIS (Netherlands)

    Bolton, M.D.; Thomma, B.P.H.J.

    2012-01-01

    Over the course of evolution, fungi have adapted to occupy specific niches, from symbiotically inhabiting the flora of the intestinal tract of mammals to saprophytic growth on leaf litter resting on the forest floor. In Plant Fungal Pathogens: Methods and Protocols, expert researchers in the field

  4. Research protocols in National Park Service wilderness

    Science.gov (United States)

    Jim Walters

    2000-01-01

    While the National Park Service encourages the use of its wilderness resource for research, management policies require that all research apply “minimum requirement” protocols to determine: 1) if the research is needed to support the purposes of wilderness and, 2) if it is appropriate, determine the minimum tool needed to accomplish the work.

  5. Sexual and Domestic Violence: Policy Protocols | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Sexual and Domestic Violence: Policy Protocols. India is witnessing a rising rate of crime against women. According to recent National Crime Bureau data, a rape happens every 26 minutes, molestation every 14 minutes, dowry death every 63 minutes, and acts of cruelty by husband and relatives every 6 minutes.

  6. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  7. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  8. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Abstract. Kak's quantum key distribution (QKD) protocol provides not only the dis- tribution but also the integrity of secret key simultaneously in quantum channel. Conse- quently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the ...

  9. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek...

  10. Protocols for communication and governance of risks

    NARCIS (Netherlands)

    Vrouwenvelder, A.C.W.M.; Lind, N.C.; Faber, M.H.

    2015-01-01

    The aim of this paper is to explain the need to organize the development of standard protocols for communication about major public risks. Tragic events, such as inadequate earthquake preparedness or great unnecessary losses of life due to public misunderstandings underline the importance of such

  11. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  12. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  13. A commercial micropropagation protocol for virupakshi (AAB ...

    African Journals Online (AJOL)

    A commercial micropropagation protocol for virupakshi (AAB) banana via apical meristem. P Karule, V Dalvi, A Kadu, R Chaudhari, VR Subramaniam, AB Patil ... which revealed the existence of genetic uniformity in micro- propagated plants. Keywords: Micropropagation, Virupakshi, hill banana, banana bunchy top virus ...

  14. A Geographical Heuristic Routing Protocol for VANETs.

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-09-23

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation).

  15. Quantifying Information Leakage of Randomized Protocols

    DEFF Research Database (Denmark)

    Biondi, Fabrizio; Wasowski, Andrzej; Legay, Axel

    2013-01-01

    The quantification of information leakage provides a quantitative evaluation of the security of a system. We propose the usage of Markovian processes to model and analyze the information leakage of deterministic and probabilistic systems. We show that this method generalizes the lattice of inform...... and non-timed attacks on the Onion Routing protocol....

  16. Quantifying information leakage of randomized protocols

    DEFF Research Database (Denmark)

    Biondi, Fabrizio; Legay, Axel; Malacaria, Pasquale

    2015-01-01

    The quantification of information leakage provides a quantitative evaluation of the security of a system. We propose the usage of Markovian processes to model deterministic and probabilistic systems. By using a methodology generalizing the lattice of information approach we model refined attacker...... on the Onion Routing protocol....

  17. Regulatory protein modification: techniques and protocols

    National Research Council Canada - National Science Library

    Hemmings, Hugh C

    1997-01-01

    ... important roles in cellular regulation. The techniques used to analyze various forms of posttranslational protein modification are described, along with current protocols, discussion of the methodological limitations, and relevant examples from recent publications. This collection should be of use to investigators of protein modification who work i...

  18. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's ...

  19. Protocol design and implementation using formal methods

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Vissers, C.A.

    1992-01-01

    This paper reports on a number of formal methods that support correct protocol design and implementation. These methods are placed in the framework of a design methodology for distributed systems that was studied and developed within the ESPRIT II Lotosphere project (2304). The paper focuses on

  20. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom...

  1. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  2. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  3. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  4. A Geographical Heuristic Routing Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Luis Urquiza-Aguiar

    2016-09-01

    Full Text Available Vehicular ad hoc networks (VANETs leverage the communication system of Intelligent Transportation Systems (ITS. Recently, Delay-Tolerant Network (DTN routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation.

  5. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  6. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  7. CARTOONS THAT PORTRA IT SCIENTIFIC PROTOCOLS

    Directory of Open Access Journals (Sweden)

    A.C. Burlamaque- Neto

    2009-05-01

    Full Text Available Evaluation of gene therapy protocols in our laboratory led us to detect the need for the  development of  more friendly and comprehensive approach esto theexperimental  techniquesinvolved. Two sequential cartoon stories were created to portrait plasmid purification, electrophoresis separation, gel band purification and cell culture transfection protocols.  This work aims the implementation of art-education materi als in scientific research. Scripts were created based onprotocols used  in our lab. Four studentsfrom  Centro de Terapia Gênicawere selected to participate  of each stories’  implementation . Participants received theoretical explanations about protocols ,  attended a demo nstration and performed the respective  techniques  individually.   Students were interviewed using a semi -structured script.  Interviews’ contentswerequalitatively analyzedin regard to Edgar Morin’s complexity theoretical reference. A  complementary activity was heldwith the participants.  Techniques mentioned above are  portraitin two comicsstories named  Freedom for  ß- Galleyand  Purification for Cell RealityTransformation. The association of cartoons to formal protocols is viable. Memory andcomplex thinking  stimuli were reported, as well as better comprehension of the inter- relationships between protocols’ steps. This work has produced art -education materials that provide better understanding of protocols and stimulate students’ reflections  on scientific method  and  science learning in a n academic biological research environment . A soundtrack for cartoons is being  recorded.

  8. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  9. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  10. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  11. Adenosine stress protocols for myocardial perfusion imaging

    Directory of Open Access Journals (Sweden)

    Baškot Branislav

    2008-01-01

    Full Text Available Background/Aim. Treadmill test combined with myocardial perfusion scintigraphy (MPS is a commonly used technique in the assessment of coronary artery disease. There are many patients, however, who may not be able to undergo treadmill test. Such patients would benefit from pharmacological stress procedures combined with MPS. The most commonly used pharmacological agents for cardiac stress are coronary vasodilatators (adenosine, dipyridamol and catecholamines. Concomitant low-level treadmill exercise with adenosine pharmacologic stress (AdenoEX during MPS has become commonly used in recent years. A number of studies have demonstrated a beneficial impact of AdenoEX protocol. The aim of the study was, besides introducing into practice the two types of protocols of pharmatological stress test with adenosine, as a preparation for MPS, to compare and monitor the frequency of their side effects to quality, acquisition, as well as to standardize the onset time of acquisition (diagnostic imaging for both protocols. Methods. A total of 130 patients underwent pharmacological stress test with adenosine (vasodilatator. In 108 of the patients we performed concomitant exercise (AdenoEX of low level (50W by a bicycle ergometar. In 28 of the patients we performed Adenosine abbreviated protocol (AdenoSCAN. Side effects of adenosine were followed and compared between the two kinds of protocols AdenoEX and AdenoSCAN. Also compared were image quality and suggested time of acquisition after the stress test. Results. Numerous side effects were found, but being short-lived they did not require any active interventions. The benefit of AdenoEX versus AdenoSCAN included decreased side effects (62% vs 87%, improved safety and patients tolerance, improved target-to-background ratios because of less subdiaphragmatic activity, earlier acquisition, and improved sensitivity. Conclusion. The safety and efficacy of adenosine pharmacological stress is even better with concomitant

  12. Verification of authentication protocols for mobile satellite communication systems

    Directory of Open Access Journals (Sweden)

    Reham Abdellatif Abouhogail

    2014-12-01

    Full Text Available In recent times, many protocols have been proposed to provide security for mobile satellite communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Many security protocols for the mobile satellite communication system have been presented. This paper analyzes three of the most famous authentication protocols for mobile satellite communication system from the security viewpoint of data desynchronization attack. Based on strand spaces testing model, data desynchronization attacks on these protocols were tested and analyzed. Furthermore, improvements to overcome the security vulnerabilities of two protocols are mentioned.

  13. Protocol - RPD | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ...List Contact us RPD Protocol Data detail Data name Protocol DOI 10.18908/lsdba.nbdc00191-006 Description of data contents Protoc...ols for various methods of proteomics. Data file File name: rpd_protocol_jp.zip (Japanes...e version) File URL: ftp://ftp.biosciencedbc.jp/archive/rpd/LATEST/rpd_protocol_jp.zip File size: 535 KB File name: rpd_protoc...p/archive/rpd/LATEST/rpd_protocol_en.zip File size: 329 KB Simple search URL - Data acquisition method - Dat

  14. An Evaluation of Protocol Enhancing Proxies and File Transport Protocols for Satellite Communication

    Science.gov (United States)

    Finch, Patrick Eugene; Sullivan, Donald; Ivancic, William D.

    2012-01-01

    NASA is utilizing Global Hawk aircraft in high-altitude, long-duration Earth science missions. Communications with the onboard research equipment and sensors (the science payload) is via Ku-Band radio utilizing satellites in geostationary orbits. All payload communications use standard Internet Protocols and routing, and much of the data to be transferred is comprised of very large files. The science community is interested in fully utilizing these communication links to retrieve data as quickly and reliably as possible. A test bed was developed at NASA Ames to evaluate modern transport protocols as well as Protocol Enhancing Proxies (PEPs) to determine what tools best fit the needs of the science community. This paper describes the test bed used, the protocols, the PEPs that were evaluated, the particular tests performed and the results and conclusions.

