WorldWideScience

Sample records for design formal protocols

  1. Protocol design and implementation using formal methods

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Vissers, C.A.

    1992-01-01

    This paper reports on a number of formal methods that support correct protocol design and implementation. These methods are placed in the framework of a design methodology for distributed systems that was studied and developed within the ESPRIT II Lotosphere project (2304). The paper focuses on

  2. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  3. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  4. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  5. Formal Test Automation: The Conference Protocol with PHACT

    NARCIS (Netherlands)

    Heerink, A.W.; Ural, Hasan; Probert, Robert L.; Feenstra, J.; Tretmans, G.J.; von Bochmann, Gregor

    2000-01-01

    We discuss a case study of automatic test generation and test execution based on formal methods. The case is the Conference Protocol, a simple, chatbox-like protocol, for which (formal) specifications and multiple implementations are publicly available and which is also used in other case study

  6. Formal analysis of design process dynamics

    NARCIS (Netherlands)

    Bosse, T.; Jonker, C.M.; Treur, J.

    2010-01-01

    This paper presents a formal analysis of design process dynamics. Such a formal analysis is a prerequisite to come to a formal theory of design and for the development of automated support for the dynamics of design processes. The analysis was geared toward the identification of dynamic design

  7. Formal Analysis of Design Process Dynamics

    NARCIS (Netherlands)

    Bosse, T.; Jonker, C.M.; Treur, J.

    2010-01-01

    This paper presents a formal analysis of design process dynamics. Such a formal analysis is a prerequisite to come to a formal theory of design and for the development of automated support for the dynamics of design processes. The analysis was geared toward the identification of dynamic design

  8. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  9. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  10. Formal education of curriculum and instructional designers

    NARCIS (Netherlands)

    McKenney, Susan; Visscher-Voerman, Irene

    2013-01-01

    McKenney, S., & Visscher-Voerman, I. (2013). Formal education of curriculum and instructional designers. Educational Designer, 2(6). Available online: http://www.educationaldesigner.org/ed/volume2/issue6/article20/index.htm

  11. Flexible receiver adapter formal design review

    International Nuclear Information System (INIS)

    Krieg, S.A.

    1995-01-01

    This memo summarizes the results of the Formal (90%) Design Review process and meetings held to evaluate the design of the Flexible Receiver Adapters, support platforms, and associated equipment. The equipment is part of the Flexible Receiver System used to remove, transport, and store long length contaminated equipment and components from both the double and single-shell underground storage tanks at the 200 area tank farms

  12. Towards a formal logic of design rationalization

    DEFF Research Database (Denmark)

    Galle, Per

    1997-01-01

    Certain extensions to standard predicate logic are proposed and used as a framework for critical logical study of patterns of inference in design reasoning. It is shown that within this framework a modal logic of design rationalization (suggested by an empirical study reported earlier) can...... be formally defined in terms of quantification over a universe of discourse of ‘relevant points of view’. Five basic principles of the extended predicate logic are listed, on the basis of which the validity of ten modal patterns of inference encountered in design rationalization is tested. The basic idea...

  13. A Formal Verification of the Alternating Bit Protocol in the Calculus of Constructions

    NARCIS (Netherlands)

    Bezem, M.A.; Groote, J.F.

    We report on a formal verification of the Alternating Bit Protocol (ABP) in the Calculus of Constructions. We outline a semi-formal correctness proof of the ABP with sufficient detail to be formalised. Thereafter we show by examples how the formalised proof has been verified by the automated proof

  14. A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2010-01-01

    We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agreement on the outcome of a distributed transaction. The protocol is modelled and verified using the model checker UPPAAL...

  15. Formal Security Analysis of the MaCAN Protocol

    DEFF Research Database (Denmark)

    Bruni, Alessandro; Sojka, Michal; Nielson, Flemming

    2014-01-01

    analysis identifies two flaws in the original protocol: one creates unavailability concerns during key establishment, and the other allows re-using authenticated signals for different purposes. We propose and analyse a modification that improves its behaviour while fitting the constraints of CAN bus...

  16. Clinical applicability and cutoff values for an unstructured neuropsychological assessment protocol for older adults with low formal education.

    Science.gov (United States)

    de Paula, Jonas Jardim; Bertola, Laiss; Ávila, Rafaela Teixeira; Moreira, Lafaiete; Coutinho, Gabriel; de Moraes, Edgar Nunes; Bicalho, Maria Aparecida Camargos; Nicolato, Rodrigo; Diniz, Breno Satler; Malloy-Diniz, Leandro Fernandes

    2013-01-01

    The neuropsychological exam plays a central role in the assessment of elderly patients with cognitive complaints. It is particularly relevant to differentiate patients with mild dementia from those subjects with mild cognitive impairment. Formal education is a critical factor in neuropsychological performance; however, there are few studies that evaluated the psychometric properties, especially criterion related validity, neuropsychological tests for patients with low formal education. The present study aims to investigate the validity of an unstructured neuropsychological assessment protocol for this population and develop cutoff values for clinical use. A protocol composed by the Rey-Auditory Verbal Learning Test, Frontal Assessment Battery, Category and Letter Fluency, Stick Design Test, Clock Drawing Test, Digit Span, Token Test and TN-LIN was administered to 274 older adults (96 normal aging, 85 mild cognitive impairment and 93 mild Alzheimer`s disease) with predominantly low formal education. Factor analysis showed a four factor structure related to Executive Functions, Language/Semantic Memory, Episodic Memory and Visuospatial Abilities, accounting for 65% of explained variance. Most of the tests showed a good sensitivity and specificity to differentiate the diagnostic groups. The neuropsychological protocol showed a significant ecological validity as 3 of the cognitive factors explained 31% of the variance on Instrumental Activities of Daily Living. The study presents evidence of the construct, criteria and ecological validity for this protocol. The neuropsychological tests and the proposed cutoff values might be used for the clinical assessment of older adults with low formal education.

  17. Capturing design knowledge in formal concept definitions

    NARCIS (Netherlands)

    Leeuwen, van J.P.; Vries, de B.; Timmermans, H.J.P.; Vries, de B.

    2000-01-01

    For support of creativity in architectural design, design systems must be provided with information models that are flexible enough to follow the dynamic way of designers in handling early design information. This paper discusses a framework for information modelling using Features that answers this

  18. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...... protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show...

  19. Formal Design Review Foot Clamp Modification

    International Nuclear Information System (INIS)

    OTEN, T.C.

    2000-01-01

    This report documents the Design Review performed for the foot clamp modification. The report documents the acceptability of the design, identifies the documents that were reviewed, the scope of the review and the members of the review team

  20. Formal education of curriculum and instructional designers

    NARCIS (Netherlands)

    McKenney, Susan; Visscher-Voerman, Irene

    2013-01-01

    In practice, few researchers and designers have strong conceptual understanding of the marriage between the design discipline and scientific research traditions. Rather, most have strong exposure to either research methodologies or instructional design methods, theories and/or practices. Within the

  1. Indicators and protocols for monitoring impacts of formal and informal trails in protected areas

    Science.gov (United States)

    Marion, Jeffrey L.; Leung, Yu-Fai

    2011-01-01

    Trails are a common recreation infrastructure in protected areas and their conditions affect the quality of natural resources and visitor experiences. Various trail impact indicators and assessment protocols have been developed in support of monitoring programs, which are often used for management decision-making or as part of visitor capacity management frameworks. This paper reviews common indicators and assessment protocols for three types of trails, surfaced formal trails, unsurfaced formal trails, and informal (visitor-created) trails. Monitoring methods and selected data from three U.S. National Park Service units are presented to illustrate some common trail impact indicators and assessment options.

  2. Towards a formal assessment of design literacy

    DEFF Research Database (Denmark)

    Christensen, Kasper Skov; Hjorth, Mikkel; Iversen, Ole Sejer

    2016-01-01

    We present a tool for quantitative assessment of K-12 students' stance towards inquiry as an important part of students' development of design literacy. On a basis of design thinking literature, we position designerly stance towards inquiry as a prerequisite for engaging with wicked problems. The...... is meant to provide educators, leaders, and policy makers with strong arguments for introducing design literacy in K-12 schools, which, we posit, function within in an age of measurement.......We present a tool for quantitative assessment of K-12 students' stance towards inquiry as an important part of students' development of design literacy. On a basis of design thinking literature, we position designerly stance towards inquiry as a prerequisite for engaging with wicked problems....... The Design Literacy (DeL) assessment tool contains design of a qualitative survey question, a coding scheme for assessing aspects of a designerly stance towards inquiry, and a description of how, we have validated the results through a large-scale survey administration in K-12 education. Our DeL tool...

  3. Formal methods in design and verification of functional specifications

    International Nuclear Information System (INIS)

    Vaelisuo, H.

    1995-01-01

    It is claimed that formal methods should be applied already when specifying the functioning of the control/monitoring system, i.e. when planning how to implement the desired operation of the plant. Formal methods are seen as a way to mechanize and thus automate part of the planning. All mathematical methods which can be applied on related problem solving should be considered as formal methods. Because formal methods can only support the designer, not replace him/her, they must be integrated into a design support tool. Such a tool must also aid the designer in getting the correct conception of the plant and its behaviour. The use of a hypothetic design support tool is illustrated to clarify the requirements such a tool should fulfill. (author). 3 refs, 5 figs

  4. Geology and Design: Formal and Rational Connections

    Science.gov (United States)

    Eriksson, S. C.; Brewer, J.

    2016-12-01

    Geological forms and the manmade environment have always been inextricably linked. From the time that Upper Paleolithic man created drawings in the Lascaux Caves in the southwest of France, geology has provided a critical and dramatic spoil for human creativity. This inspiration has manifested itself in many different ways, and the history of architecture is rife with examples of geologically derived buildings. During the early 20th Century, German Expressionist art and architecture was heavily influenced by the natural and often translucent quality of minerals. Architects like Bruno Taut drew and built crystalline forms that would go on to inspire the more restrained Bauhaus movement. Even within the context of Contemporary architecture, geology has been a fertile source for inspiration. Architectural practices across the globe leverage the rationality and grounding found in geology to inform a process that is otherwise dominated by computer-driven parametric design. The connection between advanced design technology and the beautifully realized geo natural forms insures that geology will be a relevant source of architectural inspiration well into the 21st century. The sometimes hidden relationship of geology to the various sub-disciplines of Design such as Architecture, Interiors, Landscape Architecture, and Historic Preservation is explored in relation to curriculum and the practice of design. Topics such as materials, form, history, the cultural and physical landscape, natural hazards, and global design enrich and inform curriculum across the college. Commonly, these help define place-based education.

  5. Formal Test Automation: The Conference protocol with TGV/TorX

    NARCIS (Netherlands)

    Ural, Hasan; Du Bousquet, Lydie; Ramangalahy, Solofo; Probert, Robert L.; von Bochmann, Gregor; Simon, Severine; Viho, Cesar; Belinfante, Axel; de Vries, R.G.

    We present an experiment of automated formal conformance testing of the Conference Protocol Entity as reported in [2]. Our approach differs from other experiments, since it investigates the combination of the tools TGV for abstract test generation and TorX for test execution.

  6. Formal description of the jumpstart just-in-time signaling protocol using EFSM

    Science.gov (United States)

    Zaim, A. H.; Baldine, Ilia; Cassada, Mark; Rouskas, George N.; Perros, Harry G.; Stevenson, Daniel S.

    2002-07-01

    We present a formal protocol description for a Just-In-Time (JIT) signaling scheme running over a core dWDM network which utilizes Optical Burst Switches (OBS). We apply an eight-tuple extended finite state machine (EFSM) model to formally specify the protocol. Using the EFSM model, we define the communication between a source client node and a destination client node through an ingress and one or multiple intermediate switches. We worked on single burst connections that means setting up the connection just before sending a single burst and then closing the connection as soon as the burst is sent. The communication between the EFSMs is handled through message transfer between protocol entities.

  7. Formal verification an essential toolkit for modern VLSI design

    CERN Document Server

    Seligman, Erik; Kumar, M V Achutha Kiran

    2015-01-01

    Formal Verification: An Essential Toolkit for Modern VLSI Design presents practical approaches for design and validation, with hands-on advice for working engineers integrating these techniques into their work. Building on a basic knowledge of System Verilog, this book demystifies FV and presents the practical applications that are bringing it into mainstream design and validation processes at Intel and other companies. The text prepares readers to effectively introduce FV in their organization and deploy FV techniques to increase design and validation productivity. Presents formal verific

  8. Designing for Non-Formal Learning

    DEFF Research Database (Denmark)

    Petersson, Eva

    2008-01-01

    Implementation of information technology is evident within different sectors of society such that adoption presents new opportunities in ever-widening circles. Such widespread use includes by, and for, disabled people. Within this community it has been reported that use of IT can augment opportun......Implementation of information technology is evident within different sectors of society such that adoption presents new opportunities in ever-widening circles. Such widespread use includes by, and for, disabled people. Within this community it has been reported that use of IT can augment...... reflect upon how, by questioning the technology as introduced above, interesting paradigms for design become apparent. Certain of these are application- specific and others are more generic. Such paradigms have been subject of limited research which I suggest should be extended to question from a social...