  15. Efeitos de diferentes frações inspiradas de oxigênio no índice biespectral em cães submetidos à infusão contínua de propofol Effects of several inspired oxygen fractions on the bispectral index in dogs submitted to continuous infusion of propofol

    Directory of Open Access Journals (Sweden)

    P.C.F. Lopes

    2008-04-01

    Full Text Available Avaliaram-se os efeitos do fornecimento de diferentes frações inspiradas de oxigênio (FiO2 sobre o índice biespectral (BIS em cães submetidos a infusão contínua de propofol e mantidos em ventilação espontânea. Oito cães foram submetidos a cinco anestesias, diferenciando-se uma da outra pela FiO2 fornecida. Formaram-se cinco grupos denominados G100 (FiO2 = 1; G80 (FiO2 = 0,8; G60 (FiO2 = 0,6; G40 (FiO2 = 0,4 e G20 (FiO2 = 0,21. Os animais foram induzidos à anestesia com propofol na dose necessária para intubação, e, ato contínuo, iniciaram-se a infusão do fármaco e o fornecimento de oxigênio, conforme a FiO2 determinada para cada grupo. As primeiras mensurações (M0 foram efetuadas 30 minutos após o início da infusão do anestésico e, depois, em intervalos de 15 minutos (M15, M30, M45 e M60. A pressão parcial de oxigênio no sangue arterial (PaO2 variou conforme a FiO2, ou seja, quanto maior a FiO2, maior foi a PaO2. Para a pressão parcial de dióxido de carbono no sangue arterial (PaCO2, foram registradas diferenças em M30, no qual G100 foi maior que G20. Não foram observadas diferenças significativas nas variáveis estudadas do BIS. Os intervalos de médias registrados para o BIS foram, para G100, de 68 a 62; G80, de 71 a 58; G60, de 72 a 62; G40, de 76 a 68; e G20, de 77 a 68. Conclui-se que as variáveis relacionadas ao BIS não são afetadas pelo emprego de diferentes FiO2, e sugere-se que o monitoramento pelo BIS foi capaz de detectar alterações no equilíbrio do fluxo sangüíneo cerebral, oriundas das alterações ocasionadas na dinâmica respiratória pelo emprego de diferentes frações inspiradas de oxigênio.The effects of several inspired oxygen fractions (FiO2 on the bispectral index in spontaneously breathing dogs submitted to continuous infusion of propofol were evaluated. Eight adult mongrel dogs were used. Each animal was submitted to five anesthesias. In each procedure, the patient was allowed to

  16. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  17. Outpatient management protocol of skin tattoos with simple chemo ...

    African Journals Online (AJOL)

    , secondly an operative surgical procedure of simple dermabrasion followed by a third stage of intensive postoperative skin care protocol with local application of anti-scar formation ointments. The therapeutic protocol was successful with a ...

  18. Protocol, Engineering Research Center, University of California, Santa Barbara

    National Research Council Canada - National Science Library

    Melliar-Smith, P. M

    2005-01-01

    .... More specifically, the research has focused on: (1) the design and evaluation of protocols for real-time performance, fault tolerance and security, as well as protocols for mobile wireless environments; (2...

  19. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  20. Analytical protocols for characterisation of sulphur-free lignin

    NARCIS (Netherlands)

    Gosselink, R.J.A.; Abächerli, A.; Semke, H.; Malherbe, R.; Käuper, P.; Nadif, A.; Dam, van J.E.G.

    2004-01-01

    Interlaboratory tests for chemical characterisation of sulphur-free lignins were performed by five laboratories to develop useful analytical protocols, which are lacking, and identify quality-related properties. Protocols have been established for reproducible determination of the chemical

  1. SPIRIT 2013 Statement: defining standard protocol items for clinical trials

    Directory of Open Access Journals (Sweden)

    An-Wen Chan

    Full Text Available The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  2. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides...... a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  3. Yoga-teaching protocol adapted for children with visual impairment

    Directory of Open Access Journals (Sweden)

    Soubhagyalaxmi Mohanty

    2016-01-01

    Conclusions: Specially designed protocol may pave the way to impart yoga in an exciting and comfortable way to children with VI. More studies are needed to further investigate the effectiveness of this new yoga protocol in similar settings.

  4. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.

    2015-01-01

    trials. RT-QA of large multicentre-trials, however, requires substantial effort and resources. Recently, we presented a digital QA platform, the CIRRO dose plan bank, which allows for central review of such trials. Here, we present our RT-QA results from the latest completed clinical protocol from......Purpose/Objective: It has been demonstrated that nonadherence to protocol-specified radiotherapy (RT) requirements is associated with reduced survival, local control and potentially increased toxicity [1]. Thus, quality assurance (QA) of RT is important when evaluating the results of clinical...... the Danish Head and Neck Cancer Group (DAHANCA). Materials and Methods: The clinical results of the DAHANCA 19 randomized phase III trial evaluated the effect of concurrent EGFR-inhibition during primary curative (chemo) radiotherapy in patients with head and neck squamous cell carcinoma (HNSCC). A total...

  5. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  6. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    .e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful......Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i...... considerations on the available resources, especially in meeting real-time and resource constraints, as well as cost and reliability requirements. For this reason many proposed security protocols in this domain have peculiar features, not present in traditional security literature. In this thesis we tackle...

  7. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  8. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  9. Ischemic postconditioning: experimental models and protocol algorithms.

    Science.gov (United States)

    Skyschally, Andreas; van Caster, Patrick; Iliodromitis, Efstathios K; Schulz, Rainer; Kremastinos, Dimitrios T; Heusch, Gerd

    2009-09-01

    Ischemic postconditioning, a simple mechanical maneuver at the onset of reperfusion, reduces infarct size after ischemia/reperfusion. After its first description in 2003 by Zhao et al. numerous experimental studies have investigated this protective phenomenon. Whereas the underlying mechanisms and signal transduction are not yet understood in detail, infarct size reduction by ischemic postconditioning was confirmed in all species tested so far, including man. We have now reviewed the literature with focus on experimental models and protocols to better understand the determinants of protection by ischemic postconditioning or lack of it. Only studies with infarct size as unequivocal endpoint were considered. In all species and models, the duration of index ischemia and the protective protocol algorithm impact on the outcome of ischemic postconditioning, and gender, age, and myocardial temperature contribute.

  10. An optimized transformation protocol for Lipomyces starkeyi.

    Science.gov (United States)

    Calvey, Christopher H; Willis, Laura B; Jeffries, Thomas W

    2014-08-01

    We report the development of an efficient genetic transformation system for Lipomyces starkeyi based on a modified lithium acetate transformation protocol. L. starkeyi is a highly lipogenic yeast that grows on a wide range of substrates. The initial transformation rate for this species was extremely low, and required very high concentrations of DNA. A systematic approach for optimizing the protocol resulted in an increase in the transformation efficiency by four orders of magnitude. Important parameters included cell density, the duration of incubation and recovery periods, the heat shock temperature, and the concentration of lithium acetate and carrier DNA within the transformation mixture. We have achieved efficiencies in excess of 8,000 transformants/µg DNA, which now make it possible to screen libraries in the metabolic engineering of this yeast. Metabolic engineering based on this transformation system could improve lipogenesis and enable formation of higher value products.

  11. Internet Core Protocols Help for Network Administrators

    CERN Document Server

    Hall, Eric

    2000-01-01

    If you've ever been responsible for a network, you know that sinkingfeeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work. When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protoc

  12. Validation of authentication protocols for mobile satellite systems

    OpenAIRE

    Saeed Beheshtifard

    2016-01-01

    In recent times, a variety of protocols have been proposed so as to provide security for mobile satellite communication systems. These protocols should be tested to check their functional correctness before they are used practically. A variety of security protocols for the mobile satellite communication system have been proposed. The present study analyzes three most known authentication protocols for mobile satellite communication system from the security perspective regarding da...

  13. Verification of authentication protocols for mobile satellite communication systems

    OpenAIRE

    Reham Abdellatif Abouhogail

    2014-01-01

    In recent times, many protocols have been proposed to provide security for mobile satellite communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Many security protocols for the mobile satellite communication system have been presented. This paper analyzes three of the most famous authentication protocols for mobile satellite communication system from the security viewpoint of data desynchronization attack. Based on strand spac...

  14. A Hybrid Analysis for Security Protocols with State

    Science.gov (United States)

    2014-07-16

    this paper describes an application of our method to the Envelope Protocol, a protocol that interacts with a Trusted Platform Module ( TPM ) to achieve an...important security goal. Section 1 describes the protocol Π. Section 2 describes our TPM model, Tstate( ). Section 3 presents the theory of bundles...version. The cryptographic version of this protocol uses a TPM to achieve the security goal. Here we restrict our attention to a subset of the TPM’s

  15. Performance Evaluation of the WSN Routing Protocols Scalability

    Directory of Open Access Journals (Sweden)

    L. Alazzawi

    2008-01-01

    Full Text Available Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs. A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network scalability.

  16. A Model Based Security Testing Method for Protocol Implementation

    Directory of Open Access Journals (Sweden)

    Yu Long Fu

    2014-01-01

    Full Text Available The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  17. A protocol for people with hearing impairment.

    Science.gov (United States)

    Hayman, M

    The Patient's Charter states that people have the right to discuss and help to decide their care and treatment and that those with special needs are entitled to help when dealing with the NHS, including having someone to speak for them when necessary. This paper details the development of a protocol outlining the needs of people with hearing impairments with a view to ensuring staff have access to relevant specialist educational and communication skills.

  18. Building America House Simulation Protocols (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  19. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research to qu...... the statistical principles for trial protocols in terms of design, analysis, and reporting of findings....

  20. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  1. Protocol for Initial Purification of Bacteriocin

    Science.gov (United States)

    2015-10-01

    REPORT DATE (DD-MM-YYYY) 30-10-2015 2. REPORT TYPE Final 3. DATES COVERED (From - To) February 2013 – August 2014 4. TITLE AND SUBTITLE PROTOCOL...microorganisms. 3 5. Test Organisms  Target bacteria – Bacillus anthracis Sterne, Staphylococcus aureus ATCC 27217, or Pseudomonas aeruginosa...freezer. 6. Procedures 6.1. Prepare Target Bacteria:  Inoculate a single colony of a fresh culture of Bacillus anthracis Sterne, Staphylococcus

  2. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  3. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  4. 'BREAKS' Protocol for Breaking Bad News.

    Science.gov (United States)

    Narayanan, Vijayakumar; Bista, Bibek; Koshy, Cheriyan

    2010-05-01

    Information that drastically alters the life world of the patient is termed as bad news. Conveying bad news is a skilled communication, and not at all easy. The amount of truth to be disclosed is subjective. A properly structured and well-orchestrated communication has a positive therapeutic effect. This is a process of negotiation between patient and physician, but physicians often find it difficult due to many reasons. They feel incompetent and are afraid of unleashing a negative reaction from the patient or their relatives. The physician is reminded of his or her own vulnerability to terminal illness, and find themselves powerless over emotional distress. Lack of sufficient training in breaking bad news is a handicap to most physicians and health care workers. Adherence to the principles of client-centered counseling is helpful in attaining this skill. Fundamental insight of the patient is exploited and the bad news is delivered in a structured manner, because the patient is the one who knows what is hurting him most and he is the one who knows how to move forward. Six-step SPIKES protocol is widely used for breaking bad news. In this paper, we put forward another six-step protocol, the BREAKS protocol as a systematic and easy communication strategy for breaking bad news. Development of competence in dealing with difficult situations has positive therapeutic outcome and is a professionally satisfying one.

  5. Biologic comparison of partial breast irradiation protocols

    International Nuclear Information System (INIS)

    Rosenstein, Barry S.; Lymberis, Stella C.; Formenti, Silvia C.

    2004-01-01

    Purpose: To analyze the dose/fractionation schedules currently used in ongoing clinical trials of partial breast irradiation (PBI) by comparing their biologically effective dose (BED) values to those of three standard whole breast protocols commonly used after segmental mastectomy in the treatment of breast cancer. Methods and materials: The BED equation derived from the linear-quadratic model for radiation-induced cell killing was used to calculate the BEDs for three commonly used whole breast radiotherapy regimens, in addition to a variety of external beam radiotherapy, as well as high-dose-rate and low-dose-rate brachytherapy, PBI protocols. Results: The BED values of most PBI protocols resulted in tumor control BEDs roughly equivalent to a 50-Gy standard treatment, but consistently lower than the BEDs for regimens in which the tumor bed receives a total dose of either 60 Gy or 66 Gy. The BED values calculated for the acute radiation responses of erythema and desquamation were nearly all lower for the PBI schedules, and the late-response BEDs for most PBI regimens were in a similar range to the BEDs for the standard treatments. Conclusion: Biologically effective dose modeling raises the concern that inadequate doses might be delivered by PBI to ensure optimal in-field tumor control

  6. The Interlibrary Loan Protocol: An OSI Solution to ILL Messaging.

    Science.gov (United States)

    Turner, Fay

    1990-01-01

    Discusses the interlibrary loan (ILL) protocol, a standard based on the principles of the Open Systems Interconnection (OSI) Reference Model. Benefits derived from protocol use are described, the status of the protocol as an international standard is reviewed, and steps taken by the National Library of Canada to facilitate migration to an ILL…

  7. 42 CFR 438.352 - External quality review protocols.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false External quality review protocols. 438.352 Section... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE External Quality Review § 438.352 External quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of the...

  8. Development of pediatric CT protocols for specific scanners: why bother?

    Energy Technology Data Exchange (ETDEWEB)

    Cody, Dianna D. [University of Texas M.D. Anderson Cancer Center, Department of Imaging Physics, Houston, TX (United States)

    2014-10-15

    When determining a strategy for pediatric CT scanning, clinical staff can either elect to adjust routine adult-protocol parameter settings on a case-by-case basis or rely on pre-set pediatric protocol parameters. The advantages of the latter approach are the topic of this manuscript. This paper outlines specific options to consider, including the need for regular protocol review. (orig.)

  9. Enhanced SWEET protocol for energy efficient wireless sensor networks

    CSIR Research Space (South Africa)

    Dludla, AG

    2013-10-01

    Full Text Available SWEET routing protocol is one of the many pro- tocols developed for cluster formation and routing in wireless sensor networks. The SWEET protocol is a decentralized clus- tering protocol, it uses timers and interim updated cluster head estimation...

  10. A correctness proof of the bakery protocol in $ mu $CRL

    NARCIS (Netherlands)

    J.F. Groote (Jan Friso); H.P. Korver

    1994-01-01

    textabstractA specification of a bakery protocol is given in $mu$CRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for $mu$CRL. The proof primarily consists of algebraic manipulations based on

  11. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature of the...

  12. Evaluating the Stream Control Transmission Protocol Using Uppaal

    NARCIS (Netherlands)

    Saini, Shruti; Fehnker, Ansgar; Hermanns, Holger; Höfner, Peter

    2017-01-01

    The Stream Control Transmission Protocol (SCTP) is a Transport Layer protocol that has been proposed as an alternative to the Transmission Control Protocol (TCP) for the Internet of Things (IoT). SCTP, with its four-way handshake mechanism, claims to protect the Server from a Denial-of-Service (DoS)

  13. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  14. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  15. Efficient multiparty protocols via log-depth threshold formulae

    DEFF Research Database (Denmark)

    Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval

    2013-01-01

    We put forward a new approach for the design of efficient multiparty protocols: Design a protocol π for a small number of parties (say, 3 or 4) which achieves security against a single corrupted party. Such protocols are typically easy to construct, as they may employ techniques that do not scale...

  16. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  17. The MAC framework : Redefining MAC protocols for wireless sensor networks

    NARCIS (Netherlands)

    Parker, T.; Halkes, G.; Bezemer, M.; Langendoen, K.

    2010-01-01

    Most current WSN MAC protocol implementations have multiple tasks to perform—deciding on correct timing, sending of packets, sending of acknowledgements, etc. However, as much of this is common to all MAC protocols, there is duplication of functionality, which leads to larger MAC protocol code size

  18. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    Science.gov (United States)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  19. A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)

    OpenAIRE

    Babatunde, Olabenjo; Al-Debagy, Omar

    2014-01-01

    Many computers and devices are becoming more connected to the internet in recent years; the use of the Internet Protocol (IP) has made the connectivity and identification of these devices possible in large scale. In this paper, we will discuss the evolution of Internet Protocol version 4 (IPv4), its features, issues and limitations and how Internet Protocol version 6 (IPv6) tends to solve some of these issues including the differences and transition between these two protocols.

  20. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  1. Exploring the Implementation of Steganography Protocols on Quantum Audio Signals

    Science.gov (United States)

    Chen, Kehan; Yan, Fei; Iliyasu, Abdullah M.; Zhao, Jianping

    2018-02-01

    Two quantum audio steganography (QAS) protocols are proposed, each of which manipulates or modifies the least significant qubit (LSQb) of the host quantum audio signal that is encoded as an FRQA (flexible representation of quantum audio) audio content. The first protocol (i.e. the conventional LSQb QAS protocol or simply the cLSQ stego protocol) is built on the exchanges between qubits encoding the quantum audio message and the LSQb of the amplitude information in the host quantum audio samples. In the second protocol, the embedding procedure to realize it implants information from a quantum audio message deep into the constraint-imposed most significant qubit (MSQb) of the host quantum audio samples, we refer to it as the pseudo MSQb QAS protocol or simply the pMSQ stego protocol. The cLSQ stego protocol is designed to guarantee high imperceptibility between the host quantum audio and its stego version, whereas the pMSQ stego protocol ensures that the resulting stego quantum audio signal is better immune to illicit tampering and copyright violations (a.k.a. robustness). Built on the circuit model of quantum computation, the circuit networks to execute the embedding and extraction algorithms of both QAS protocols are determined and simulation-based experiments are conducted to demonstrate their implementation. Outcomes attest that both protocols offer promising trade-offs in terms of imperceptibility and robustness.

  2. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  3. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  4. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  5. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  6. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages......, that are analysable with respect to interesting properties. Furthermore it motivates and is an example of, a novel, more general methodology of language design by first verbosely describing the semantics in a mathematical language, e.g. a logic, then restricting the properties of interest to be computable......, and finally systematically transforming it into a more intuitive specification language, maintaining this tractability....

  7. Proposed protocols for peripheral and renal Doppler

    International Nuclear Information System (INIS)

    Fonseca Portuguez, Adriana

    2009-01-01

    A literature review was performed in order to prepare a summary of the important concepts of Doppler and applications in peripheral vascular evaluation and renal. The normal characteristics are summarized and explained in each vascular system and diagnostic criteria of the disorders frequently encountered in practice. Requested more studies have been identified and proposed protocols and report sheets have been developed to standardize the methodology of realization of several Doppler studies. The variability between operators has been treated to reduce as much as possible and follow-up studies have provided in patients who need. (author) [es

  8. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Engebrecht, C. Metzger [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  9. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht-Metzger, C. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  10. Network protocols. Special issue; Netwerkprotocollen. Themanummer

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, G.A. [RTB Van Heugten, Nijmegen (Netherlands); Rooijakkers, G.W.J. [GTI Building Automation, Amsterdam (Netherlands); Peterse, A. [Regel Partners, Hoevelaken (Netherlands); Smits, P. [Konnex Nederland, Valkenswaard (Netherlands); Hamers, E.P. [Van Dorp Installaties, Breda (Netherlands); Van der Velden, J.A.J. [Kropman, Rijswijk (Netherlands); Van Lingen, G.; Wijn, D.M. [Engineer Johnson Controls, Gorinchem (Netherlands); Deckere, W.J.M.A. [Deerns raadgevende ingenieurs, Rijswijk (Netherlands); Driessen, B. [Saia Burgess, Gouda (Netherlands); Van Olst, K. [K en R Consultants, Deventer (Netherlands); Mosterman, F. [Wago Building Technology, Harderwijk (Netherlands); Staub, R. [BUS-House, Zuerich (Switzerland); Meiring, O.B.; Hut, W.H. [Sauter Building Control Nederland, Amsterdam (Netherlands); Tukker, A. [Webeasy Products, Sliedrecht (Netherlands); Bakker, L.G.; Soethout, L.L.; Elkhuizen, P.A. [TNO Bouw en Ondergrond, Delft (Netherlands); Haeseler, U. [TAC GmbH, Berlin (Germany); Kerdel, J.F. [Siemens Building Technologies, Zoetermeer (Netherlands); Lugt, G.L.; Draijer, G.W.