  9. Spacecraft early design validation using formal methods

    International Nuclear Information System (INIS)

    Bozzano, Marco; Cimatti, Alessandro; Katoen, Joost-Pieter; Katsaros, Panagiotis; Mokos, Konstantinos; Nguyen, Viet Yen; Noll, Thomas; Postma, Bart; Roveri, Marco

    2014-01-01

    The size and complexity of software in spacecraft is increasing exponentially, and this trend complicates its validation within the context of the overall spacecraft system. Current validation methods are labor-intensive as they rely on manual analysis, review and inspection. For future space missions, we developed – with challenging requirements from the European space industry – a novel modeling language and toolset for a (semi-)automated validation approach. Our modeling language is a dialect of AADL and enables engineers to express the system, the software, and their reliability aspects. The COMPASS toolset utilizes state-of-the-art model checking techniques, both qualitative and probabilistic, for the analysis of requirements related to functional correctness, safety, dependability and performance. Several pilot projects have been performed by industry, with two of them having focused on the system-level of a satellite platform in development. Our efforts resulted in a significant advancement of validating spacecraft designs from several perspectives, using a single integrated system model. The associated technology readiness level increased from level 1 (basic concepts and ideas) to early level 4 (laboratory-tested)

  10. RTL2RTL Formal Equivalence: Boosting the Design Confidence

    Directory of Open Access Journals (Sweden)

    M V Achutha Kiran Kumar

    2014-07-01

    Full Text Available Increasing design complexity driven by feature and performance requirements and the Time to Market (TTM constraints force a faster design and validation closure. This in turn enforces novel ways of identifying and debugging behavioral inconsistencies early in the design cycle. Addition of incremental features and timing fixes may alter the legacy design behavior and would inadvertently result in undesirable bugs. The most common method of verifying the correctness of the changed design is to run a dynamic regression test suite before and after the intended changes and compare the results, a method which is not exhaustive. Modern Formal Verification (FV techniques involving new methods of proving Sequential Hardware Equivalence enabled a new set of solutions for the given problem, with complete coverage guarantee. Formal Equivalence can be applied for proving functional integrity after design changes resulting from a wide variety of reasons, ranging from simple pipeline optimizations to complex logic redistributions. We present here our experience of successfully applying the RTL to RTL (RTL2RTL Formal Verification across a wide spectrum of problems on a Graphics design. The RTL2RTL FV enabled checking the design sanity in a very short time, thus enabling faster and safer design churn. The techniques presented in this paper are applicable to any complex hardware design.

  11. Informal and formal trail monitoring protocols and baseline conditions: Acadia National Park

    Science.gov (United States)

    Marion, Jeffrey L.; Wimpey, Jeremy F.; Park, L.

    2011-01-01

    At Acadia National Park, changing visitor use levels and patterns have contributed to an increasing degree of visitor use impacts to natural and cultural resources. To better understand the extent and severity of these resource impacts and identify effective management techniques, the park sponsored this research to develop monitoring protocols, collect baseline data, and identify suggestions for management strategies. Formal and informal trails were surveyed and their resource conditions were assessed and characterized to support park planning and management decision-making.

  12. Formalizing and proving a typing result for security protocols in Isabelle/HOL

    DEFF Research Database (Denmark)

    Hess, Andreas Viktor; Modersheim, Sebastian

    2017-01-01

    or the positive output of a verification tool. However several of these works have used a typed model, where the intruder is restricted to "well-typed" attacks. There also have been several works that show that this is actually not a restriction for a large class of protocols, but all these results so far...... are again pen-and-paper proofs. In this work we present a formalization of such a typing result in Isabelle/HOL. We formalize a constraint-based approach that is used in the proof argument of such typing results, and prove its soundness, completeness and termination. We then formalize and prove the typing...... result itself in Isabelle. Finally, to illustrate the real-world feasibility, we prove that the standard Transport Layer Security (TLS) handshake satisfies the main condition of the typing result....

  13. Formal design review report project W-151 mixer pump procurement

    Energy Technology Data Exchange (ETDEWEB)

    Crass, D.W.

    1997-01-21

    A formal design review for WHC-S-0040 was held on January 21, 1993. The review was completed January 29, 1993. No outstanding action items existed. Comments were recorded on Record Comment Record (RCR) forms and incorporated into the specification. The specification was considered acceptable, approved and issued as WHC-S-0040, Rev. 0 on March 4, 1993.

  14. Modeling Organizational Design - Applying A Formalism Model From Theoretical Physics

    Directory of Open Access Journals (Sweden)

    Robert Fabac

    2008-06-01

    Full Text Available Modern organizations are exposed to diverse external environment influences. Currently accepted concepts of organizational design take into account structure, its interaction with strategy, processes, people, etc. Organization design and planning aims to align this key organizational design variables. At the higher conceptual level, however, completely satisfactory formulation for this alignment doesn’t exist. We develop an approach originating from the application of concepts of theoretical physics to social systems. Under this approach, the allocation of organizational resources is analyzed in terms of social entropy, social free energy and social temperature. This allows us to formalize the dynamic relationship between organizational design variables. In this paper we relate this model to Galbraith's Star Model and we also suggest improvements in the procedure of the complex analytical method in organizational design.

  15. Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

    OpenAIRE

    Sa'ed Abed; Mohammad H. Al Shayeji; Ovais Ahmed; Sahel Alouneh

    2016-01-01

    Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol a...

  16. Formal methods in the design of Ada 1995

    Science.gov (United States)

    Guaspari, David

    1995-01-01

    Formal, mathematical methods are most useful when applied early in the design and implementation of a software system--that, at least, is the familiar refrain. I will report on a modest effort to apply formal methods at the earliest possible stage, namely, in the design of the Ada 95 programming language itself. This talk is an 'experience report' that provides brief case studies illustrating the kinds of problems we worked on, how we approached them, and the extent (if any) to which the results proved useful. It also derives some lessons and suggestions for those undertaking future projects of this kind. Ada 95 is the first revision of the standard for the Ada programming language. The revision began in 1988, when the Ada Joint Programming Office first asked the Ada Board to recommend a plan for revising the Ada standard. The first step in the revision was to solicit criticisms of Ada 83. A set of requirements for the new language standard, based on those criticisms, was published in 1990. A small design team, the Mapping Revision Team (MRT), became exclusively responsible for revising the language standard to satisfy those requirements. The MRT, from Intermetrics, is led by S. Tucker Taft. The work of the MRT was regularly subject to independent review and criticism by a committee of distinguished Reviewers and by several advisory teams--for example, the two User/Implementor teams, each consisting of an industrial user (attempting to make significant use of the new language on a realistic application) and a compiler vendor (undertaking, experimentally, to modify its current implementation in order to provide the necessary new features). One novel decision established the Language Precision Team (LPT), which investigated language proposals from a mathematical point of view. The LPT applied formal mathematical analysis to help improve the design of Ada 95 (e.g., by clarifying the language proposals) and to help promote its acceptance (e.g., by identifying a

  17. Quantitative methods for studying design protocols

    CERN Document Server

    Kan, Jeff WT

    2017-01-01

    This book is aimed at researchers and students who would like to engage in and deepen their understanding of design cognition research. The book presents new approaches for analyzing design thinking and proposes methods of measuring design processes. These methods seek to quantify design issues and design processes that are defined based on notions from the Function-Behavior-Structure (FBS) design ontology and from linkography. A linkograph is a network of linked design moves or segments. FBS ontology concepts have been used in both design theory and design thinking research and have yielded numerous results. Linkography is one of the most influential and elegant design cognition research methods. In this book Kan and Gero provide novel and state-of-the-art methods of analyzing design protocols that offer insights into design cognition by integrating segmentation with linkography by assigning FBS-based codes to design moves or segments and treating links as FBS transformation processes. They propose and test ...

  18. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  19. Spent Nuclear Fuel Cold Vacuum Drying facility comprehensive formal design review report

    International Nuclear Information System (INIS)

    HALLER, C.S.

    1999-01-01

    The majority of the Cold Vacuum Drying Facility (CVDF) design and construction is complete; isolated portions are still in the design and fabrication process. The project commissioned a formal design review to verify the sufficiency and accuracy of current design media to assure that: (1) the design completely and accurately reflects design criteria, (2) design documents are consistent with one another, and (3) the design media accurately reflects the current design. This review is a key element in the design validation and verification activities required by SNF-4396, ''Design Verification and Validation Plan For The Cold Vacuum Drying Facility''. This report documents the results of the formal design review

  20. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  1. The Use of Art Practice within Formal Design Structures

    DEFF Research Database (Denmark)

    Wallace, Jamie

    2008-01-01

    of design methodology and ‘problem-solving' led inquiry. The paper centres upon an introspective reflexive account of artistic 'free drawing' techniques integrated within a case of engineering design, supported by an animated sequence of the working process. There then follows a conceptual exploration...

  2. A Formal Approach to User Interface Design using Hybrid System Theory, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Optimal Synthesis Inc.(OSI) proposes to develop an aiding tool for user interface design that is based on mathematical formalism of hybrid system theory. The...

  3. Applying Formal Methods to the Design of Smart Card Software

    NARCIS (Netherlands)

    Butler, Michael; Hartel, Pieter H.; Longley, Mark; de Jong, Eduard

    1997-01-01

    The goal of this work is the design of a language for the implementation of smart card applications, specifically an operating system, as high integrity software. The integrity of a piece of software is demonstrated by proving various properties of the software. The language must therefore exclude

  4. Industrial applications of formal methods to model, design and analyze computer systems

    CERN Document Server

    Craigen, Dan

    1995-01-01

    Formal methods are mathematically-based techniques, often supported by reasoning tools, that can offer a rigorous and effective way to model, design and analyze computer systems. The purpose of this study is to evaluate international industrial experience in using formal methods. The cases selected are representative of industrial-grade projects and span a variety of application domains. The study had three main objectives: · To better inform deliberations within industry and government on standards and regulations; · To provide an authoritative record on the practical experience of formal m

  5. Applying formal method to design of nuclear power plant embedded protection system

    International Nuclear Information System (INIS)

    Kim, Jin Hyun; Kim, Il Gon; Sung, Chang Hoon; Choi, Jin Young; Lee, Na Young

    2001-01-01

    Nuclear power embedded protection systems is a typical safety-critical system, which detects its failure and shutdowns its operation of nuclear reactor. These systems are very dangerous so that it absolutely requires safety and reliability. Therefore nuclear power embedded protection system should fulfill verification and validation completely from the design stage. To develop embedded system, various V and V method have been provided and especially its design using Formal Method is studied in other advanced country. In this paper, we introduce design method of nuclear power embedded protection systems using various Formal-Method in various respect following nuclear power plant software development guideline

  6. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  7. Using formal specification in the Guidance and Control Software (GCS) experiment. Formal design and verification technology for life critical systems

    Science.gov (United States)

    Weber, Doug; Jamsek, Damir

    1994-01-01

    The goal of this task was to investigate how formal methods could be incorporated into a software engineering process for flight-control systems under DO-178B and to demonstrate that process by developing a formal specification for NASA's Guidance and Controls Software (GCS) Experiment. GCS is software to control the descent of a spacecraft onto a planet's surface. The GCS example is simplified from a real example spacecraft, but exhibits the characteristics of realistic spacecraft control software. The formal specification is written in Larch.

  8. A formalized design process for bacterial consortia that perform logic computing.

    Directory of Open Access Journals (Sweden)

    Weiyue Ji

    Full Text Available The concept of microbial consortia is of great attractiveness in synthetic biology. Despite of all its benefits, however, there are still problems remaining for large-scaled multicellular gene circuits, for example, how to reliably design and distribute the circuits in microbial consortia with limited number of well-behaved genetic modules and wiring quorum-sensing molecules. To manage such problem, here we propose a formalized design process: (i determine the basic logic units (AND, OR and NOT gates based on mathematical and biological considerations; (ii establish rules to search and distribute simplest logic design; (iii assemble assigned basic logic units in each logic operating cell; and (iv fine-tune the circuiting interface between logic operators. We in silico analyzed gene circuits with inputs ranging from two to four, comparing our method with the pre-existing ones. Results showed that this formalized design process is more feasible concerning numbers of cells required. Furthermore, as a proof of principle, an Escherichia coli consortium that performs XOR function, a typical complex computing operation, was designed. The construction and characterization of logic operators is independent of "wiring" and provides predictive information for fine-tuning. This formalized design process provides guidance for the design of microbial consortia that perform distributed biological computation.

  9. Formal Learning Sequences and Progression in the Studio: A Framework for Digital Design Education

    Directory of Open Access Journals (Sweden)

    Pontus Wärnestål

    2016-02-01

    Full Text Available This paper examines how to leverage the design studio learning environment throughout long-term Digital Design education in order to support students to progress from tactical, well-defined, device-centric routine design, to confidently design sustainable solutions for strategic, complex, problems for a wide range of devices and platforms in the digital space. We present a framework derived from literature on design, creativity, and theories on learning that: (a implements a theory of formal learning sequences as a user-centered design process in the studio; and (b describes design challenge progressions in the design studio environment modeled in seven dimensions. The framework can be used as a tool for designing, evaluating, and communicating course progressions within – and between series of – design studio courses. This approach is evaluated by implementing a formal learning sequence framework in a series of design studio courses that progress in an undergraduate design-oriented Informatics program. Reflections from students, teachers, and external clients indicate high student motivation and learning goal achievement, high teacher satisfaction and skill development, and high satisfaction among external clients.

  10. Design of a 1-chip IBM-3270 protocol handler

    NARCIS (Netherlands)

    Spaanenburg, L.

    1989-01-01

    The single-chip design of a 20MHz IBM-3270 coax protocol handler in a conventional 3 μ CMOS process-technology is discussed. The harmonious combination of CMOS circuit tricks and high-level design disciplines allows the 50k transistor design to be compiled and optimized into a 35 mm**2 chip in 4

  11. Integrated Design Validation: Combining Simulation and Formal Verification for Digital Integrated Circuits

    Directory of Open Access Journals (Sweden)

    Lun Li

    2006-04-01

    Full Text Available The correct design of complex hardware continues to challenge engineers. Bugs in a design that are not uncovered in early design stages can be extremely expensive. Simulation is a predominantly used tool to validate a design in industry. Formal verification overcomes the weakness of exhaustive simulation by applying mathematical methodologies to validate a design. The work described here focuses upon a technique that integrates the best characteristics of both simulation and formal verification methods to provide an effective design validation tool, referred as Integrated Design Validation (IDV. The novelty in this approach consists of three components, circuit complexity analysis, partitioning based on design hierarchy, and coverage analysis. The circuit complexity analyzer and partitioning decompose a large design into sub-components and feed sub-components to different verification and/or simulation tools based upon known existing strengths of modern verification and simulation tools. The coverage analysis unit computes the coverage of design validation and improves the coverage by further partitioning. Various simulation and verification tools comprising IDV are evaluated and an example is used to illustrate the overall validation process. The overall process successfully validates the example to a high coverage rate within a short time. The experimental result shows that our approach is a very promising design validation method.