    2007-11-15

    In 20 articles attention is paid to several aspects of network protocols by means of which building automation systems can exchange data: building automation and management, history of technical installations management, the open communication standard BACnet (Building Automation and Control network), the so-called ISO/IEC domotics and communication standard KNX or Konnex, the integration of electrotechnical and engineering installations by the LonWorks technology, other standard protocols as Modbus, M-bus, OPC (OLE for Process Control), an outline of TCP/IP, smart design of networks, automation and networks and building owners, the use of BACnet and Ethernet in a renovated office building, the use of an open management network in buildings, wireless open integrated systems, terminology in network communication, the use of BACnet in combination with KNX, the impact of BACnet on building automation, the role of the installation sector in the ICT-environment, knowledge of building automation and management, regulations with respect to building automation, and BACnet MSTP (Multiple Spanning Tree Protocol) [Dutch] In 20 artikelen wordt in dit themanummer aandacht besteed aan diverse aspecten m.b.t. netwerkprotocollen waarmee verschillende automatiseringssystemen gegevens met elkaar uitwisselen: gebouwautomatisering en beheer, geschiedenis van technisch installatie beheer, de open communicatie standaard BACnet (Building Automation and Control network), de zogenaamde ISO/IEC domotica en communicatie standaard KNX of Konnex, de integratie van electrotechnische en werktuigbouwkundige installaties met behulp van de LonWorks technologie, andere standaard protocollen zoals Modbus, M-bus, OPC (OLE for Process Control), uitleg over TCP/IP, slim ontwerpen van netwerken, gebouweigenaren over automatisering en netwerken, het gebruik van BACnet en Ethernet in een tot kantoorgebouw gerenoveerd monumentaal gebouw, het gebruik van een open management netwerk in gebouwen, draadloos met

  11. Rosetta Ligand docking with flexible XML protocols.

    Science.gov (United States)

    Lemmon, Gordon; Meiler, Jens

    2012-01-01

    RosettaLigand is premiere software for predicting how a protein and a small molecule interact. Benchmark studies demonstrate that 70% of the top scoring RosettaLigand predicted interfaces are within 2Å RMSD from the crystal structure [1]. The latest release of Rosetta ligand software includes many new features, such as (1) docking of multiple ligands simultaneously, (2) representing ligands as fragments for greater flexibility, (3) redesign of the interface during docking, and (4) an XML script based interface that gives the user full control of the ligand docking protocol.

  12. Observing documentary reading by verbal protocol

    Directory of Open Access Journals (Sweden)

    Fujita Mariangela Spotti Lopes

    2003-01-01

    Full Text Available Verifies the applicability to research on indexers' reading strategies of the process observing technique known as Verbal Protocol or Thinking Aloud. This interpretative-qualitative data collecting technique allows the observation of different kinds of process during the progress of different kinds of tasks. Presents a theoretical investigation into "reading" and into formal methodological procedures to observe reading processes. Describes details of the methodological procedures adopted in five case studies with analysis of samples of data. The project adopted three kinds of parameters for data analysis: theoretical, normative, empirical (derived from observations made in the first case study. The results are compared, and important conclusions regarding documentary reading are drawn.

  13. Right to Food and the Nagoya Protocol

    Directory of Open Access Journals (Sweden)

    Romina Ysabel Bazán Barba

    2016-12-01

    Full Text Available In the perspective of Environmental Law, the juridical-sociological aspect addresses the problem for the Right to Food, which has been intensified by the lack of equity, social justice and mainly by environmental degradation. Based on theoretical research, the Constitution and international treaties on the subject, the problem of hunger is studied, with emphasis on the Nagoya Protocol – a new international instrument for access and distribution of genetic resources. It aims to analyze the geopolitics behind the hunger issue; the indiscriminate use of agrochemicals; the monopoly of seeds; and the lives wasted in the process of maintenance/circulation in the food market.

  14. A Safe Protocol for Amalgam Removal

    Science.gov (United States)

    Colson, Dana G.

    2012-01-01

    Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury) restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body. PMID:22315627

  15. Impact of Communication Protocol on Performance

    Energy Technology Data Exchange (ETDEWEB)

    Worley, P.H.

    1999-02-01

    We use the PSTSWM compact application benchmark code to characterize the performance behavior of interprocessor communication on the SGI/Cray Research Origin 2000 and T3E-900. We measure 1. single processor performance, 2. point-to-point communication performance, 3. performance variation as a function of communication protocols and transport layer for collective communication routines, and 4. performance sensitivity of full application code to choice of parallel implementation. We also compare and contrast these results with similar results for the previous generation of parallel platforms, evaluating how the relative importance of communication performance has changed.

  16. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  17. Analysis of protection spanning-tree protocol

    Directory of Open Access Journals (Sweden)

    Б.Я. Корнієнко

    2007-01-01

    Full Text Available  Extraordinary sweeping  of  IT – development  causes vulnerabilities and, thereafter, attacks that use these vulnerabilities. That is why one must post factum or even in advance speed up invention of new information  security systems as well as develop the old ones. The matter of article concerns Spanning-Tree Protocol  – the vivid example of the case, when the cure of the vulnerability creates dozen of new "weak spots".

  18. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  19. A Safe Protocol for Amalgam Removal

    Directory of Open Access Journals (Sweden)

    Dana G. Colson

    2012-01-01

    Full Text Available Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body.

  20. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  1. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  2. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  3. The Quantum Steganography Protocol via Quantum Noisy Channels

    Science.gov (United States)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  4. Hardening Stratum, the Bitcoin Pool Mining Protocol

    Directory of Open Access Journals (Sweden)

    Recabarren Ruben

    2017-07-01

    Full Text Available Stratum, the de-facto mining communication protocol used by blockchain based cryptocurrency systems, enables miners to reliably and efficiently fetch jobs from mining pool servers. In this paper we exploit Stratum’s lack of encryption to develop passive and active attacks on Bitcoin’s mining protocol, with important implications on the privacy, security and even safety of mining equipment owners. We introduce StraTap and ISP Log attacks, that infer miner earnings if given access to miner communications, or even their logs. We develop BiteCoin, an active attack that hijacks shares submitted by miners, and their associated payouts. We build BiteCoin on WireGhost, a tool we developed to hijack and surreptitiously maintain Stratum connections. Our attacks reveal that securing Stratum through pervasive encryption is not only undesirable (due to large overheads, but also ineffective: an adversary can predict miner earnings even when given access to only packet timestamps. Instead, we devise Bedrock, a minimalistic Stratum extension that protects the privacy and security of mining participants. We introduce and leverage the mining cookie concept, a secret that each miner shares with the pool and includes in its puzzle computations, and that prevents attackers from reconstructing or hijacking the puzzles.

  5. Research Protocol: Collections Related to Synthetic Turf ...

    Science.gov (United States)

    The “Federal Research Action Plan on Recycled Tire Crumb Used on Playing Fields and Playgrounds” (referred to subsequently as the Federal Research Action Plan or FRAP) was finalized in February 2016. The U.S. EPA and CDC/ATSDR, in collaboration with CPSC, have prepared this research protocol to implement portions of the research activities outlined under the FRAP. Specifically, this research protocol is designed to implement three of the research elements described in the Federal Research Action Plan: Conduct a literature review and data gaps analysis; Perform tire crumb rubber characterization research; Perform human exposure characterization research. Concerns have been raised by the public about the safety of recycled tire crumb rubber used in synthetic turf fields and playgrounds in the United States. Several studies have been identified that examine exposure to tire crumb rubber infill in these settings. While, in general, these studies have not provided evidence for these health concerns, the existing studies do not comprehensively evaluate all aspects of exposure associated with these use scenarios. Additional research is needed to help fill important data gaps that will lead to improved exposure assessment and risk evaluation for children and adults using synthetic turf fields and playgrounds with tire crumb rubber. In response, the U.S. Environmental Protection Agency (EPA), the Centers for Disease Control and Prevention/Agency for Toxic Su

  6. Resilient packet ring media access protocol

    Science.gov (United States)

    Thepot, Frederic

    2001-07-01

    The discussion will cover the new initiative to create a new MAC layer standard for resilient packet rings: IEEE 802.17 RPR. The key aspects of the presentation will include a preliminary address of the Metro Area Network today and the current networking technologies such as SONET/SDH which are not optimized to carry IP traffic over Metro MAN. The next segment will cover the options which could change the traditional and expensive layered networking model, and address the real benefits of marrying several technologies like Ethernet, SONET/SDH and IP into one technology. The next part of the discussion will detail the technical advantages a new MAC will bring to the services providers. Lastly a summary of the view and strategy about the acceptance and deployment of this new technology in the next 12 months, specifically, now one defines and develops standards for a Resilient Packet Ring Access Protocol for use in Local, Metropolitan, and Wide Area Networks for transfer of data packets at rates scalable to multiple gigabits per second; specifically address the data transmission requirements of carriers that have present and planned fiber optic physical infrastructure in a ring topology; and, defining and developing detailed specifications for using existing and/or new physical layers at appropriate data rates that will support transmission of this access protocol.

  7. Fibred Coalgebraic Logic and Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Daniel Marsden

    2014-12-01

    Full Text Available Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  8. The Montreal Protocol for Identification of Amusia.

    Science.gov (United States)

    Vuvan, D T; Paquette, S; Mignault Goulet, G; Royal, I; Felezeu, M; Peretz, I

    2018-04-01

    The Montreal Battery for the Evaluation of Amusia (MBEA; Peretz, Champod, & Hyde Annals of the New York Academy of Sciences, 999, 58-75, 2003) is an empirically grounded quantitative tool that is widely used to identify individuals with congenital amusia. The use of such a standardized measure ensures that the individuals tested will conform to a specific neuropsychological profile, allowing for comparisons across studies and research groups. Recently, a number of researchers have published credible critiques of the usefulness of the MBEA as a diagnostic tool for amusia. Here we argue that the MBEA and its online counterpart, the AMUSIA tests (Peretz et al. Music Perception, 25, 331-343, 2008), should be considered steps in a screening process for amusia, rather than standalone diagnostic tools. The goal of this article is to present, in detailed and easily replicable format, the full protocol through which congenital amusics should be identified. In providing information that has often gone unreported in published articles, we aim to clarify the strengths and limitations of the MBEA and to make recommendations for its continued use by the research community as part of the Montreal Protocol for Identification of Amusia.

  9. Kyoto protocol: at last the agreement has been reached; Protocole de Kyoto: un accord enfin conclu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    After more than 3 years of negotiations, 180 countries agreed at Bonn on the application of the Kyoto protocol to fight the climatic warming. The main aspects of this agreement are discussed: the carbon wells, the tools of the pollution control for the developed countries and the financial help to the developing countries. (A.L.B.)

  10. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  11. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  12. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...

  13. Probabilistic protocols in quantum information science: Use and abuse

    Science.gov (United States)

    Caves, Carlton

    2014-03-01

    Protocols in quantum information science often succeed with less than unit probability, but nonetheless perform useful tasks because success occurs often enough to make tolerable the overhead from having to perform the protocol several times. Any probabilistic protocol must be analyzed from the perspective of the resources required to make the protocol succeed. I present results from analyses of two probabilistic protocols: (i) nondeterministic (or immaculate) linear amplification, in which an input coherent state is amplified some of the time to a larger-amplitude coherent state, and (ii) probabilistic quantum metrology, in which one attempts to improve estimation of a parameter (or parameters) by post-selecting on a particular outcome. The analysis indicates that there is little to be gained from probabilistic protocols in these two situations.

  14. A Secure RFID Authentication Protocol Adopting Error Correction Code

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2014-01-01

    Full Text Available RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  15. A secure RFID authentication protocol adopting error correction code.

    Science.gov (United States)

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  16. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  17. Authentication and common key generation cryptographic protocol for vehicle tachographs

    Directory of Open Access Journals (Sweden)

    Victor S. Gorbatov

    2017-11-01

    Full Text Available We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms. It ensures integrity and authenticity of data transmitted through communication channel between the on-board devices and vehicle tachograph cards. The protocol was developed in accordance with the Rosstandart recommendations and complies with the development and modernization principles for data protection encryption (cryptographic means. The protocol was suggested as a national standard draft and is open for public discussion in accordance with the established procedure. The main results of our study is the formulation of certain security tasks identical to those used by potential infringers to compromise the protocol. This allows one to account for structural features that will ensure further protocol compliance to the target security characteristics, as well as to guarantee subsequent justification of feature set sufficiency.

  18. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    OpenAIRE

    RIBEIRO, CHRISTIE GRAF; MOREIRA, ANA TEREZA RAMOS; PINTO, JOSÉ SIMÃO DE PAULA; MALAFAIA, OSVALDO

    2016-01-01

    ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). Methods: this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) compute...

  19. Quantum protocol for cheat-sensitive weak coin flipping.

    Science.gov (United States)

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  20. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  1. The development of standard operating protocols for paediatric radiology

    International Nuclear Information System (INIS)

    Hardwick, J.; Mencik, C.; McLaren, C.; Young, C.; Scadden, S.; Mashford, P.; McHugh, K.; Beckett, M.; Calvert, M.; Marsden, P.J.

    2001-01-01

    This paper describes how the requirement for operating protocols for standard radiological practice was expanded to provide a comprehensive aide to the operator conducting a medical exposure. The protocols adopted now include justification criteria, patient preparation, radiographic technique, standard exposure charts, diagnostic reference levels and image quality criteria. In total, the protocols have been welcomed as a tool for ensuring that medical exposures are properly optimised. (author)

  2. A Comparative Study of Various Routing Protocols in VANET

    OpenAIRE

    Kumar, Rakesh; Dave, Mayank

    2011-01-01

    Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the applications of various routing protocols for vehicular ad hoc networks. It explores the motivation behind the designed, and traces the evolution of these routing protocols. F inally the paper conclud...

  3. An economic and feasible Quantum Sealed-bid Auction protocol

    Science.gov (United States)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  4. Implementation of Siemens USS protocol into LabVIEW.

    Science.gov (United States)

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.

  5. Quantum Private Comparison Protocol Based on Bell Entangled States

    International Nuclear Information System (INIS)

    Liu Wen; Wang Yongbin; Cui Wei

    2012-01-01

    In this paper, a quantum private comparison protocol is proposed based on bell entangled states. In our protocol, two parties can compare the equality of their information with the help of a semi-honest third party. The correctness and security of our protocol are discussed. One party cannot learn the other's private information and the third party also cannot learn any information about the private information. (general)

  6. Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Chen Yulin; Huang Yugai; Fang Xia

    2011-01-01

    We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)

  7. Genomics protocols [Methods in molecular biology, v. 175

    National Research Council Canada - National Science Library

    Starkey, Michael P; Elaswarapu, Ramnath

    2001-01-01

    .... Drawing on emerging technologies in the fields of bioinformatics and proteomics, these protocols cover not only those traditionally recognized as genomics, but also early therapeutich approaches...

  8. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  9. Protocol-driven costs in trial-based pharmacoeconomic analyses.

    Science.gov (United States)

    Gandjour, Afschin

    2011-12-01

    Many authors and guidelines have proposed to exclude protocol-driven costs from cost-effectiveness analyses alongside clinical trials because they do not occur in clinical practice. This article, however, argues that only costs to improve patient adherence can be excluded, as the underlying protocol-driven activities have a clearly distinguishable cost and utility impact (most of the time). All other protocol-driven costs need to be included because the cost and utility impact of the underlying protocol-driven activities cannot be easily separated.

  10. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  11. Protocol for a Delay-Tolerant Data-Communication Network

    Science.gov (United States)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  12. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  13. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  14. Cryptanalysis of the secure quantum private comparison protocol

    International Nuclear Information System (INIS)

    Liu Xingtong; Zhao Jingjing; Wang Jian; Tang Chaojing

    2013-01-01

    Recently, Yang et al [2009 Phys. Scr. 80 065002] presented the first quantum private comparison protocol that involves single photons only. This protocol is very promising in practice. However, in this paper, we analyze the security of the protocol and point out a subtle loophole. It is shown that both Eve and Charlie could obtain Bob's secret by launching a special dense-coding attack. Moreover, details of this attack and its correctness are given, and also two solutions are demonstrated to improve the protocol in order to overcome the fatal flaw. (paper)

  15. Open Core Protocol (OCP) Clock Domain Crossing Interfaces

    DEFF Research Database (Denmark)

    Herlev, Mathias; Poulsen, Christian Keis; Sparsø, Jens

    2014-01-01

    The open core protocol (OCP) is an openly licensed configurable and scalable interface protocol for on-chip subsystem communications. The protocol defines read and write transactions from a master towards a slave across a point-to-point connection and the protocol assumes a single common clock....... This paper presents the design of two OCP clock domain crossing interface modules that can be used to construct systems with multiple clock domains. An OCP interface typically has control signals related to both the master issuing a read or write request and the slave producing a response. If all...

  16. Review of Immediate and Early Loading Protocols in Dental Implants

    Directory of Open Access Journals (Sweden)

    M Rismanchian

    2010-12-01

    Full Text Available Introduction: The concept of treating edentulous patients by osseointegrated implants was first proposed in 1960s. To minimize the failure rate of implants, it has been recommended to keep the implants free of load during the healing period .Recent studies have been directed to achieve faster integration and shorter healing periods prior to implant restoration. Loading protocols (immediate loading , early loading can best be interpreted on the biologic basis of implant integration. Each of these protocols needs special prerequisites and there are special risk factors for different loading protocols. Objectives: In this review article, different loading protocols and their surgical and prosthetic considerations are discussed.

  17. The Kyoto Protocol Is Cost-effective

    Directory of Open Access Journals (Sweden)

    Marino Gatto

    2002-06-01

    Full Text Available Despite recent advances, there is a high degree of uncertainty concerning the climate change that would result from increasing atmospheric greenhouse gas concentrations. Also, opponents of the Kyoto Protocol raised the key objection that reducing emissions would impose an unacceptable economic burden on businesses and consumers. Based on an analysis of alternative scenarios for electricity generation in Italy, we show that if the costs in terms of damage to human health, material goods, agriculture, and the environment caused by greenhouse gas emissions are included in the balance, the economic argument against Kyoto is untenable. Most importantly, the argument holds true even if we exclude global external costs (those due to global warming, and account for local external costs only (such as those due to acidic precipitation and lung diseases resulting from air pollution.

  18. New dimensions in SNMP Protocol in Romania

    Directory of Open Access Journals (Sweden)

    Alice Nastovici

    2009-06-01

    Full Text Available In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy for community names as used for passwords.Make sure that they are difficult to guess or crack and that they are chanced periodically- Validate and check community names using SNMPwalk. Additional information can be foundat http://www.2nd.com/functionSNMPwalk.php- Filter SNMP (port 161/udp at the border-router or firewall unless it is absolutely necessary topool or manage devices from outside of the local network, where possible read-only

  19. Chest magnetic resonance imaging: a protocol suggestion

    Directory of Open Access Journals (Sweden)

    Bruno Hochhegger

    2015-12-01

    Full Text Available Abstract In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation.

  20. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... previous approaches to the problem. Starting from an open point-to-point network there is a long way to general secure multiparty computation. The dissertation contains contributions at several points along the way. In particular we investigate how to realize secure channels. We also show how threshold...... you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...

  1. Neonatal euthanasia: lessons from the Groningen Protocol.

    Science.gov (United States)

    Eduard Verhagen, A A

    2014-10-01

    Decisions about neonatal end-of-life care have been studied intensely over the last 20 years in The Netherlands. Nationwide surveys were done to quantify these decisions, provide details and monitor the effect of guidelines, new regulations and other interventions. One of those interventions was the Groningen Protocol for newborn euthanasia in severely ill newborns, published in 2005. Before publication, an estimated 20 cases of euthanasia per year were performed. After publication, only two cases in five years were reported. Studies suggested that this might be partly caused by the lack of consensus about the dividing line between euthanasia and palliative care. New recommendations about paralytic medication use in dying newborns were issued to increase transparency and to improve reporting of euthanasia. New surveys will be needed to measure the effects of these interventions. This cycle of interventions and measurements seems useful for continuous improvement of end-of-life care in newborns. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. A simulation of the FASTBUS protocols

    CERN Document Server

    Booth, A W

    1981-01-01

    FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. Its applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator.