  12. The Design of Finite State Machine for Asynchronous Replication Protocol

    Science.gov (United States)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  13. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  14. Model-Based Design and Formal Verification Processes for Automated Waterway System Operations

    Directory of Open Access Journals (Sweden)

    Leonard Petnga

    2016-06-01

    Full Text Available Waterway and canal systems are particularly cost effective in the transport of bulk and containerized goods to support global trade. Yet, despite these benefits, they are among the most under-appreciated forms of transportation engineering systems. Looking ahead, the long-term view is not rosy. Failures, delays, incidents and accidents in aging waterway systems are doing little to attract the technical and economic assistance required for modernization and sustainability. In a step toward overcoming these challenges, this paper argues that programs for waterway and canal modernization and sustainability can benefit significantly from system thinking, supported by systems engineering techniques. We propose a multi-level multi-stage methodology for the model-based design, simulation and formal verification of automated waterway system operations. At the front-end of development, semi-formal modeling techniques are employed for the representation of project goals and scenarios, requirements and high-level models of behavior and structure. To assure the accuracy of engineering predictions and the correctness of operations, formal modeling techniques are used for the performance assessment and the formal verification of the correctness of functionality. The essential features of this methodology are highlighted in a case study examination of ship and lock-system behaviors in a two-stage lock system.

  15. A formal account of the dual extension of knowledge and concept in C-K design theory

    NARCIS (Netherlands)

    Hendriks, L.; Kazakci, A.O.; Marjanović, D.; Štorga, M.; Pavković, N.; Bojčetić, N.

    2010-01-01

    The paper presents a contribution to the formalization efforts of C-K design theory. First, we analyze the notion of "dual expansion of concepts and knowledge" in C-K design theory and we discuss how such a reasoning process can be modeled using first-order logic. Then, we present a basic formal

  16. On the design of application protocols

    NARCIS (Netherlands)

    van Sinderen, Marten J.

    1995-01-01

    In the last decades, much effort has been spent on the design and provision of sophisticated communication infrastructures. The development of end-user oriented distributed system applications, leaning on top of these communication infrastructures, so far has attracted little attention. This is

  17. An Even Better Approach : Improving the B.A.T.M.A.N. Protocol Through Formal Modelling and Analysis

    NARCIS (Netherlands)

    Fehnker, Ansgar; Chaudhary, Kaylash; Mehta, Vinay; Dutle, Aaron; Muñoz, César; Narkawicz, Anthony

    2018-01-01

    This paper considers a network routing protocol known as Better Approach to Mobile Adhoc Networks (B.A.T.M.A.N.). The protocol has two aims: first, discovery of all bidirectional links, and second, identification of the best-next-hop to the other nodes. A key mechanism of the protocol is to flood

  18. Designed Natural Spaces: Informal Gardens Are Perceived to Be More Restorative than Formal Gardens.

    Science.gov (United States)

    Twedt, Elyssa; Rainey, Reuben M; Proffitt, Dennis R

    2016-01-01

    Experimental research shows that there are perceived and actual benefits to spending time in natural spaces compared to urban spaces, such as reduced cognitive fatigue, improved mood, and reduced stress. Whereas past research has focused primarily on distinguishing between distinct categories of spaces (i.e., nature vs. urban), less is known about variability in perceived restorative potential of environments within a particular category of outdoor spaces, such as gardens. Conceptually, gardens are often considered to be restorative spaces and to contain an abundance of natural elements, though there is great variability in how gardens are designed that might impact their restorative potential. One common practice for classifying gardens is along a spectrum ranging from "formal or geometric" to "informal or naturalistic," which often corresponds to the degree to which built or natural elements are present, respectively. In the current study, we tested whether participants use design informality as a cue to predict perceived restorative potential of different gardens. Participants viewed a set of gardens and rated each on design informality, perceived restorative potential, naturalness, and visual appeal. Participants perceived informal gardens to have greater restorative potential than formal gardens. In addition, gardens that were more visually appealing and more natural-looking were perceived to have greater restorative potential than less visually appealing and less natural gardens. These perceptions and precedents are highly relevant for the design of gardens and other similar green spaces intended to provide relief from stress and to foster cognitive restoration.

  19. Designed natural spaces: Informal gardens are perceived to be more restorative than formal gardens

    Directory of Open Access Journals (Sweden)

    Elyssa eTwedt

    2016-02-01

    Full Text Available Experimental research shows that there are perceived and actual benefits to spending time in natural spaces compared to urban spaces such as reduced cognitive fatigue, improved mood, and reduced stress. Whereas past research has focused primarily on distinguishing between distinct categories of spaces (i.e., nature versus urban, less is known about variability in perceived restorative potential of environments within a particular category of outdoor spaces, such as gardens. Conceptually, gardens are often considered to be restorative spaces and to contain an abundance of natural elements, though there is great variability in how gardens are designed that might impact their restorative potential. One common practice for classifying gardens is along a spectrum ranging from formal or geometric to informal or naturalistic, which often corresponds to the degree to which built or natural elements are present, respectively. In the current study, we tested whether participants use design informality as a cue to predict perceived restorative potential of different gardens. Participants viewed a set of gardens and rated each on design informality, perceived restorative potential, naturalness, and visual appeal. Participants perceived informal gardens to have greater restorative potential than formal gardens. In addition, gardens that were more visually appealing and more natural-looking were perceived to have greater restorative potential than less visually appealing and less natural gardens. These perceptions and precedents are highly relevant for the design of gardens and other similar green spaces intended to provide relief from stress and to foster cognitive restoration.

  20. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  1. Designing typefaces for maps. A protocol of tests.

    Science.gov (United States)

    Biniek, Sébastien; Touya, Guillaume; Rouffineau, Gilles; Huot-Marchand, Thomas

    2018-05-01

    The text management in map design is a topic generally linked to placement and composition issues. Whereas the type design issue is rarely addressed or at least only partially. Moreover the typefaces especially designed for maps are rare. This paper presents a protocol of tests to evaluate characters for digital topographic maps and fonts that were designed for the screen through the use of geographical information systems using this protocol. It was launched by the Atelier National de Recherche Typographique Research (ANRT, located in Nancy, France) and took place over his `post-master' course in 2013. The purpose is to isolate different issues inherent to text in a topographic map: map background, nonlinear text placement and toponymic hierarchies. Further research is necessary to improve this kind of approach.

  2. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  3. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  4. Protocols for the Design of Kinase-focused Compound Libraries.

    Science.gov (United States)

    Jacoby, Edgar; Wroblowski, Berthold; Buyck, Christophe; Neefs, Jean-Marc; Meyer, Christophe; Cummings, Maxwell D; van Vlijmen, Herman

    2018-05-01

    Protocols for the design of kinase-focused compound libraries are presented. Kinase-focused compound libraries can be differentiated based on the design goal. Depending on whether the library should be a discovery library specific for one particular kinase, a general discovery library for multiple distinct kinase projects, or even phenotypic screening, there exists today a variety of in silico methods to design candidate compound libraries. We address the following scenarios: 1) Datamining of SAR databases and kinase focused vendor catalogues; 2) Predictions and virtual screening; 3) Structure-based design of combinatorial kinase inhibitors; 4) Design of covalent kinase inhibitors; 5) Design of macrocyclic kinase inhibitors; and 6) Design of allosteric kinase inhibitors and activators. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Nuclear power plant human computer interface design incorporating console simulation, operations personnel, and formal evaluation techniques

    International Nuclear Information System (INIS)

    Chavez, C.; Edwards, R.M.; Goldberg, J.H.

    1993-01-01

    New CRT-based information displays which enhance the human machine interface are playing a very important role and are being increasingly used in control rooms since they present a higher degree of flexibility compared to conventional hardwired instrumentation. To prototype a new console configuration and information display system at the Experimental Breeder Reactor II (EBR-II), an iterative process of console simulation and evaluation involving operations personnel is being pursued. Entire panels including selector switches and information displays are simulated and driven by plant dynamical simulations with realistic responses that reproduce the actual cognitive and physical environment. Careful analysis and formal evaluation of operator interaction while using the simulated console will be conducted to determine underlying principles for effective control console design for this particular group of operation personnel. Additional iterations of design, simulation, and evaluation will then be conducted as necessary

  6. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  7. Towards a formal design model based on a genetic design model system

    DEFF Research Database (Denmark)

    Storga, Mario; Andreasen, Mogens Myrup; Marjanovic, Dorian

    2005-01-01

    The research presented in this article is aimed to the investigation of the nature, building and practical role of a Design Ontology as a potential framework for the more efficient product development data-, information- and knowledge- description, -explanation, -understanding and -reusing. In th...

  8. A systematic review of protocol studies on conceptual design cognition: design as search and exploration

    OpenAIRE

    Hay, Laura; Duffy, Alex H.B.; McTeague, Chris; Pidgeon, Laura M.; Vuletic, Tijana; Grealy, Madeleine

    2017-01-01

    This paper reports findings from the first systematic review of protocol studies focusing specifically on conceptual design cognition, aiming to answer the following research question: What is our current understanding of the cognitive processes involved in conceptual design tasks carried out by individual designers? We reviewed 47 studies on architectural design, engineering design and product design engineering. This paper reports 24 cognitive processes investigated in a subset of 33 studie...

  9. Design and application of a formal verification tool for VHDL designs

    International Nuclear Information System (INIS)

    John, Ajith K.; Bhattacharjee, A.K.; Sharma, Mukesh; Ganesh, G.; Dhodapkar, S.D.; Biswas, B.B.

    2012-01-01

    The design of Control and Instrumentation (C and I) systems used in safety critical applications such as nuclear power plants involves partitioning of the overall system functionality into subparts and implementing each subpart in hardware and/or software as appropriate. With increasing use of programmable devices like FPGA, the hardware subsystems are often implemented in Hardware Description Languages (HDL) like VHDL. Since the functional bugs in such hardware subsystems used in safety critical C and I systems have disastrous consequences, it is important to use rigorous reasoning to verify the functionalities of the HDL models. Work on developing a software tool named VBMC (VHDL Bounded Model Checker) for mathematically proving functional properties of hardware designs described in VHDL has been described. It is based on the principle of bounded model checking. Although the design of VBMC is still evolving, it is currently also being used for the functional verification of FPGA based intelligent I/O (EHS) boards developed in Reactor Control Division, BARC

  10. Designing of Roaming Protocol for Bluetooth Equipped Multi Agent Systems

    Science.gov (United States)

    Subhan, Fazli; Hasbullah, Halabi B.

    Bluetooth is an established standard for low cost, low power, wireless personal area network. Currently, Bluetooth does not support any roaming protocol in which handoff occurs dynamically when a Bluetooth device is moving out of the piconet. If a device is losing its connection to the master device, no provision is made to transfer it to another master. Handoff is not possible in a piconet, as in order to stay within the network, a slave would have to keep the same master. So, by definition intra-handoff is not possible within a piconet. This research mainly focuses on Bluetooth technology and designing a roaming protocol for Bluetooth equipped multi agent systems. A mathematical model is derived for an agent. The idea behind the mathematical model is to know when to initiate the roaming process for an agent. A desired trajectory for the agent is calculated using its x and y coordinates system, and is simulated in SIMULINK. Various roaming techniques are also studied and discussed. The advantage of designing a roaming protocol is to ensure the Bluetooth enabled roaming devices can freely move inside the network coverage without losing its connection or break of service in case of changing the base stations.

  11. RFID protocol design, optimization, and security for the Internet of Things

    CERN Document Server

    Liu, Alex X; Liu, Xiulong; Li, Keqiu

    2017-01-01

    This book covers the topic of RFID protocol design and optimization and the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.

  12. A fresh recipe for designers: HCI approach to explore the nexus between design techniques and formal methods in software development

    Directory of Open Access Journals (Sweden)

    Julian Galindo Losada

    2016-11-01

    Full Text Available Emerging companies involved in design and implementation of innovative products demand multidisciplinary teams to be competitive in the market. This need mainly exposes designers to extend their knowledge not only in User Interface elements of the design process but also in software methodologies to cover the lack of resources and expertise in start-ups. It raises the question of how designers can line up HCI techniques with best practices in software development while preserving usability and easy-to-use principles. To explore this gap, this paper proposes an approach which combines existing technology and methods by studying the nexus between HCI prototyping and software engineering. The approach is applied into a case study in the design of a virtual shop harmonizing the use of storyboards and the spiral. A comprehensive analysis is performed by using a Technology acceptance model (TAM regarding with two variables: usability and easy-to-use. The present finding underlines the positive integration of HCI techniques and formal methods without compromising user satisfaction with a potential benefit for small companies in a formation stage.

  13. Design Review Report for formal review of safety class features of exhauster system for rotary mode core sampling

    International Nuclear Information System (INIS)

    JANICEK, G.P.

    2000-01-01

    Report documenting Formal Design Review conducted on portable exhausters used to support rotary mode core sampling of Hanford underground radioactive waste tanks with focus on Safety Class design features and control requirements for flammable gas environment operation and air discharge permitting compliance

  14. Design Review Report for formal review of safety class features of exhauster system for rotary mode core sampling

    Energy Technology Data Exchange (ETDEWEB)

    JANICEK, G.P.

    2000-06-08

    Report documenting Formal Design Review conducted on portable exhausters used to support rotary mode core sampling of Hanford underground radioactive waste tanks with focus on Safety Class design features and control requirements for flammable gas environment operation and air discharge permitting compliance.