  3. Optical protocols for advanced spacecraft networks

    Science.gov (United States)

    Bergman, Larry A.

    1991-09-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  4. Quantitative methods for studying design protocols

    CERN Document Server

    Kan, Jeff WT

    2017-01-01

    This book is aimed at researchers and students who would like to engage in and deepen their understanding of design cognition research. The book presents new approaches for analyzing design thinking and proposes methods of measuring design processes. These methods seek to quantify design issues and design processes that are defined based on notions from the Function-Behavior-Structure (FBS) design ontology and from linkography. A linkograph is a network of linked design moves or segments. FBS ontology concepts have been used in both design theory and design thinking research and have yielded numerous results. Linkography is one of the most influential and elegant design cognition research methods. In this book Kan and Gero provide novel and state-of-the-art methods of analyzing design protocols that offer insights into design cognition by integrating segmentation with linkography by assigning FBS-based codes to design moves or segments and treating links as FBS transformation processes. They propose and test ...

  5. Protocols and plan of quantum cryptography

    Directory of Open Access Journals (Sweden)

    Milorad S. Markagić

    2012-01-01

    Full Text Available Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems. However, none of these systems provides a solution for the famous 'catch 22' of cryptography. Owing to the intensive development of quantum mechanics, in the last 30 years emerged an entirely new kind of cryptography-quantum cryptography. Its greatest contribution is a possibility to discover an intercepted communication channel from a third party. The question is: is this really true? The question arises: 'If the quantum cryptography is so good, why is not widely used?' The aim of this paper is, on the one hand, to define the basic mechanisms of quantum cryptography IP, and, on the other hand, to point to the shortcomings, as they related to the opportunities of today's devices and flaws in protocols.

  6. A simulation of the FASTBUS protocols

    International Nuclear Information System (INIS)

    Booth, A.W.

    1981-01-01

    FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. It's applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator. (orig.)

  7. Multi-protocol header generation system

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, David A.; Ignatowski, Michael; Jayasena, Nuwan; Loh, Gabriel

    2017-09-05

    A communication device includes a data source that generates data for transmission over a bus, and a data encoder that receives and encodes outgoing data. An encoder system receives outgoing data from a data source and stores the outgoing data in a first queue. An encoder encodes outgoing data with a header type that is based upon a header type indication from a controller and stores the encoded data that may be a packet or a data word with at least one layered header in a second queue for transmission. The device is configured to receive at a payload extractor, a packet protocol change command from the controller and to remove the encoded data and to re-encode the data to create a re-encoded data packet and placing the re-encoded data packet in the second queue for transmission.

  8. Designing an Exploration Atmosphere Prebreathe Protocol

    Science.gov (United States)

    Conkin, Johnny; Feiveson, A. H.; Gernhardt, M. L.; Norcross, J. R.; Wessel, J. H., III

    2015-01-01

    Extravehicular activities (EVAs) at remote locations must maximize limited resources such as oxygen (O2) and also minimize the risk of decompression sickness (DCS). A proposed remote denitrogenation (prebreathe) protocol requires astronauts to live in a mildly hypoxic atmosphere at 8.2 psia while periodically performing EVAs at 4.3 psia. Empirical data are required to confirm that the protocol meets the current accept requirements: less than or equal to 15% incidence of Type I DCS, less than or equal to 20% incidence of Grade IV venous gas emboli (VGE), both at 95% statistical confidence, with no Type II DCS symptom during the validation trial. METHODS: A repeated measures statistical design is proposed in which groups of 6 subjects with physical characteristics similar to active-duty astronauts would first become equilibrated to an 8.2 psia atmosphere in a hypobaric chamber containing 34% O2 and 66% N2, over 48 h, and then perform 4 simulated EVAs at 4.3 psia over the next 9 days. In the equilibration phase, subjects undergo a 3-h 100% O2 mask prebreathe prior to and during a 5-min ascent to 8.2 psia to prevent significant tissue N2 supersaturation on reaching 8.2 psia. Masks would be removed once 34% O2 is established at 8.2 psia, and subjects would then equilibrate to this atmosphere for 48 h. The hypoxia is equivalent to breathing air at 1,220 meters (4,000 ft) altitude, just as was experienced in the shuttle 10.2 psia - 26.5% O2 staged denitrogenation protocol and the current ISS campout denitrogenation protocol. For simulated EVAs, each subject dons a mask and breathes 85% O2 and 15% N2 during a 3-min depressurization to 6.0 psia, holds for 15 min, and then completes a 3-min depressurization to 4.3 psia. The simulated EVA period starts when 6.0 psia is reached and continues for a total of 240 min (222 min at 4.3 psia). During this time, subjects will follow a prescribed repetitive activity against loads in the upper and lower body with mean metabolic rate

  9. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research to qu...... the statistical principles for trial protocols in terms of design, analysis, and reporting of findings.......In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...

  10. Internet of Things: Architectures, Protocols, and Applications

    Directory of Open Access Journals (Sweden)

    Pallavi Sethi

    2017-01-01

    Full Text Available The Internet of Things (IoT is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly. As compared to similar survey papers in the area, this paper is far more comprehensive in its coverage and exhaustively covers most major technologies spanning from sensors to applications.

  11. Field protocols for the genomic era

    Directory of Open Access Journals (Sweden)

    N Bulatova

    2009-08-01

    Full Text Available For many decades karyotype was the only source of overall genomic information obtained from species of mammal. However, approaches have been developed in recent years to obtain molecular and ultimately genomic information directly from the extracted DNA of an organism. Molecular data have accumulated hugely for mammalian taxa. The growing volume of studies should motivate field researchers to collect suitable samples for molecular analysis from various species across all their ranges. This is the reason why we here include a molecular sampling procedure within a field work protocol, which also includes more traditional (including cytogenetic techniques. In this way we hope to foster the development of molecular and genomic studies in non-standard wild mammals.

  12. Automata Techniques for Epistemic Protocol Synthesis

    Directory of Open Access Journals (Sweden)

    Guillaume Aucher

    2014-04-01

    Full Text Available In this work we aim at applying automata techniques to problems studied in Dynamic Epistemic Logic, such as epistemic planning. To do so, we first remark that repeatedly executing ad infinitum a propositional event model from an initial epistemic model yields a relational structure that can be finitely represented with automata. This correspondence, together with recent results on uniform strategies, allows us to give an alternative decidability proof of the epistemic planning problem for propositional events, with as by-products accurate upper-bounds on its time complexity, and the possibility to synthesize a finite word automaton that describes the set of all solution plans. In fact, using automata techniques enables us to solve a much more general problem, that we introduce and call epistemic protocol synthesis.

  13. Data-sharing protocol: A prototype implementation

    International Nuclear Information System (INIS)

    Gibney, T.; Greenwood, D.

    1992-12-01

    This paper describes a client/server communication protocol which will allow physicists to access data from cooperating remote experiments. Special low-level ''client'' software within the user's ''home'' data-access library formulates a request for data from the remote experiment. This request is sent over a network to a server at the remote site. The server has specific knowledge about the location and format of the requested data. The server gets the data and sends it over the network to the requesting client, which reformats the data according to the local library's conventions. Our prototype is being developed to suppose remote access to data from ATF, PBX, and micro Vax data from Tore-Supra. We have attempted to create a flexible design which should accommodate data from other experiments as well

  14. Chest magnetic resonance imaging: a protocol suggestion*

    Science.gov (United States)

    Hochhegger, Bruno; de Souza, Vinícius Valério Silveira; Marchiori, Edson; Irion, Klaus Loureiro; Souza Jr., Arthur Soares; Elias Junior, Jorge; Rodrigues, Rosana Souza; Barreto, Miriam Menna; Escuissato, Dante Luiz; Mançano, Alexandre Dias; Araujo Neto, César Augusto; Guimarães, Marcos Duarte; Nin, Carlos Schuler; Santos, Marcel Koenigkam; Silva, Jorge Luiz Pereira e

    2015-01-01

    In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI) has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation. PMID:26811555

  15. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... complexity of root extraction, even if the algorithm can choose the "public exponent'' itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms. The results hold for arbitrary groups, so security w.r.t. generic attacks follows for any cryptographic...... construction based on root extracting. As an example of this, we modify Cramer-Shoup signature scheme such that it becomes a genericm algorithm. We discuss then implementing it in RSA groups without the original restriction that the modulus must be a product of safe primes. It can also be implemented in class...

  16. Clean energy exports and the Kyoto Protocol

    International Nuclear Information System (INIS)

    Bramley, M.

    2002-01-01

    This paper discussed Canada's attempt in international negotiations to gain credits for energy exports that may result in greenhouse gas emission reductions in the United States. It examined how well founded this position is from an environmental perspective and in terms of international equity and political reality. The author emphasized that the clean energy export issue does not provide a legitimate reason to delay Canada's ratification of the Kyoto Protocol, and cautioned that further renegotiation of Kyoto targets for the first commitment period would not be practical and would jeopardize Canada's international standing. The author did note, however, that for the second commitment period, this issue could be reintroduced. Although the problem can potentially be resolved by granting credits to producers and exempting emissions, it was suggested that the most effective approach would be for countries to factor energy export considerations into their negotiating positions

  17. Optical protocols for advanced spacecraft networks

    Science.gov (United States)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  18. Interplanetary Overlay Network Bundle Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  19. Polishing for glass ceramics: which protocol?