  15. Formal methods for dynamical systems : 13th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2013, Bertinoro, Italy, June 17-22, 2013 : advanced lectures

    NARCIS (Netherlands)

    Bernardo, M.; Vink, de E.P.; Di Pierro, A.; Wiklicky, H.

    2013-01-01

    Preface. This volume presents a set of papers accompanying the lectures of the 13th International School on Formal Methods for the Design of Computer, Communication, and Software Systems (SFM). This series of schools addresses the use of formal methods in computer science as a prominent approach to

  16. Mapping of Schistosomiasis and Soil-Transmitted Helminths in Namibia: The First Large-Scale Protocol to Formally Include Rapid Diagnostic Tests.

    Directory of Open Access Journals (Sweden)

    José Carlos Sousa-Figueiredo

    Full Text Available Namibia is now ready to begin mass drug administration of praziquantel and albendazole against schistosomiasis and soil-transmitted helminths, respectively. Although historical data identifies areas of transmission of these neglected tropical diseases (NTDs, there is a need to update epidemiological data. For this reason, Namibia adopted a new protocol for mapping of schistosomiasis and geohelminths, formally integrating rapid diagnostic tests (RDTs for infections and morbidity. In this article, we explain the protocol in detail, and introduce the concept of 'mapping resolution', as well as present results and treatment recommendations for northern Namibia.This new protocol allowed a large sample to be surveyed (N = 17,896 children from 299 schools at relatively low cost (7 USD per person mapped and very quickly (28 working days. All children were analysed by RDTs, but only a sub-sample was also diagnosed by light microscopy. Overall prevalence of schistosomiasis in the surveyed areas was 9.0%, highly associated with poorer access to potable water (OR = 1.5, P<0.001 and defective (OR = 1.2, P<0.001 or absent sanitation infrastructure (OR = 2.0, P<0.001. Overall prevalence of geohelminths, more particularly hookworm infection, was 12.2%, highly associated with presence of faecal occult blood (OR = 1.9, P<0.001. Prevalence maps were produced and hot spots identified to better guide the national programme in drug administration, as well as targeted improvements in water, sanitation and hygiene. The RDTs employed (circulating cathodic antigen and microhaematuria for Schistosoma mansoni and S. haematobium, respectively performed well, with sensitivities above 80% and specificities above 95%.This protocol is cost-effective and sensitive to budget limitations and the potential economic and logistical strains placed on the national Ministries of Health. Here we present a high resolution map of disease prevalence levels, and treatment regimens are

  17. A formal design verification and validation on the human factors of a computerized information system in nuclear power plants

    International Nuclear Information System (INIS)

    Lee, Yong Hee; Park, Jae Chang; Cheon, Se Woo; Jung, Kwang Tae; Baek, Seung Min; Han, Seung; Park, Hee Suk; Son, Ki Chang; Kim, Jung Man; Jung Yung Woo

    1999-11-01

    This report describe a technical transfer under the title of ''A formal design verification and validation on the human factors of a computerized information system in nuclear power plants''. Human factors requirements for the information system designs are extracted from various regulatory and industrial standards and guidelines, and interpreted into a more specific procedures and checklists for verifying the satisfaction of those requirements. A formalized implementation plan is established for human factors verification and validation of a computerized information system in nuclear power plants. Additionally, a Computer support system, named as DIMS-web (design Issue Management System), is developed based upon web internet environment so as to enhance the implementation of the human factors activities. DIMS-Web has three maine functions: supporting requirements review, tracking design issues, and management if issues screening evaluation. DIMS-Web shows its benefits in practice through a trial application to the design review of CFMS for YGN nuclear unit 5 and 6. (author)

  18. Beyond formalism

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    The ongoing debate over the role of formalism and formal specifications in software features many speakers with diverse positions. Yet, in the end, they share the conviction that the requirements of a software system can be unambiguously specified, that acceptable software is a product demonstrably meeting the specifications, and that the design process can be carried out with little interaction between designers and users once the specification has been agreed to. This conviction is part of a larger paradigm prevalent in American management thinking, which holds that organizations are systems that can be precisely specified and optimized. This paradigm, which traces historically to the works of Frederick Taylor in the early 1900s, is no longer sufficient for organizations and software systems today. In the domain of software, a new paradigm, called user-centered design, overcomes the limitations of pure formalism. Pioneered in Scandinavia, user-centered design is spreading through Europe and is beginning to make its way into the U.S.

  19. Generalized fragment picking in Rosetta: design, protocols and applications.

    Directory of Open Access Journals (Sweden)

    Dominik Gront

    Full Text Available The Rosetta de novo structure prediction and loop modeling protocols begin with coarse grained Monte Carlo searches in which the moves are based on short fragments extracted from a database of known structures. Here we describe a new object oriented program for picking fragments that greatly extends the functionality of the previous program (nnmake and opens the door for new approaches to structure modeling. We provide a detailed description of the code design and architecture, highlighting its modularity, and new features such as extensibility, total control over the fragment picking workflow and scoring system customization. We demonstrate that the program provides at least as good building blocks for ab-initio structure prediction as the previous program, and provide examples of the wide range of applications that are now accessible.

  20. Design of an autonomous decentralized MAC protocol for wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Dal Pont, L.; Havinga, Paul J.M.

    In this document the design of a MAC protocol for wireless sensor networks is discussed. The autonomous decentralized TDMA based MAC protocol minimizes power consumtion by efficiency implementing unicast/omnicast, scheduled rendezvous times and wakeup calls. The MAC protocol is an ongoing research

  1. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  2. REQUIREMENTS PATTERNS FOR FORMAL CONTRACTS IN ARCHITECTURAL ANALYSIS AND DESIGN LANGUAGE (AADL) MODELS

    Science.gov (United States)

    2017-04-17

    because of simultaneous failures in two of the aircrafts braking system . The architecture of the primary Braking System Control Unit (BSCU) is...is a component of the overall Flight Control System (FCS) that compares the measured state of an aircraft (position, speed, and attitude) to the...Cyberphysical Systems , Formal Methods, Requirements Patterns, AADL, Assume Guarantee Reasoning Environment 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  3. Design and Implementation of a Secure Modbus Protocol

    Science.gov (United States)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  4. Formal verification method for nuclear I and C systems using ESDT and SMV in the software design phase

    International Nuclear Information System (INIS)

    Song, Myung Jun; Koo, Seo Ryong; Seong, Poong Hyun

    2004-01-01

    As PLCs are widely used in the digital I and C systems of nuclear power plants (NPPs), the safety of PLC software has become the most important consideration. Software safety is an important property for safety critical systems, especially those in aerospace, satellite and nuclear power plants, whose failure could result in danger to human life, property or environment. It is recently becoming more important due to the increase in the complexity and size of safety critical systems. This research proposes a method to perform effective verification tasks on the traceability analysis and software design evaluation in the software design phase. In order to perform the traceability analysis between a Software Requirements Specification (SRS) written in a natural language and a Software Design Specification (SDS) written in Function Block Diagram (FBD), this method uses extended-structured decision tables (ESDTs). ESDTs include information related to the traceability analysis from a text-based SRS and a FBD-based SDS, respectively. Through comparing with both ESDTs from an SRS and ESDTs from an SDS, the effective traceability analysis of both a text-based SRS and a FBD-based SDS can be achieved. For the software design evaluation, a model checking, which is mainly used to verify PLC programs formally, is used in this research. A FBD-style design specification is translated into input languages of the SMV by translation rules and then the FBD-style design specification can be formally analyzed using SMV. (author)

  5. Design of a Corporate SDI in Power Sector Using a Formal Model

    Directory of Open Access Journals (Sweden)

    Italo L. Oliveira

    2017-10-01

    Full Text Available Geospatial data are essential for the decision-making process. However, obtaining and keeping such data up to date usually require much time and many financial resources. In order to minimize the production costs and incentivize sharing these data, countries are promoting the implementation of Spatial Data Infrastructures (SDI at the different public administration levels. The International Cartographic Association (ICA proposes a formal model that describes the main concepts of an SDI based on three of the five viewpoints of the Reference Model for Open Distributed Processing (RM-ODP. Afterwards, researchers extended ICA’s model to describe, more properly, the actors, hierarchical relationship and interactions related to the policies that drive an SDI. However, the proposed extensions are semantically inconsistent with the original proposal. Moreover, the use of ICA’s formal model and its extensions has not been assessed yet to specify a corporate-level SDI. This study describes the merger of actors and policies proposed by the ICA and its extensions in order to eliminate differences in the semantics or terminology among them. This unified model was applied to specify a corporate SDI for a large Brazilian corporation, the Minas Gerais Power Company (Companhia Energética de Minas Gerais (Cemig, which is comprised of about 200 companies in the power sector. The case study presents part of the specification of the five RM-ODP viewpoints, i.e., the three viewpoints featured in ICA’s formal model (Enterprise, Information, and Computation and the other two viewpoints that make up the RM-ODP (Engineering and Technology. The adapted ICA’s model proved adequate to describe SDI-Cemig. In addition, the case study may serve as an example of the specification and implementation of new SDIs, not only corporate ones, but also of public agencies at any hierarchical level.

  6. A Pattern Language for Designing Application-Level Communication Protocols and the Improvement of Computer Science Education through Cloud Computing

    OpenAIRE

    Lascano, Jorge Edison

    2017-01-01

    Networking protocols have been developed throughout time following layered architectures such as the Open Systems Interconnection model and the Internet model. These protocols are grouped in the Internet protocol suite. Most developers do not deal with low-level protocols, instead they design application-level protocols on top of the low-level protocol. Although each application-level protocol is different, there is commonality among them and developers can apply lessons learned from one prot...

  7. Design of an eLearning System for Accreditation of Non-formal Learning

    OpenAIRE

    Kovatcheva , Eugenia; Nikolov , Roumen

    2008-01-01

    This paper deals with issues related to the non-formal learning in vocational education, and the role of ICT for providing appropriate accreditation model in such education. The presented conclusions are based on the Leonardo da Vinci project LeoSPAN. The paper emphasises on the development of a model and a prototype of an adaptive eLearning system that ensures the pre-defined learner outcomes. One of the advantages of the eLearning system is the flexibility for people who upgrade and improve...

  8. Synthesis of FBD-based PLC design from NuSCR formal specification

    International Nuclear Information System (INIS)

    Yoo, Junbeom; Cha, Sungdeok; Kim, Chang Hwoi; Song, Duck Yong

    2005-01-01

    NuSCR is a formal specification language to document requirements for real-time embedded software with nuclear engineering applications in mind. Domain experts actively participated in selecting how to best represent various aspects. It uses tabular notations to specify required computations and automata to document state- or time-dependent behavior. As programmable logic controllers (PLCs) are widely used to implement real-time embedded software, synthesis of PLC code from a formal specification is desirable if transformation rules can be rigorously defined. In addition to improved productivity, results of safety analysis performed on requirements remain valid. In this paper, we demonstrate how NuSCR specification can be translated into semantically equivalent function block diagram (FBD) code. The process, except the initial phase where user provides information on missing or implicit details, is automated. Since executable code can be automatically generated using CASE tools from FBD, much of software development is automated. Proposed technique is currently being used in developing reactor protection system (RPS) for nuclear power plants in Korea, and experience to date has been positive. We demonstrate the proposed approach using the fixed set-point rising trip which is one of the most complex trip logics included in the RPS

  9. A formal design verification and validation on the human factors of a computerized information system in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yong Hee; Park, Jae Chang; Cheon, Se Woo; Jung, Kwang Tae; Baek, Seung Min; Han, Seung; Park, Hee Suk; Son, Ki Chang; Kim, Jung Man; Jung Yung Woo

    1999-11-01

    This report describe a technical transfer under the title of ''A formal design verification and validation on the human factors of a computerized information system in nuclear power plants''. Human factors requirements for the information system designs are extracted from various regulatory and industrial standards and guidelines, and interpreted into a more specific procedures and checklists for verifying the satisfaction of those requirements. A formalized implementation plan is established for human factors verification and validation of a computerized information system in nuclear power plants. Additionally, a Computer support system, named as DIMS-web (design Issue Management System), is developed based upon web internet environment so as to enhance the implementation of the human factors activities. DIMS-Web has three maine functions: supporting requirements review, tracking design issues, and management if issues screening evaluation. DIMS-Web shows its benefits in practice through a trial application to the design review of CFMS for YGN nuclear unit 5 and 6. (author)

  10. Design Protocols and Analytical Strategies that Incorporate Structural Reliability Models

    Science.gov (United States)

    Duffy, Stephen F.

    1997-01-01

    Al single crystal turbine blade material; map a simplistic failure strength envelope of the material; develop a statistically based reliability computer algorithm, verify the reliability model and computer algorithm, and model stator vanes for rig tests. Thus establishing design protocols that enable the engineer to analyze and predict the mechanical behavior of ceramic composites and intermetallics would mitigate the prototype (trial and error) approach currently used by the engineering community. The primary objective of the research effort supported by this short term grant is the continued creation of enabling technologies for the macroanalysis of components fabricated from ceramic composites and intermetallic material systems. The creation of enabling technologies aids in shortening the product development cycle of components fabricated from the new high technology materials.

  11. ACHIEVING HIGH INTEGRITY OF PROCESS-CONTROL SOFTWARE BY GRAPHICAL DESIGN AND FORMAL VERIFICATION

    NARCIS (Netherlands)

    HALANG, WA; Kramer, B.J.

    The International Electrotechnical Commission is currently standardising four compatible languages for designing and implementing programmable logic controllers (PLCs). The language family includes a diagrammatic notation that supports the idea of software ICs to encourage graphical design

  12. Formal and informal computer mediated communication within within design teams for complex building projects

    NARCIS (Netherlands)

    Otter, den A.F.H.J.; Gray, C.; Prins, M.

    2001-01-01

    In this paper the information environment of design teams is discussed because of the use of Internet based Project websites (PWS) to improve the information exchange within design teams. Because design teams heavenly depend on informal information exchange and PWS is a tool for formalising

  13. Formal Functional Test Designs: Bridging the Gap Between Test Requirements and Test Specifications

    Science.gov (United States)

    Hops, Jonathan

    1993-01-01

    This presentation describes the testing life cycle, the purpose of the test design phase, and test design methods and gives an example application. Also included is a description of Test Representation Language (TRL), a summary of the language, and an example of an application of TRL. A sample test requirement and sample test design are included.

  14. Backpressure-based control protocols: design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, Willem R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  15. Backpressure-based control protocols: Design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, W.R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  16. TRUST: A Successful Formal-Informal Teacher Education Partnership Designed to Improve and Promote Urban Earth Science Education

    Science.gov (United States)

    Sloan, H.; Drantch, K.; Steenhuis, J.

    2006-12-01

    We present an NSF-funded collaborative formal-informal partnership for urban Earth science teacher preparation and professional development. This model brings together The American Museum of Natural History (AMNH) and Brooklyn and Lehman College of the City University of New York (CUNY) to address science-impoverished classrooms that lack highly qualified teachers by focusing on Earth science teacher certification. Project design was based on identified needs in the local communities and schools, careful analysis of content knowledge mastery required for Earth science teacher certification, and existing impediments to certification. The problem-based approach required partners to push policy envelopes and to invent new ways of articulating content and pedagogy at both intra- and inter-institutional levels. One key element of the project is involvement of the local board of education, teachers, and administrators in initial design and ongoing assessment. Project components include formal Earth systems science courses, a summer institute primarily led and delivered by AMNH scientists through an informal series of lectures coupled to workshops led by AMNH educators, a mechanism for assigning course credit for informal experiences, development of new teaching approaches that include teacher action plans and an external program of evaluation. The principal research strand of this project focuses on the resulting model for formal-informal teacher education partnership, the project's impact on participating teachers, policy issues surrounding the model and the changes required for its development and implementation, and its potential for Earth science education reform. As the grant funded portion of the project draws to a close we begin to analyze data collected over the past 3 years. Third-year findings of the project's external evaluation indicate that the problem-based approach has been highly successful, particularly its impact on participating teachers. In addition

  17. Using Formal Game Design Methods to Embed Learning Outcomes into Game Mechanics and Avoid Emergent Behaviour

    Science.gov (United States)

    Grey, Simon; Grey, David; Gordon, Neil; Purdy, Jon

    2017-01-01

    This paper offers an approach to designing game-based learning experiences inspired by the Mechanics-Dynamics-Aesthetics (MDA) model (Hunicke et al., 2004) and the elemental tetrad model (Schell, 2008) for game design. A case for game based learning as an active and social learning experience is presented including arguments from both teachers and…

  18. Design Choices in a Compiler Course or How to Make Undergraduates Love Formal Notation

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff

    2008-01-01

    The undergraduate compiler course offers a unique opportunity to combine many aspects of the Computer Science curriculum. We discuss the many design choices that are available for the instructor and present the current compiler course at the University of Aarhus, the design of which displays at l...

  19. Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2006-01-01

    This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network

  20. Design and Analysis of Transport Protocols for Reliable High-Speed Communications

    NARCIS (Netherlands)

    Oláh, A.

    1997-01-01

    The design and analysis of transport protocols for reliable communications constitutes the topic of this dissertation. These transport protocols guarantee the sequenced and complete delivery of user data over networks which may lose, duplicate and reorder packets. Reliable transport services are

  1. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication......’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture...

  2. Research in advanced formal theorem-proving techniques. [design and implementation of computer languages

    Science.gov (United States)

    Raphael, B.; Fikes, R.; Waldinger, R.

    1973-01-01

    The results are summarised of a project aimed at the design and implementation of computer languages to aid in expressing problem solving procedures in several areas of artificial intelligence including automatic programming, theorem proving, and robot planning. The principal results of the project were the design and implementation of two complete systems, QA4 and QLISP, and their preliminary experimental use. The various applications of both QA4 and QLISP are given.

  3. Understanding Creative Design Processes by Integrating Sketching and CAD Modelling Design Environments: A Preliminary Protocol Result from Architectural Designers

    Directory of Open Access Journals (Sweden)

    Yi Teng Shih

    2015-11-01

    Full Text Available This paper presents the results of a preliminary protocol study of the cognitive behaviour of architectural designers during the design process. The aim is to better understand the similarities and differences in cognitive behaviour using Sequential Mixed Media (SMM and Alternative Mixed Media (AMM approaches, and how switching between media may impact on design processes. Two participants with at least one-year’s professional design experience and a Bachelor of Design degree, and competence in both sketching and computer-aid design (CAD modelling participated in the study. Video recordings of participants working on different projects were coded using the Function-Behaviour-Structure (FBS coding scheme. Participants were also interviewed and their explanations about their switching behaviours were categorised into three types: S→C, S/C↹R and C→S. Preliminary results indicate that switching between media may influence how designers identify problems and develop solutions. In particular, two design issues were identified.  These relate to the FBS coding scheme, where structure (S and behaviour derived from structure (Bs, change to documentation (D after switching from sketching to CAD modelling (S→C. These switches make it possible for designers to integrate both approaches into one design medium and facilitate their design processes in AMM design environments.

  4. The IMPRESS DDT: a database design toolbox based on a formal specification language

    NARCIS (Netherlands)

    Flokstra, Jan; van Keulen, Maurice; Skowronek, Jacek; Skowronek, J.

    The Database Design Tool prototype is being developed in the IMPRESS project (Esprit project 6355). The IMPRESS project started in May 1992 and aims at creating a low-level storage manager tailored for multimedia applications, together with a library of efficient operators, a programming

  5. Formal Design and Analysis of a Wastewater Treatment Control System based on Petrinet

    Directory of Open Access Journals (Sweden)

    Seno D. Panjaitan

    2012-04-01

    Full Text Available This paper proposes a new control design approach for industrial wastewater treatment where its logic control is verifiable. In this research, a treatment control design in a lab-scale was controlled by a microcontroller circuit. The developed system combined anaerobic digestion, aeration and filtration process. Its logic control algorithm was designed by using Signal Interpreted Petri Net. In the logic verification, six analysis properties were satisfied: conflict free (logical process had no conflict behavior, termination (the process could be terminated from any state, non-contradictory outputs, live (any process state could always be reached from other state, deadlock-free, and reversible (the process could always back to initial condition. In the design evaluation, the average value of transparency metrics was 0.984 close to 1 as the best value. The system performance was evaluated by pollutant removal efficiency. The highest removal efficiencies were obtained when each anaerobic and aeration treatment were performed for three days respectively and followed by filtration. Within this condition, the system obtained average removal efficiency 91.7% of Chemical Oxygen Demand and 95.4% of Total Suspended Solids. In terms of electricity consumption, the system needed only 1,857.6 Watt-hour for a batch treatment process.

  6. Design and Simulation of a High Performance Emergency Data Delivery Protocol

    DEFF Research Database (Denmark)

    Swartz, Kevin; Wang, Di

    2007-01-01

    The purpose of this project was to design a high performance data delivery protocol, capable of delivering data as quickly as possible to a base station or target node. This protocol was designed particularly for wireless network topologies, but could also be applied towards a wired system....... An emergency is defined as any event with high priority that needs to be handled immediately. It is assumed that this emergency event is important enough that energy efficiency is not a factor in our protocol. The desired effect is for fast as possible delivery to the base station for rapid event handling....

  7. Formal matrices

    CERN Document Server

    Krylov, Piotr

    2017-01-01

    This monograph is a comprehensive account of formal matrices, examining homological properties of modules over formal matrix rings and summarising the interplay between Morita contexts and K theory. While various special types of formal matrix rings have been studied for a long time from several points of view and appear in various textbooks, for instance to examine equivalences of module categories and to illustrate rings with one-sided non-symmetric properties, this particular class of rings has, so far, not been treated systematically. Exploring formal matrix rings of order 2 and introducing the notion of the determinant of a formal matrix over a commutative ring, this monograph further covers the Grothendieck and Whitehead groups of rings. Graduate students and researchers interested in ring theory, module theory and operator algebras will find this book particularly valuable. Containing numerous examples, Formal Matrices is a largely self-contained and accessible introduction to the topic, assuming a sol...

  8. Formal Analysis and Design of Supervisor and User Interface Allowing for Non-Deterministic Choices Using Weak Bi-Simulation

    Directory of Open Access Journals (Sweden)

    Shazada Muhammad Umair Khan

    2018-01-01

    Full Text Available In human machine systems, a user display should contain sufficient information to encapsulate expressive and normative human operator behavior. Failure in such system that is commanded by supervisor can be difficult to anticipate because of unexpected interactions between the different users and machines. Currently, most interfaces have non-deterministic choices at state of machine. Inspired by the theories of single user of an interface established on discrete event system, we present a formal model of multiple users, multiple machines, a supervisor and a supervisor machine. The syntax and semantics of these models are based on the system specification using timed automata that adheres to desirable specification properties conducive to solving the non-deterministic choices for usability properties of the supervisor and user interface. Further, the succinct interface developed by applying the weak bi-simulation relation, where large classes of potentially equivalent states are refined into a smaller one, enables the supervisor and user to perform specified task correctly. Finally, the proposed approach is applied to a model of a manufacturing system with several users interacting with their machines, a supervisor with several users and a supervisor with a supervisor machine to illustrate the design procedure of human–machine systems. The formal specification is validated by z-eves toolset.

  9. Inferential statistics, power estimates, and study design formalities continue to suppress biomedical innovation

    OpenAIRE

    Kern, Scott E.

    2014-01-01

    Innovation is the direct intended product of certain styles in research, but not of others. Fundamental conflicts between descriptive vs inferential statistics, deductive vs inductive hypothesis testing, and exploratory vs pre-planned confirmatory research designs have been played out over decades, with winners and losers and consequences. Longstanding warnings from both academics and research-funding interests have failed to influence effectively the course of these battles. The NIH publicly...

  10. Formal Methods for Abstract Specifications – A Comparison of Concepts

    DEFF Research Database (Denmark)

    Instenberg, Martin; Schneider, Axel; Schnetter, Sabine

    2006-01-01

    In industry formal methods are becoming increasingly important for the verification of hardware and software designs. However current practice for specification of system and protocol functionality on high level of abstraction is textual description. For verification of the system behavior manual...... inspections and tests are usual means. To facilitate the introduction of formal methods in the development process of complex systems and protocols, two different tools evolved from research activities – UPPAAL and SpecEdit – have been investigated and compared regarding their concepts and functionality...

  11. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  12. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication

    Science.gov (United States)

    2013-11-25

    previously considered this proactive approach to combat unintentional, persistent (non- reactive) interference . In this project, we plan on extending our...channel” (or code ) by chance, through public knowledge of the underlying protocol semantics , or by compromising one of the network devices. An alternative...AFRL-RV-PS- AFRL-RV-PS- TR-2013-0142 TR-2013-0142 RENDEZVOUS PROTOCOLS AND DYNAMIC FREQUENCY HOPPING INTERFERENCE DESIGN FOR ANTI-JAMMING

  13. Interaction systems design and the protocol- and middleware-centred paradigms in distributed application development

    OpenAIRE

    Andrade Almeida, João; van Sinderen, Marten J.; Quartel, Dick; Ferreira Pires, Luis

    2003-01-01

    This paper aims at demonstrating the benefits and importance of interaction systems design in the development of distributed applications. We position interaction systems design with respect to two paradigms that have influenced the design of distributed applications: the middleware-centred and the protocol-centred paradigm. We argue that interaction systems that support application-level interactions should be explicitly designed, using the externally observable behaviour of the interaction ...

  14. Formalized Informal Learning

    DEFF Research Database (Denmark)

    Levinsen, Karin Tweddell; Sørensen, Birgitte Holm

    2013-01-01

    are examined and the relation between network society competences, learners’ informal learning strategies and ICT in formalized school settings over time is studied. The authors find that aspects of ICT like multimodality, intuitive interaction design and instant feedback invites an informal bricoleur approach....... When integrated into certain designs for teaching and learning, this allows for Formalized Informal Learning and support is found for network society competences building....

  15. MiDAS ENCORE: Randomized Controlled Study Design and Protocol.

    Science.gov (United States)

    Benyamin, Ramsin M; Staats, Peter S

    2015-01-01

    efficacy outcome measures include the proportion of Zurich Claudication Questionnaire (ZCQ) and Numeric Pain Rating Scale (NPRS) responders from baseline to follow-up using validated MIC thresholds. Improvement in ZCQ domains of ≥ 0.5 is considered significant, and a Patient Satisfaction score of at least 2.5 represents a satisfied patient. A reduction of ≥ 2 points in NPRS is considered significant pain relief. The primary safety outcome measure is the incidence of device- and/or procedure-related adverse events. Descriptive summaries will be presented by randomized group for all outcome measures at baseline and follow-up time points. Inferential statistical analysis will be conducted to determine significant differences related to functional improvement, pain relief, and safety outcomes. Primary study results will be presented based on one-year follow-up data, with an interim analysis report when 6-month follow-up data become available. Patients are not blinded due to significant differences in treatment protocols between study groups. Also, since neither study arm is focused on treatment of radicular pain, there may be a higher non-responder rate for both groups versus standard of care due to study restrictions on adjunctive pain therapies. This prospective, multi-center, randomized controlled study will provide Level I evidence of the safety and effectiveness of mild versus ESIs in managing neurogenic claudication symptoms in LSS patients.