    Science.gov (United States)

    Silva, Tânia Mara da; Salvia, Ana Carolina Rodrigues Danzi; Carvalho, Rodrigo Furtado de; Pagani, Clovis; Rocha, Daniel Maranha da; Silva, Eduardo Galera da

    2014-07-01

    The execution of adjustments on ceramic restorations is sometimes necessary for either correction of occlusion and/or inadequate contours or esthetical improvements. Clinically, the surfaces undergo weariness through fine grinding diamond burs which remove the superficial glazing layer. Several materials for ceramic polishing have been used in an attempt to reach a satisfactory surface smoothness. The aim of this study was to perform a literature review on different polishing protocols of several dental ceramics. This is a literature review performed through scientific articles published between 2004 and 2012, indexed in MEDLINE, PubMed and Scielo databases. The study selected and analyzed a total of 20 relevant articles that evaluated different types of ceramics, polishing treatment and surface roughness. After an extensive literature review, this study observed: 1 - after the rupture of the glazing layer due to the adjustments of the restorations, the best choice for the polishing of the surface will depend on the type of ceramics used; 2 - glazing procedure provide excellent results regarding to the superficial smoothness; however, if reglazing is impossible, either abrasive rubber cups/points or sandpaper discs followed by the use of diamond polishing pastes results in a satisfactory superficial smoothness; 3 - clinical studies that take into account the behavior of the protocols polishing are scarce and should be encouraged; 4 - the large number of variables influence the final outcome of polishing should be considered. The necessity in standardization of methodologies to enable a comparison among researches. Copyright © 2014 Japan Prosthodontic Society. Published by Elsevier Ltd. All rights reserved.

  20. Oral breathing: new early treatment protocol

    Directory of Open Access Journals (Sweden)

    Gloria Denotti

    2014-01-01

    Full Text Available Oral breathing is a respiratory dysfunction that affects approximately 10-15% of child population. It is responsable of local effects and systemic effects, both immediate and long-term. They affect the growth of the subject and his physical health in many ways: pediatric, psycho-behavioral and cognitive. The etiology is multifactorial. It’s important the establishment of a vicious circle involving more areas and it is essential to stop it as soon as possible. In order to correct this anomaly, the pediatric dentist must be able to make a correct diagnosis to treat early the disfunction and to avoid the onset of cascade mechanisms. Who plays a central role is the pediatrician who first and frequently come into contact with little patients. He can identify the anomalies, and therefore collaborate with other specialists, including the dentist. The key aspect that guides us in the diagnosis, and allows us to identify the oral respirator, is the “adenoid facies”. The purpose of the study is to highlight the importance and benefits of an early and multidisciplinary intervention (pediatric, orthopedic-orthodontic-functional. A sample of 20 patients was selected with the following inclusion criteria: mouth breathing, transverse discrepancy > 4 mm, early mixed dentition, central and lateral permenent incisors, overjet increased, lip and nasal incompetence, snoring and/or sleep apnea episodes. The protocol of intervention includes the use of the following devices and procedures: a maxillary rapid expander (to correct the transverse discrepancy, to increase the amplitude of the upper respiratory airway and to reduce nasal resistances tract in association with myo-functional devices (nasal stimulator and oral obturator. They allow the reconstruction of a physiological balance between the perioral musculature and tongue, the acquisition of nasal and lips competence and the reduction of overjet. This protocol speeds up and stabilizes the results. The

  1. Empirical evaluation of bone extraction protocols.

    Directory of Open Access Journals (Sweden)

    Timothy P Cleland

    Full Text Available The application of high-resolution analytical techniques to characterize ancient bone proteins requires clean, efficient extraction to obtain high quality data. Here, we evaluated many different protocols from the literature on ostrich cortical bone and moa cortical bone to evaluate their yield and relative purity using the identification of antibody-antigen complexes on enzyme-linked immunosorbent assay and gel electrophoresis. Moa bone provided an ancient comparison for the effectiveness of bone extraction protocols tested on ostrich bone. For the immunological part of this study, we focused on collagen I, osteocalcin, and hemoglobin because collagen and osteocalcin are the most abundant proteins in the mineralized extracellular matrix and hemoglobin is common in the vasculature. Most of these procedures demineralize the bone first, and then the remaining organics are chemically extracted. We found that the use of hydrochloric acid, rather than ethylenediaminetetraacetic acid, for demineralization resulted in the cleanest extractions because the acid was easily removed. In contrast, the use of ethylenediaminetetraacetic acid resulted in smearing upon electrophoretic separation, possibly indicating these samples were not as pure. The denaturing agents sodium dodecyl sulfate, urea, and guanidine HCl have been used extensively for the solubilization of proteins in non-biomineralized tissue, but only the latter has been used on bone. We show that all three denaturing agents are effective for extracting bone proteins. One additional method tested uses ammonium bicarbonate as a solubilizing buffer that is more appropriate for post-extraction analyses (e.g., proteomics by removing the need for desalting. We found that both guanidine HCl and ammonium bicarbonate were effective for extracting many bone proteins, resulting in similar electrophoretic patterns. With the increasing use of proteomics, a new generation of scientists are now interested in the

  2. Protocolized versus non-protocolized weaning for reducing the duration of mechanical ventilation in critically ill adult patients (Review)

    OpenAIRE

    Blackwood, Bronagh; Alderdice, Fiona; Burns, Karen EA; Cardwell, Chris R; Lavery, Gavin; O'Halloran, Peter

    2010-01-01

    BACKGROUND: Reducing weaning time is desirable in minimizing potential complications from mechanical ventilation. Standardized weaning protocols are purported to reduce time spent on mechanical ventilation. However, evidence supporting their use in clinical practice is inconsistent. OBJECTIVES: To assess the effects of protocolized weaning from mechanical ventilation on the total duration of mechanical ventilation for critically ill adults; ascertain differences between protocolized and non-p...

  3. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  4. May the Kyoto protocol produce results?; Le protocole de Kyoto peut-il produire des resultats?

    Energy Technology Data Exchange (ETDEWEB)

    Jaureguy-Naudin, M.

    2009-07-01

    A not well managed drastic reduction of greenhouse emissions might result in significant decrease of living standards, but without such reduction efforts, climate change might have five to twenty times higher costs. Thus, while indicating estimated consequences or evolutions of greenhouse emissions and temperature, the author stresses the need of emission reduction. She discusses the role of economic instruments which can be used in policies aimed at the struggle against climate change. She recalls the emission reduction commitments specified in the Kyoto protocol, discusses the present status, operation and results of the international emission trading scheme, the lessons learned after the first years of operation, comments the involvement of emerging countries in relationship with another mechanism defined in the protocol: the Clean Development Mechanism

  5. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  6. The application layer protocol: Remote Sensing Communication Protocol (RSComPro)

    Energy Technology Data Exchange (ETDEWEB)

    Vasiljevic, N.; Lea, G.; Courtney, M. [Technical Univ. of Denmark. DTU Wind Energy, DTU Risoe Campus, Roskilde (Denmark); Schneemann, J.; Trabucchi, D.; Trujillo, J.-J.; Unguran, R.; Villa, J.-P. [Univ. of Oldenburg, ForWind, Oldenburg (Germany)

    2013-09-15

    The following document establishes the Remote Sensing Communication Protocol (RSComPro) to be implemented by remote sensing systems (RS system) connecting to a network coordinated by a single Master system. The implementation of the RSComPro enables a full subordination of a RS system to a Master system. The last has as main task to control and synchronize measurement activities by all RS systems in the network. In this respect the RSComPro specifies data flow rules and formal characteristics of exchanged messages. The first version of this protocol is the outcome of the collective work between DTU Wind Energy and ForWind University of Oldenburg. It has been developed in initially for application in wind measurement by means of WindScanners (synchronized multiple lidar systems). However, it could be extended to be applied on any other type of scanning remote sensing system. Its implementation has been tested initially on systems of type WLS200S from the company Leosphere at both institutes. The objective of this protocol is to define: 1) Basic details of the software running on the RS system and the Master system; 2) Basic details of the network model; 3) Specification of handshaking process; 4) Basic details of error handling; 5) Specification of message format and syntax. (Author)

  7. Automatic verification of a lip-synchronisation protocol using Uppaal

    NARCIS (Netherlands)

    Bowman, H.; Faconti, G.; Katoen, J.-P.; Latella, D.; Massink, M.

    1998-01-01

    We present the formal specification and verification of a lip-synchronisation protocol using the real-time model checker Uppaal. A number of specifications of this protocol can be found in the literature, but this is the first automatic verification. We take a published specification of the

  8. Password Authenticated Key Exchange and Protected Password Change Protocols

    Directory of Open Access Journals (Sweden)

    Ting-Yi Chang

    2017-07-01

    Full Text Available In this paper, we propose new password authenticated key exchange (PAKE and protected password change (PPC protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

  9. On the potential of flexible instruments under the Kyoto Protocol

    NARCIS (Netherlands)

    Jepma, CJ; van der Gaast, W

    1998-01-01

    This paper analyses the potential market for project-based international cooperation within the framework of the Kyoto Protocol. With the help of existing cost data, it is shown that the scope for cost savings by using the project-based flexible instruments of the Protocol is considerable, and that

  10. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  11. Microbiological Research Under the Nagoya Protocol: Facts and Fiction.

    Science.gov (United States)

    Overmann, Jörg; Scholz, Amber Hartman

    2017-02-01

    The Nagoya Protocol is based on concepts of biological diversity that are hardly applicable to microorganisms. Because of this incongruence, the Nagoya Protocol threatens future microbial research, potentially defeating its original purpose. Countries with appropriate regulations can promote science and their bioeconomy through international collaboration and simultaneously gain a competitive advantage. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Effect of an analgo-sedation protocol for neurointensive patients

    DEFF Research Database (Denmark)

    Egerod, Ingrid; Jensen, Malene Brorson; Herling, Suzanne Forsyth

    2010-01-01

    Sedation protocols are needed for neurointensive patients. The aim of this pilot study was to describe sedation practice at a neurointensive care unit and to assess the feasibility and efficacy of a new sedation protocol. The primary outcomes were a shift from sedation-based to analgesia...

  13. Smoke and mirrors: the Kyoto Protocol and beyond

    NARCIS (Netherlands)

    Kooten, van G.C.