  16. Biopiracy after the Nagoya Protocol: Problem Structure, Regime Design and Implementation Challenges

    Directory of Open Access Journals (Sweden)

    Florian Rabitz

    2015-08-01

    Full Text Available This article assesses the effectiveness of the 2010 Nagoya Protocol to the Convention on Biological Diversity (CBD for addressing "biopiracy" of genetic resources; that is, their biotechnological utilization in violation of either the provider country legislation or mutually agreed contractual obligations. Biopiracy is defined as a problem resulting from a distributive conflict between provider and user countries, the practical difficulties of monitoring the utilization of genetic resources in a transnational context, and the pervasive scientific uncertainty about the nature and extent of the problem. The Nagoya Protocol predominantly focuses on compliance management while lacking the necessary enforcement provisions for deterring non-compliance through effective monitoring and sanctions. Using the example of recent European Union implementing legislation, this article underscores how parties may use the Protocol's legal ambiguities to soften its regulatory impact on domestic industry. As a result, in light of both problem structure and regime design, the Protocol only offers modest improvements over the status quo ante.

  17. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    ’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture......Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication...... the designer’s authentic line of reasoning. To illustrate how RPA can be used, the site planning case is briefly presented, and part of the replicated line of reasoning analysed. One result of the analysis is a glimpse of a ‘logic of design’; another is an insight which sheds new light on Darke’s classical...

  18. Introduction to Open Core Protocol Fastpath to System-on-Chip Design

    CERN Document Server

    Schwaderer, W David

    2012-01-01

    This book introduces Open Core Protocol (OCP), not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics.  Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate.  The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs. Provides a comprehensive introduction to Open Core Protocol, which is more accessible than the full specification; Designed as a hands-on, how-to guide to semiconductor design; Includes numerous, real “usage examples” which are not available in the full specification; Integrates coverag...

  19. Software Formal Inspections Guidebook

    Science.gov (United States)

    1993-01-01

    The Software Formal Inspections Guidebook is designed to support the inspection process of software developed by and for NASA. This document provides information on how to implement a recommended and proven method for conducting formal inspections of NASA software. This Guidebook is a companion document to NASA Standard 2202-93, Software Formal Inspections Standard, approved April 1993, which provides the rules, procedures, and specific requirements for conducting software formal inspections. Application of the Formal Inspections Standard is optional to NASA program or project management. In cases where program or project management decide to use the formal inspections method, this Guidebook provides additional information on how to establish and implement the process. The goal of the formal inspections process as documented in the above-mentioned Standard and this Guidebook is to provide a framework and model for an inspection process that will enable the detection and elimination of defects as early as possible in the software life cycle. An ancillary aspect of the formal inspection process incorporates the collection and analysis of inspection data to effect continual improvement in the inspection process and the quality of the software subjected to the process.

  20. The Bipolar Interactive Psychoeducation (BIPED study: trial design and protocol

    Directory of Open Access Journals (Sweden)

    Jones Ian

    2009-08-01

    Full Text Available Abstract Background Bipolar disorders affect between 3–5% of the population and are associated with considerable lifelong impairment. Since much of the morbidity associated with bipolar disorder is caused by recurrent depressive symptoms, which are often only poorly responsive to antidepressants, there is a need to develop alternative, non-pharmacological interventions. Psychoeducational interventions have emerged as promising long-term therapeutic options for bipolar disorder. Methods/design The study is an exploratory, individually randomised controlled trial. The intervention known as 'Beating Bipolar' is a psychoeducational programme which is delivered via a novel web-based system. We will recruit 100 patients with a diagnosis of DSM-IV bipolar disorder (including type I and type II currently in clinical remission. The primary outcome is quality of life. This will be compared for those patients who have participated in the psychoeducational programme with those who received treatment as usual. Quality of life will be assessed immediately following the intervention as well as 10 months after randomisation. Secondary outcomes include current depressive and manic symptoms, number of episodes of depression and mania/hypomania experienced during the follow-up period, global functioning, functional impairment and insight. An assessment of costs and a process evaluation will also be conducted which will explore the feasibility and acceptability of the intervention as well as potential barriers to effectiveness. Discussion Bipolar disorder is common, under-recognised and often poorly managed. It is a chronic, life-long, relapsing condition which has an enormous impact on the individual and the economy. This trial will be the first to explore the effectiveness of a novel web-based psychoeducational intervention for patients with bipolar disorder which has potential to be easily rolled out to patients. Trial registration Current Controlled Trials

  1. Staying well after depression: trial design and protocol

    Directory of Open Access Journals (Sweden)

    Duggan Danielle S

    2010-03-01

    Full Text Available Abstract Background Depression is often a chronic relapsing condition, with relapse rates of 50-80% in those who have been depressed before. This is particularly problematic for those who become suicidal when depressed since habitual recurrence of suicidal thoughts increases likelihood of further acute suicidal episodes. Therefore the question how to prevent relapse is of particular urgency in this group. Methods/Design This trial compares Mindfulness-Based Cognitive Therapy (MBCT, a novel form of treatment combining mindfulness meditation and cognitive therapy for depression, with both Cognitive Psycho-Education (CPE, an equally plausible cognitive treatment but without meditation, and treatment as usual (TAU. It will test whether MBCT reduces the risk of relapse in recurrently depressed patients and the incidence of suicidal symptoms in those with a history of suicidality who do relapse. It recruits participants, screens them by telephone for main inclusion and exclusion criteria and, if they are eligible, invites them to a pre-treatment session to assess eligibility in more detail. This trial allocates eligible participants at random between MBCT and TAU, CPE and TAU, and TAU alone in a ratio of 2:2:1, stratified by presence of suicidal ideation or behaviour and current anti-depressant use. We aim to recruit sufficient participants to allow for retention of 300 following attrition. We deliver both active treatments in groups meeting for two hours every week for eight weeks. We shall estimate effects on rates of relapse and suicidal symptoms over 12 months following treatment and assess clinical status immediately after treatment, and three, six, nine and twelve months thereafter. Discussion This will be the first trial of MBCT to investigate whether MCBT is effective in preventing relapse to depression when compared with a control psychological treatment of equal plausibility; and to explore the use of MBCT for the most severe recurrent

  2. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    Directory of Open Access Journals (Sweden)

    Shane Ó Conchúir

    Full Text Available The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  3. Linear transceiver design for nonorthogonal amplify-and-forward protocol using a bit error rate criterion

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2014-04-01

    The ever growing demand of higher data rates can now be addressed by exploiting cooperative diversity. This form of diversity has become a fundamental technique for achieving spatial diversity by exploiting the presence of idle users in the network. This has led to new challenges in terms of designing new protocols and detectors for cooperative communications. Among various amplify-and-forward (AF) protocols, the half duplex non-orthogonal amplify-and-forward (NAF) protocol is superior to other AF schemes in terms of error performance and capacity. However, this superiority is achieved at the cost of higher receiver complexity. Furthermore, in order to exploit the full diversity of the system an optimal precoder is required. In this paper, an optimal joint linear transceiver is proposed for the NAF protocol. This transceiver operates on the principles of minimum bit error rate (BER), and is referred as joint bit error rate (JBER) detector. The BER performance of JBER detector is superior to all the proposed linear detectors such as channel inversion, the maximal ratio combining, the biased maximum likelihood detectors, and the minimum mean square error. The proposed transceiver also outperforms previous precoders designed for the NAF protocol. © 2002-2012 IEEE.

  4. Superfield formalism

    Indian Academy of Sciences (India)

    dimensional superfields, is a clear signature of the presence of the (anti-)BRST invariance in the original. 4D theory. Keywords. Non-Abelian 1-form gauge theory; Dirac fields; (anti-)Becchi–Roucet–Stora–. Tyutin invariance; superfield formalism; ...

  5. International Thermonuclear Experimental Reactor (ITER). Engineering Design Activities (EDA). Agreement and protocol 1

    International Nuclear Information System (INIS)

    1992-01-01

    This document contains protocol 1 to the agreement among the European Atomic Energy Community, the government of Japan, the Government of the Russian Federation, and the Government of the United States of America on cooperation in the engineering design activities for the International Thermonuclear Experimental Reactor, which activities shall be conducted under the auspices of the International Atomic Energy Agency

  6. Design of a protocol for the use of radiochromic films in IMRT plans control

    International Nuclear Information System (INIS)

    Aberbuj, P.D.

    2011-01-01

    The purpose of this work is to design a protocol for the use of the Gafchromic EBT2 radiochromic films with the Epson CX5600 scanner as dosimetric system for IMRT patient specific quality assurance, with an emphasis on keep the uncertainty below 3%. The studied uncertainty sources are related to the scanner reproducibility, the film and scanner homogeneity, and the dose estimation. By introducing a series of modifications to the initial protocol, the total uncertainty was kept below 3% in the range 30-500 c Gy, being less than 1% between 150 and 500 c Gy. (author)

  7. Bio-Inspired Energy-Aware Protocol Design for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Perrucci, Gian Paolo; Anggraeni, Puri Novelti; Wardana, Satya Ardhy

    2011-01-01

    In this work, bio-inspired cooperation rules are applied to wireless communication networks. The main goal is to derive cooperative behaviour rules to improve the energy consumption of each mobile device. A medium access control (MAC) protocol particularly designed for peer-to-peer communication...... be achieved by this architecture using game theoretic approaches. As an extension, this work explores the impact of the MAC protocol on the power saving capabilities. This result shows that standard MAC mechanisms are not optimised for the considered cooperative setup. A new MAC protocol is proposed...... among cooperative wireless mobile devices is described. The work is based on a novel communication architecture, where a group of mobile devices are connected both to a cellular base station and among them using short-range communication links. A prior work has investigated the energy saving that can...

  8. Toward the elaboration of a Universal Design Protocol in the National University of Córdoba

    Directory of Open Access Journals (Sweden)

    Mauricio Alexei Mareño Sempertegui

    2014-06-01

    Full Text Available This article is aimed at expressing the main aspects of the process of administration of an Urban and Building Protocol of Accessibility based on the principles of Universal Design in the National University of Cordoba in Argentina.The main concepts that form the theoretical structure are outlined, posing the need to overcome traditional conceptions which still remain in the policies of accessibility in regional universities and which are insufficient to guide the design of a respectful intervention of fundamental rights. In this way, the concepts of disability and accessibility should be redefined from a perspective of rights.This institutional protocol has as its main objective the guidance of the design and construction of an urban and building space for this university so it can be useful for all the people in a safe, self-sufficient-unexclusive way. Thus, some essential institutional conditions are outlined to guarantee its effective implementation.

  9. European Train Control System: A Case Study in Formal Verification

    Science.gov (United States)

    Platzer, André; Quesel, Jan-David

    Complex physical systems have several degrees of freedom. They only work correctly when their control parameters obey corresponding constraints. Based on the informal specification of the European Train Control System (ETCS), we design a controller for its cooperation protocol. For its free parameters, we successively identify constraints that are required to ensure collision freedom. We formally prove the parameter constraints to be sharp by characterizing them equivalently in terms of reachability properties of the hybrid system dynamics. Using our deductive verification tool KeYmaera, we formally verify controllability, safety, liveness, and reactivity properties of the ETCS protocol that entail collision freedom. We prove that the ETCS protocol remains correct even in the presence of perturbation by disturbances in the dynamics. We verify that safety is preserved when a PI controlled speed supervision is used.

  10. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  11. An extended protocol for usability validation of medical devices: Research design and reference model.

    Science.gov (United States)

    Schmettow, Martin; Schnittker, Raphaela; Schraagen, Jan Maarten

    2017-05-01

    This paper proposes and demonstrates an extended protocol for usability validation testing of medical devices. A review of currently used methods for the usability evaluation of medical devices revealed two main shortcomings. Firstly, the lack of methods to closely trace the interaction sequences and derive performance measures. Secondly, a prevailing focus on cross-sectional validation studies, ignoring the issues of learnability and training. The U.S. Federal Drug and Food Administration's recent proposal for a validation testing protocol for medical devices is then extended to address these shortcomings: (1) a novel process measure 'normative path deviations' is introduced that is useful for both quantitative and qualitative usability studies and (2) a longitudinal, completely within-subject study design is presented that assesses learnability, training effects and allows analysis of diversity of users. A reference regression model is introduced to analyze data from this and similar studies, drawing upon generalized linear mixed-effects models and a Bayesian estimation approach. The extended protocol is implemented and demonstrated in a study comparing a novel syringe infusion pump prototype to an existing design with a sample of 25 healthcare professionals. Strong performance differences between designs were observed with a variety of usability measures, as well as varying training-on-the-job effects. We discuss our findings with regard to validation testing guidelines, reflect on the extensions and discuss the perspectives they add to the validation process. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Mathematical Formalism for Designing Wide-Field X-Ray Telescopes: Mirror Nodal Positions and Detector Tilts

    Science.gov (United States)

    Elsner, R. F.; O'Dell, S. L.; Ramsey, B. D.; Weisskopf, M. C.

    2011-01-01

    We provide a mathematical formalism for optimizing the mirror nodal positions along the optical axis and the tilt of a commonly employed detector configuration at the focus of a x-ray telescope consisting of nested mirror shells with known mirror surface prescriptions. We adopt the spatial resolution averaged over the field-of-view as the figure of merit M. A more complete description appears in our paper in these proceedings.

  13. Software protocol design: Communication and control in a multi-task robot machine for ITER vacuum vessel assembly and maintenance

    International Nuclear Information System (INIS)

    Li, Ming; Wu, Huapeng; Handroos, Heikki; Yang, Guangyou; Wang, Yongbo

    2015-01-01

    Highlights: • A high-level protocol is proposed for the data inter-transmission. • The protocol design is task-oriented for the robot control in the software system. • The protocol functions as a role of middleware in the software. • The protocol running stand-alone as an independent process in the software provides greater security. • Providing a reference design protocol for the multi-task robot machine in the industry. - Abstract: A specific communication and control protocol for software design of a multi-task robot machine is proposed. In order to fulfill the requirements on the complicated multi machining functions and the high performance motion control, the software design of robot is divided into two main parts accordingly, which consists of the user-oriented HMI part and robot control-oriented real-time control system. The two parts of software are deployed in the different hardware for the consideration of run-time performance, which forms a client–server-control architecture. Therefore a high-level task-oriented protocol is designed for the data inter-communication between the HMI part and the control system part, in which all the transmitting data related to a machining task is divided into three categories: trajectory-oriented data, task control-oriented data and status monitoring-oriented data. The protocol consists of three sub-protocols accordingly – a trajectory protocol, task control protocol and status protocol – which are deployed over the Ethernet and run as independent processes in both the client and server computers. The protocols are able to manage the vast amounts of data streaming due to the multi machining functions in a more efficient way. Since the protocol is functioning in the software as a role of middleware, and providing the data interface standards for the developing groups of two parts of software, it also permits greater focus of both software parts developers on their own requirements-oriented design. By

  14. Software protocol design: Communication and control in a multi-task robot machine for ITER vacuum vessel assembly and maintenance

    Energy Technology Data Exchange (ETDEWEB)

    Li, Ming, E-mail: ming.li@lut.fi [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland); Wu, Huapeng; Handroos, Heikki [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland); Yang, Guangyou [School of Mechanical Engineering, Hubei University of Technology, Wuhan (China); Wang, Yongbo [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland)

    2015-10-15

    Highlights: • A high-level protocol is proposed for the data inter-transmission. • The protocol design is task-oriented for the robot control in the software system. • The protocol functions as a role of middleware in the software. • The protocol running stand-alone as an independent process in the software provides greater security. • Providing a reference design protocol for the multi-task robot machine in the industry. - Abstract: A specific communication and control protocol for software design of a multi-task robot machine is proposed. In order to fulfill the requirements on the complicated multi machining functions and the high performance motion control, the software design of robot is divided into two main parts accordingly, which consists of the user-oriented HMI part and robot control-oriented real-time control system. The two parts of software are deployed in the different hardware for the consideration of run-time performance, which forms a client–server-control architecture. Therefore a high-level task-oriented protocol is designed for the data inter-communication between the HMI part and the control system part, in which all the transmitting data related to a machining task is divided into three categories: trajectory-oriented data, task control-oriented data and status monitoring-oriented data. The protocol consists of three sub-protocols accordingly – a trajectory protocol, task control protocol and status protocol – which are deployed over the Ethernet and run as independent processes in both the client and server computers. The protocols are able to manage the vast amounts of data streaming due to the multi machining functions in a more efficient way. Since the protocol is functioning in the software as a role of middleware, and providing the data interface standards for the developing groups of two parts of software, it also permits greater focus of both software parts developers on their own requirements-oriented design. By

  15. How to design and write a clinical research protocol in Cosmetic Dermatology*

    Science.gov (United States)

    Bagatin, Ediléia; Miot, Helio A.

    2013-01-01

    Cosmetic Dermatology is a growing subspecialty. High-quality basic science studies have been published; however, few double-blind, randomized controlled clinical trials, which are the major instrument for evidence-based medicine, have been conducted in this area. Clinical research is essential for the discovery of new knowledge, improvement of scientific basis, resolution of challenges, and good clinical practice. Some basic principles for a successful researcher include interest, availability, persistence, and honesty. It is essential to learn how to write a protocol research and to know the international and national regulatory rules. A complete clinical trial protocol should include question, background, objectives, methodology (design, variable description, sample size, randomization, inclusion and exclusion criteria, intervention, efficacy and safety measures, and statistical analysis), consent form, clinical research form, and references. Institutional ethical review board approval and financial support disclosure are necessary. Publication of positive or negative results should be an authors' commitment. PMID:23539006

  16. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-07-01

    Full Text Available Information technology (IT security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

  17. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.

    Science.gov (United States)

    Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo

    2017-09-18

    Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.

  18. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  19. 30 : 2: A Game Designed to Promote the Cardiopulmonary Resuscitation Protocol

    Directory of Open Access Journals (Sweden)

    Imma Boada

    2016-01-01

    Full Text Available Cardiopulmonary resuscitation (CPR is a first-aid key survival technique used to stimulate breathing and keep blood flowing to the heart. Its effective administration can significantly increase the survival chances of cardiac arrest victims. We propose 30 : 2, a videogame designed to introduce the main steps of the CPR protocol. It is not intended for certification and training purpose. Driven by the 2010 European Resuscitation Council guidelines we have designed a game composed of eight mini games corresponding to the main steps of the protocol. The player acts as a helper and has to solve a different challenge. We present a detailed description of the game creation process presenting the requirements, the design decisions, and the implementation details. In addition, we present some first impressions of our testing users (25 children, five of each age from 8 to 12 years old and 12 males and 13 females. We evaluated clarity of instructions and three settings of the game: the aesthetics of scenarios, the playability, and the enjoyability of each mini game. All games were well punctuated, and there are no significantly differences between their sex. The proposed game can be a suitable tool to disseminate and promote CPR knowledge.

  20. A protocol for better design, application, and communication of population viability analyses.

    Science.gov (United States)

    Pe'er, Guy; Matsinos, Yiannis G; Johst, Karin; Franz, Kamila W; Turlure, Camille; Radchuk, Viktoriia; Malinowska, Agnieszka H; Curtis, Janelle M R; Naujokaitis-Lewis, Ilona; Wintle, Brendan A; Henle, Klaus

    2013-08-01

    Population viability analyses (PVAs) contribute to conservation theory, policy, and management. Most PVAs focus on single species within a given landscape and address a specific problem. This specificity often is reflected in the organization of published PVA descriptions. Many lack structure, making them difficult to understand, assess, repeat, or use for drawing generalizations across PVA studies. In an assessment comparing published PVAs and existing guidelines, we found that model selection was rarely justified; important parameters remained neglected or their implementation was described vaguely; limited details were given on parameter ranges, sensitivity analysis, and scenarios; and results were often reported too inconsistently to enable repeatability and comparability. Although many guidelines exist on how to design and implement reliable PVAs and standards exist for documenting and communicating ecological models in general, there is a lack of organized guidelines for designing, applying, and communicating PVAs that account for their diversity of structures and contents. To fill this gap, we integrated published guidelines and recommendations for PVA design and application, protocols for documenting ecological models in general and individual-based models in particular, and our collective experience in developing, applying, and reviewing PVAs. We devised a comprehensive protocol for the design, application, and communication of PVAs (DAC-PVA), which has 3 primary elements. The first defines what a useful PVA is; the second element provides a workflow for the design and application of a useful PVA and highlights important aspects that need to be considered during these processes; and the third element focuses on communication of PVAs to ensure clarity, comprehensiveness, repeatability, and comparability. Thereby, DAC-PVA should strengthen the credibility and relevance of PVAs for policy and management, and improve the capacity to generalize PVA findings

  1. META II: Formal Co-Verification of Correctness of Large-Scale Cyber-Physical Systems during Design. Volume 1

    Science.gov (United States)

    2011-08-01

    design space is large. His research contributions are to the field of Decision-based Design, specifically in linking consumer preferences and...Integrating Consumer Preferences into Engineering Design, to be published in 2012. He received his PhD from Northwestern University in Mechanical

  2. The Stick Design Test on the assessment of older adults with low formal education: evidences of construct, criterion-related and ecological validity.

    Science.gov (United States)

    de Paula, Jonas Jardim; Costa, Mônica Vieira; Bocardi, Matheus Bortolosso; Cortezzi, Mariana; De Moraes, Edgar Nunes; Malloy-Diniz, Leandro Fernandes

    2013-12-01

    The assessment of visuospatial abilities is usually performed by drawing tasks. In patients with very low formal education, the use of these tasks might be biased by their cultural background. The Stick Design Test was developed for the assessment of this population. We aim to expand the test psychometric properties by assessing its construct, criterion-related and ecological validity in older adults with low formal education. Healthy older adults (n = 63) and Alzheimer's disease patients (n = 92) performed the Stick Design Test, Mini-Mental State Examination, Digit Span Forward and the Clock Drawing Test. Their caregivers answered Personal Care and Instrumental Activities of Daily Living). Construct validity was assessed by factor analysis, convergent correlations (with the Clock Drawing Test), and divergent correlations (with Digit Span Forward); criterion-related validity by receiver operating characteristic curve analysis and binary logistic regression; and Ecological validity by correlations with ADL. The test factor structure was composed by one component (R 2 = 64%). Significant correlations with the Clock Drawing Test and Digit Span Forward were found, and the relationship was stronger with the first measure. The test was less associated with formal education than the Clock Drawing Test. It classified about 76% of the participants correctly and had and additive effect with the Mini-Mental State Examination (84% of correct classification). The test also correlated significantly with measures of ADL, suggesting ecological validity. The Stick Design Test shows evidence of construct, criterion-related and ecological validity. It is an interesting alternative to drawing tasks for the assessment of visuospatial abilities.

  3. Design of a passive UHF RFID tag for the ISO18000-6C protocol

    International Nuclear Information System (INIS)

    Wang Yao; Wen Guangjun; Mao Wei; He Yanli; Zhu Xueyong

    2011-01-01

    This paper presents a new fully integrated wide-range UHF passive RFID tag chip design that is compatible with the ISO18000-6C protocol. In order to reduce the die area, an ultra-low power CMOS voltage regulator without resistors and an area-efficient amplitude shift keying demodulator with a novel adaptive average generator are both adopted. A low power clock generator is designed to guarantee the accuracy of the clock under ±4%. As the clock gating technology is employed to reduce the power consumption of the baseband processor, the total power consumption of the tag is about 14 μW with a sensitivity of -9.5 dBm. The detection distance can reach about 5 m under 4 W effective isotropic radiated power. The whole tag is fabricated in TSMC 0.18 μm CMOS technology and the chip size is 880 x 880 μm 2 . (semiconductor integrated circuits)

  4. Design of a passive UHF RFID tag for the ISO18000-6C protocol

    Energy Technology Data Exchange (ETDEWEB)

    Wang Yao; Wen Guangjun; Mao Wei; He Yanli; Zhu Xueyong, E-mail: wangyao220597@yahoo.com.cn [RFIC Laboratory CICS, School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731 (China)

    2011-05-15

    This paper presents a new fully integrated wide-range UHF passive RFID tag chip design that is compatible with the ISO18000-6C protocol. In order to reduce the die area, an ultra-low power CMOS voltage regulator without resistors and an area-efficient amplitude shift keying demodulator with a novel adaptive average generator are both adopted. A low power clock generator is designed to guarantee the accuracy of the clock under {+-}4%. As the clock gating technology is employed to reduce the power consumption of the baseband processor, the total power consumption of the tag is about 14 {mu}W with a sensitivity of -9.5 dBm. The detection distance can reach about 5 m under 4 W effective isotropic radiated power. The whole tag is fabricated in TSMC 0.18 {mu}m CMOS technology and the chip size is 880 x 880 {mu}m{sup 2}. (semiconductor integrated circuits)

  5. Design, Implementation and Evaluation of Innovative Science Teaching Strategies for Non-Formal Learning in a Natural History Museum

    Science.gov (United States)

    Çil, Emine; Maccario, Nihal; Yanmaz, Durmus

    2016-01-01

    Background: Museums are useful educational resources in science teaching. Teaching strategies which promote hands-on activities, student-centred learning, and rich social interaction must be designed and implemented throughout the museum visit for effective science learning. Purpose: This study aimed to design and implement innovative teaching…

  6. El Salvador - Formal Technical Education

    Data.gov (United States)

    Millennium Challenge Corporation — With a budget of nearly $20 million, the Formal Technical Education Sub-Activity was designed to strengthen technical and vocational educational institutions in the...

  7. Design, implementation and evaluation of innovative science teaching strategies for non-formal learning in a natural history museum

    Science.gov (United States)

    Çil, Emine; Maccario, Nihal; Yanmaz, Durmuş

    2016-09-01

    Background: Museums are useful educational resources in science teaching. Teaching strategies which promote hands-on activities, student-centred learning, and rich social interaction must be designed and implemented throughout the museum visit for effective science learning.

  8. The "Healthy Habits, Healthy Girls" randomized controlled trial for girls: study design, protocol, and baseline results.

    Science.gov (United States)

    Leme, Ana Carolina Barco; Philippi, Sonia Tucunduva

    2015-07-01

    The purpose of this article is to describe the study design, protocol, and baseline results of the "Healthy Habits, Healthy Girls" program. The intervention is being evaluated through a randomized controlled trial in 10 public schools in the city of São Paulo, Brazil. Data on the following variables were collected and assessed at baseline and will be reevaluated at 7 and 12 months: body mass index, waist circumference, dietary intake, nutrition, physical activity, social cognitive mediators, physical activity level, sedentary behaviors, self-rated physical status, and overall self-esteem. According to the baseline results, 32.4% and 23.4% of girls were overweight in the intervention and control groups, respectively, and in both groups a higher percentage failed to meet daily recommendations for moderate and vigorous physical activity and maximum screen time (TV, computer, mobile devices). There were no significant differences between the groups for most of the variables, except age (p = 0.000) and waist circumference (p = 0.014). The study showed a gap in the Brazilian literature on protocols for randomized controlled trials to prevent obesity among youth. The current study may thus be an important initial contribution to the field.

  9. Masses of Formal Philosophy

    DEFF Research Database (Denmark)

    Masses of Formal Philosophy is an outgrowth of Formal Philosophy. That book gathered the responses of some of the most prominent formal philosophers to five relatively open and broad questions initiating a discussion of metaphilosophical themes and problems surrounding the use of formal methods i...... in philosophy. Including contributions from a wide range of philosophers, Masses of Formal Philosophy contains important new responses to the original five questions.......Masses of Formal Philosophy is an outgrowth of Formal Philosophy. That book gathered the responses of some of the most prominent formal philosophers to five relatively open and broad questions initiating a discussion of metaphilosophical themes and problems surrounding the use of formal methods...