    2003-01-01

    The Kyoto Protocol is considered a necessary first step toward an effective future climate accord. As argued in this paper, however, the protocol will likely fail because it has too many loopholes, inadequate governance structures, and insufficient compliance provisions. This view is supported by

  14. Isolation of cancer cells by "in situ" microfluidic biofunctionalization protocols

    DEFF Research Database (Denmark)

    De Vitis, Stefania; Matarise, Giuseppina; Pardeo, Francesca

    2014-01-01

    The aim of this work is the development of a microfluidic immunosensor for the immobilization of cancer cells and their separation from healthy cells by using "in situ" microfluidic biofunctionalization protocols. These protocols allow to link antibodies on microfluidic device surfaces and can be...

  15. Samples and Sampling Protocols for Scientific Investigations | Joel ...

    African Journals Online (AJOL)

    ... from sampling, through sample preparation, calibration to final measurement and reporting. This paper, therefore offers useful information on practical guidance on sampling protocols in line with best practice and international standards. Keywords: Sampling, sampling protocols, chain of custody, analysis, documentation ...

  16. Secure comparison protocols in the semi-honest model

    NARCIS (Netherlands)

    Veugen, P.J.M.; Blom, F.; Hoogh, S.J.A. de; Erkin, Z.

    2015-01-01

    Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each

  17. How robust are gossip-based communication protocols?

    NARCIS (Netherlands)

    Kermarrec, A.-M.; Alvisi, L.; van Steen, M.; van Steen, Martinus Richardus; Doumen, J.M.; Guerraoui, R.; Koldehofe, B.; Li, H.; van Renesse, R.; Tredan, G.

    2007-01-01

    Gossip-based communication protocols are often touted as being robust. Not surprisingly, such a claim relies on assumptions under which gossip protocols are supposed to operate. In this paper, we discuss and in some cases expose some of these assumptions and discuss how sensitive the robustness of

  18. Constant round group key agreement protocols: A comparative study

    NARCIS (Netherlands)

    Makri, E.; Konstantinou, Elisavet

    2011-01-01

    The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and

  19. Unconditionally secure cryptographic protocols from coding-theoretic primitives

    NARCIS (Netherlands)

    Spini, G.

    2017-01-01

    This dissertation presents new cryptographic protocols, which can be divided into two families. Protocols in the first family achieve unilateral security: this means that they protect legitimate users against an external attacker. Concretely, we assume that two users wish to communicate securely

  20. Physical layer bootstrapping protocol for cognitive radio networks

    NARCIS (Netherlands)

    Doost-Mohammady, R.; Paweczak, P.; Janssen, G.J.M.; Segers, J.C.M.

    2010-01-01

    In this paper a novel signaling protocol for coexistence and spectrum sharing among cognitive radio nodes is proposed. This protocol allows the radios to rendezvous with each other in a statically allocated spectrum band through on-off keying signaling and reliable spectrum sensing. It enables the

  1. Creative arts in psychotherapy treatment protocol for children after trauma

    NARCIS (Netherlands)

    Westrhenen, Nadine van; Fritz, Elzette; Oosthuizen, Helen; Lemont, Suzan; Vermeer, A.; Kleber, R.J.

    2017-01-01

    In this article we introduce a Creative Arts in Psychotherapy (CAP) treatment protocol for children who have been traumatized, aiming to enhance their psychological wellbeing and strengthening positive development. The protocol combines principles of group dynamics and multimodal arts activities in

  2. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Abstract. The purpose of this paper is a proposal on entanglement concentration protocol for cluster states. The protocol uses CNOT gate operation and is assisted with a single qubit. Moreover, the local and non-local operations are performed by a single party. We also make a comparative numerical study of the residual ...

  3. Formal Test Automation: The Conference Protocol with PHACT

    NARCIS (Netherlands)

    Heerink, A.W.; Ural, Hasan; Probert, Robert L.; Feenstra, J.; Tretmans, G.J.; von Bochmann, Gregor

    2000-01-01

    We discuss a case study of automatic test generation and test execution based on formal methods. The case is the Conference Protocol, a simple, chatbox-like protocol, for which (formal) specifications and multiple implementations are publicly available and which is also used in other case study

  4. Modifications to the Standard Sit-and-Reach Flexibility Protocol.

    Science.gov (United States)

    Holt, Laurence E.; Burke, Darren G.; Pelham, Thomas W.

    1999-01-01

    Describes several modifications of the standard sit-and-reach flexibility protocol using a new device called the multitest flexometer (MTF). Using the MTF, researchers could take six flexibility measures beyond the stand-and-reach test. The modified protocol allowed the indirect assessment of the influence of the four major muscle groups that…

  5. Power Tools for Talking: Custom Protocols Enrich Coaching Conversations

    Science.gov (United States)

    Pomerantz, Francesca; Ippolito, Jacy

    2015-01-01

    Discussion-based protocols--an "agreed upon set of discussion or observation rules that guide coach/teacher/student work, discussion, and interactions" (Ippolito & Lieberman, 2012, p. 79)--can help focus and structure productive professional learning discussions. However, while protocols are slowly growing into essential elements of…

  6. A chronic toxicity test protocol using Caridina nilotica (Decapoda ...

    African Journals Online (AJOL)

    Salinization of freshwater resources is an increasing global problem, yet there is a paucity of chronic salinity tolerance data linked to very few chronic toxicity test protocols. This research aimed to generate a chronic toxicity test protocol and protective salinity tolerance data for the indigenous South African freshwater shrimp ...

  7. Cost-optimization of the IPv4 zeroconf protocol

    NARCIS (Netherlands)

    Bohnenkamp, H.C.; van der Stok, Peter; Hermanns, H.; Vaandrager, Frits

    2003-01-01

    This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfiguration of IP network interfaces. We develop a simple stochastic cost model of the protocol, where reliability is measured

  8. Protocols for early audiology intervention services: Views from early ...

    African Journals Online (AJOL)

    Objectives. To identify the protocols and practices for audiology early intervention (EI) in Gauteng government hospitals, and determine whether these protocols comply with the principles for effective EI in audiology. Methods and materials. Self-administered questionnaires were hand-delivered and distributed to ...

  9. Mean-field analysis for the evaluation of gossip protocols

    NARCIS (Netherlands)

    Bakhshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    2008-01-01

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  10. Mean-Field Analysis for the Evaluation of Gossip Protocols

    NARCIS (Netherlands)

    Bakshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  11. An optimized DNA extraction protocol for benthic Didymosphenia geminata.

    Science.gov (United States)

    Uyua, Noelia Mariel; Manrique, Julieta Marina; Jones, Leandro Roberto

    2014-09-01

    Didymosphenia geminata mats display few cells in relation to extracellular material and contain polysaccharides and heavy metals that interfere with molecular studies. We describe an optimized DNA extraction protocol that help to overcome these difficulties. Our protocol outperformed five previously described DNA extraction techniques. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Application Framework with Abstractions for Protocol and Agent Role

    DEFF Research Database (Denmark)

    Kristensen, Bent Bruun

    2016-01-01

    In multi-agent systems, agents interact by sending and receiving messages and the actual sequences of message form interaction structures between agents. Protocols and agents organized internally by agent roles support these interaction structures. Description and use of protocols based on agent ...... roles are supported by a simple and expressive application framework....

  13. [Computerized protocol for functional exploration of the stomatognathic system].

    Science.gov (United States)

    Salsench, J; Torrent, J; Ferrer, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself.

  14. Small and large scale genomic DNA isolation protocol for chickpea ...

    African Journals Online (AJOL)

    Small and large scale genomic DNA isolation protocol for chickpea ( Cicer arietinum L.), suitable for molecular marker and transgenic analyses. ... Chickpea is an important food legume crop with high nutritional value. Lack of appropriate DNA isolation protocol is a limiting factor for any molecular studies of this crop.

  15. Detailed analysis of routing protocols with different network limitations

    Science.gov (United States)

    Masood, Mohsin; Abuhelala, Mohamed; Glesk, Ivan

    2016-12-01

    In network communication field, routing protocols have got a significant role which are not only used in networks to handle the user data but also to monitor the different network environments. Dynamic routing protocols such as OSPF, EIGRP and RIP are used for forwarding user data to its destination by instantly detecting the dynamic changes across the network. The dynamic changes in the network can be in the form of topological changes, congestions, links failure etc. Therefore, it becomes a challenge to develop and implement dynamic routing protocols that fulfills the network requirements. Hence, each routing protocol has its own characteristics such as convergence activity, routing metric, routing table etc. and will perform differently in various network environments. This paper presents a comprehensive study of static and dynamic routing, along with dynamic routing protocols. Experiments that are conducted under various network limitations are presented using the OPNET tool. The performance of each of dynamic routing protocols are monitored and explained in the form of simulated results using network parameters. The results are analyzed, in order to provide a clear understanding of each protocol performance for the selection of the proper protocol for a given network environment.

  16. Advanced flooding-based routing protocols for underwater sensor networks

    NARCIS (Netherlands)

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a

  17. A Dialogue Game Protocol for Agent Purchase Negotiations

    NARCIS (Netherlands)

    McBurney, P.; Eijk, R.M. van; Parsons, S.; Amgoud, L.

    2003-01-01

    We propose a dialogue game protocol for purchase negotiation dialogues which identifies appropriate speech acts, defines constraints on their utterances, and specifies the different sub-tasks agents need to perform in order to engage in dialogues according to this protocol. Our formalism combines

  18. Implementation of a postoperative handoff protocol | Van Der Walt ...

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient safety tools in the perioperative venue. In this study, the authors took a validated standardised perioperative handoff protocol and implemented it into their institution to improve the perioperative handoff communications from the cardiac operating ...

  19. An efficient ultrasound promoted catalyst-free protocol for the ...

    Indian Academy of Sciences (India)

    A convenient, catalyst-free protocol for the quantitative synthesis of fused chromeno[4,3-b]quinolin-6-ones has been developed by simple one-pot reaction of substituted anilines with 4-chloro-3-formylcoumarin using ultrasound irradiation. The protocol offers the advantages of mild reaction conditions, short reaction times ...

  20. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show...