  10. A Formal Language for Cryptographic Protocol Requirements

    Science.gov (United States)

    1996-01-01

    L;KAB; AgKBS ; fA; TAgKAB (4) B sends to A: fTA + 1gKAB Here A and B are two principals. By sending the rst message, A requests of the...A: CertB; fAKBgKA ; algchoiceB; fmd (fAKBgKA ; algchoiceB ; NA; alglistA)gK1 B (3) A sends to B: fAKAgKB ; fmd (fAKAgKB ; fAKBgKA)gK1 A CertX is a...alglistA 3. B sends to C: CertB ; fAKBgKC ; algchoiceB; fmd (fAKBgKC ; algchoiceB ; NA; alglistA)gK1 B (intercepted by I) 4. IB sends to A : CertB

  11. Towards designing energy-efficient routing protocol for wireless mesh networks

    CSIR Research Space (South Africa)

    Dludla, AG

    2009-08-01

    Full Text Available Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based...

  12. Energy Efficiency in Ethernet Passive Optical Networks (EPONs): Protocol Design and Performance Evaluation

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    a suitable wakeup time scheduler at the Optical Line Terminal (OLT). A generic EPON system is considered, which is composed of an OLT and several ONUs that are EMM enabled. An energy consumption optimization problem aimed at saving energy is proposed and two heuristic sleep mode scheduling policies......As concerns about energy consumption grow, the power consumption of the EPON becomes a matter of increasing importance. In respect of energy efficiency, the current standard has no management protocols aiming to reduce power consumption in EPONs. In this paper, we propose an Energy Management...... and guaranteeing the network performance at the same time. Simulation results show that an EMM-based EPON with well designed scheduling disciplines is essential to achieving significant energy saving while meeting the delay constraint....

  13. Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

    Science.gov (United States)

    Xing, Fangyuan; Wang, Honghuan; Yin, Hongxi; Li, Ming; Luo, Shenzi; Wu, Chenguang

    2016-02-01

    With the extensive application of cloud computing and data centres, as well as the constantly emerging services, the big data with the burst characteristic has brought huge challenges to optical networks. Consequently, the software defined optical network (SDON) that combines optical networks with software defined network (SDN), has attracted much attention. In this paper, an OpenFlow-enabled optical node employed in optical cross-connect (OXC) and reconfigurable optical add/drop multiplexer (ROADM), is proposed. An open source OpenFlow controller is extended on routing strategies. In addition, the experiment platform based on OpenFlow protocol for software defined optical network, is designed. The feasibility and availability of the OpenFlow-enabled optical nodes and the extended OpenFlow controller are validated by the connectivity test, protection switching and load balancing experiments in this test platform.

  14. Pemodelan dan Verifikasi Formal Protokol EE-OLSR dengan UPPAAL CORA

    Directory of Open Access Journals (Sweden)

    Rachmat Wahid Saleh Insani

    2016-01-01

    Protocol verification process generally be done by simulation and testing. However, these processes unable to verify there are no subtle error or design flaw in protocol. Model Checking is an algorithmic method runs in fully automatic to verify a system. UPPAAL is a model checker tool to model, verify, and simulate a system in Timed Automata. UPPAAL CORA is model checker tool to verify EE-OLSR protocol modelled in Linearly Priced Timed Automata, if the protocol satisfy the energy efficient property formulated by formal specification language in Weighted Computation Tree Logic syntax. Model Checking Technique to verify the protocols results in the protocol is satisfy the energy efficient property only when the packet transmission traffic happens.

  15. New procedure for departure formalities

    CERN Multimedia

    HR & GS Departments

    2011-01-01

    As part of the process of simplifying procedures and rationalising administrative processes, the HR and GS Departments have introduced new personalised departure formalities on EDH. These new formalities have applied to students leaving CERN since last year and from 17 October 2011 this procedure will be extended to the following categories of CERN personnel: Staff members, Fellows and Associates. It is planned to extend this electronic procedure to the users in due course. What purpose do departure formalities serve? The departure formalities are designed to ensure that members of the personnel contact all the relevant services in order to return any necessary items (equipment, cards, keys, dosimeter, electronic equipment, books, etc.) and are aware of all the benefits to which they are entitled on termination of their contract. The new departure formalities on EDH have the advantage of tailoring the list of services that each member of the personnel must visit to suit his individual contractual and p...

  16. Etoricoxib - preemptive and postoperative analgesia (EPPA in patients with laparotomy or thoracotomy - design and protocols

    Directory of Open Access Journals (Sweden)

    Hatz Rudolf

    2010-05-01

    Full Text Available Abstract Background and Objective Our objective was to report on the design and essentials of the Etoricoxib protocol- Preemptive and Postoperative Analgesia (EPPA Trial, investigating whether preemptive analgesia with cox-2 inhibitors is more efficacious than placebo in patients who receive either laparotomy or thoracotomy. Design and Methods The study is a 2 × 2 factorial armed, double blinded, bicentric, randomised placebo-controlled trial comparing (a etoricoxib and (b placebo in a pre- and postoperative setting. The total observation period is 6 months. According to a power analysis, 120 patients scheduled for abdominal or thoracic surgery will randomly be allocated to either the preemptive or the postoperative treatment group. These two groups are each divided into two arms. Preemptive group patients receive etoricoxib prior to surgery and either etoricoxib again or placebo postoperatively. Postoperative group patients receive placebo prior to surgery and either placebo again or etoricoxib after surgery (2 × 2 factorial study design. The Main Outcome Measure is the cumulative use of morphine within the first 48 hours after surgery (measured by patient controlled analgesia PCA. Secondary outcome parameters include a broad range of tests including sensoric perception and genetic polymorphisms. Discussion The results of this study will provide information on the analgesic effectiveness of etoricoxib in preemptive analgesia and will give hints on possible preventive effects of persistent pain. Trial registration NCT00716833

  17. Application analysis of formal beauty in architectural design%建筑设计中形式美感的应用分析

    Institute of Scientific and Technical Information of China (English)

    陈虹

    2016-01-01

    Architectural design success is inseparable from it in the form of beauty, the general laws of the formal beauty is the design of any building can escape the, font in the works of the architectural design, graphics, color, text size, proportion, balance, symmetry, style and so on are important factors influencing architectural design. Therefore, to strengthen the role of beauty of architectural aesthetic form in architectural design research is very necessary.%建筑设计成功离不开它的形式美感,形式美的总规律是任何建筑设计都逃避不了的,在建筑设计作品中字体、图形、色彩、文字的大小、比例、平衡、对称、风格等等都是影响建筑设计的重要因素。因此,加强建筑美感形式美感在建筑设计中的作用的研究是十分必要的。

  18. Alveolar Bone Resorption Evaluation Around Single-piece Designed Bicortical Implants, Using Immediate Loading Protocol, Based on Orthopantomographs

    Directory of Open Access Journals (Sweden)

    Száva Dániel-Tamás

    2017-12-01

    Full Text Available Background: Inserting dental implants in severely atrophied jawbones is a great challenge for the dental practitioner. There are an increasing number of patients who choose dental implantanchored prosthetic restorations despite compromised bone quality and quantity. There have been numerous attempts in adapting implant design for the atrophic crestal bone. One-piece, needle-type basal implant design is a typical design for these cases. These implants are inserted in the remaining compact bone located in the basal aspect of the jawbones. If high primary stability is achieved, these implants are used for immediate loading protocol. From many points of view, this technique is based on contradictory principles compared to classic implant surgery and loading protocols. The aim of this study was to investigate the long-term success of basal one-piece short-diameter dental implants used for immediate loading protocol.

  19. PATIENT-CENTRED SCREENING FOR PRIMARY IMMUNODEFICIENCY, A MULTI-STAGE DIAGNOSTIC PROTOCOL DESIGNED FOR NONIMMUNOLOGISTS: 2011 UPDATE

    Directory of Open Access Journals (Sweden)

    E. de Vries

    2013-01-01

    Full Text Available Abstract. Members of the European Society for Immunodeficiencies (ESID and other colleagues have updated themulti-stage expert-opinion-based diagnostic protocol for non-immunologists incorporating newly defined primary immunodeficiency diseases (PIDs. The protocol presented here aims to increase the awareness of PIDs among doctors working in different fields. Prompt identification of PID is important for prognosis, but this may not be an easy task. The protocol therefore starts from the clinical presentation of the patient. Because PIDs may present at all ages, this protocol is aimed at both adult and paediatric physicians. The multi-stage design allows cost-effective screening for PID of the large number of potential cases in the early phases, with more expensive tests reserved for definitive classification in collaboration with a specialist in the field of immunodeficiency at a later stage.

  20. Design and utilisation of protocols to characterise dynamic PET uptake of two tracers using basis pursuit

    Science.gov (United States)

    Bell, Christopher; Puttick, Simon; Rose, Stephen; Smith, Jye; Thomas, Paul; Dowson, Nicholas

    2017-06-01

    Imaging using more than one biological process using PET could be of great utility, but despite previously proposed approaches to dual-tracer imaging, it is seldom performed. The alternative of performing multiple scans is often infeasible for clinical practice or even in research studies. Dual-tracer PET scanning allows for multiple PET radiotracers to be imaged within the same imaging session. In this paper we describe our approach to utilise the basis pursuit method to aid in the design of dual-tracer PET imaging experiments, and later in separation of the signals. The advantage of this approach is that it does not require a compartment model architecture to be specified or even that both signals are distinguishable in all cases. This means the method for separating dual-tracer signals can be used for many feasible and useful combinations of biology or radiotracer, once an appropriate scanning protocol has been decided upon. Following a demonstration in separating the signals from two consecutively injected radionuclides in a controlled experiment, phantom and list-mode mouse experiments demonstrated the ability to test the feasibility of dual-tracer imaging protocols for multiple injection delays. Increases in variances predicted for kinetic macro-parameters V D and K I in brain and tumoral tissue were obtained when separating the synthetically combined data. These experiments confirmed previous work using other approaches that injections delays of 10-20 min ensured increases in variance were kept minimal for the test tracers used. On this basis, an actual dual-tracer experiment using a 20 min delay was performed using these radio tracers, with the kinetic parameters (V D and K I) extracted for each tracer in agreement with the literature. This study supports previous work that dual-tracer PET imaging can be accomplished provided certain constraints are adhered to. The utilisation of basis pursuit techniques, with its removed need to specify a model

  1. Design, rationale and feasibility of a multidimensional experimental protocol to study early life stress

    Directory of Open Access Journals (Sweden)

    M. Dillwyn Bartholomeusz

    2017-09-01

    Full Text Available There is a rapidly accumulating body of evidence regarding the influential role of early life stress (ELS upon medical and psychiatric conditions. While self-report instruments, with their intrinsic limitations of recall, remain the primary means of detecting ELS in humans, biological measures are generally limited to a single biological system. This paper describes the design, rationale and feasibility of a study to simultaneously measure neuroendocrine, immune and autonomic nervous system (ANS responses to psychological and physiological stressors in relation to ELS. Five healthy university students were recruited by advertisement. Exclusion criteria included chronic medical conditions, psychotic disorders, needle phobia, inability to tolerate pain, and those using anti-inflammatory medications. They were clinically interviewed and physiological recordings made over a two-hour period pre, during and post two acute stressors: the cold pressor test and recalling a distressing memory. The Childhood Trauma Questionnaire and the Parental Bonding Index were utilised to measure ELS. Other psychological measures of mood and personality were also administered. Measurements of heart rate, blood pressure, respiratory rate, skin conductance, skin blood flow and temporal plasma samples were successfully obtained before, during and after acute stress. Participants reported the extensive psychological and multisystem physiological data collection and stress provocations were tolerable. Most (4/5 participants indicated a willingness to return to repeat the protocol, indicating acceptability. Our protocol is viable and safe in young physically healthy adults and allows us to assess simultaneously neuroendocrine, immune and autonomic nervous system responses to stressors in persons assessed for ELS. Keywords: Childhood-stress, Adverse-childhood-events, Childhood-trauma questionnaire, Parental-bonding-instrument, Type D scale (DS14

  2. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  3. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists

    Directory of Open Access Journals (Sweden)

    Rachel Russell

    2018-01-01

    Full Text Available Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people.

  4. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists.

    Science.gov (United States)

    Russell, Rachel; Ormerod, Marcus; Newton, Rita

    2018-01-01

    Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people.

  5. "From the Formal to the Innovative": The Use of Case Studies and Sustainable Projects in Developing a Design Process Model for Educating Product/Industrial Designers

    Science.gov (United States)

    Oakes, G. L.; Felton, A. J.; Garner, K. B.

    2006-01-01

    The BSc in computer aided product design (CAPD) course at the University of Wolverhampton was conceived as a collaborative venture in 1989 between the School of Engineering and the School of Art and Design. The award was at the forefront of forging interdisciplinary collaboration at undergraduate level in the field of product design. It has…

  6. Healthy School, Happy School: Design and Protocol for a Randomized Clinical Trial Designed to Prevent Weight Gain in Children

    Directory of Open Access Journals (Sweden)

    Daniela Schneid Schuh

    Full Text Available Abstract Background: Schools have become a key figure for the promotion of health and obesity interventions, bringing the development of critical awareness to the construction and promotion of a healthy diet, physical activity, and the monitoring of the nutritional status in childhood and adolescence. Objectives: To describe a study protocol to evaluate the effectiveness of an intervention designed to improve knowledge of food choices in the school environment. Methods: This is a cluster-randomized, parallel, two-arm study conducted in public elementary and middle schools in Brazil. Participants will be children and adolescents between the ages of 5 and 15 years, from both genders. The interventions will be focusing on changes in lifestyle, physical activities and nutritional education. Intervention activities will occur monthly in the school’s multimedia room or sports court. The control group arm will receive usual recommendations by the school. The primary outcome variable will be anthropometric measures, such as body mass index percentiles and levels of physical activity by the International Physical Activity Questionnaire. Results: We expect that after the study children will increase the ingestion of fresh food, reduce excessive consumption of sugary and processed foods, and reduce the hours of sedentary activities. Conclusion: The purpose of starting the dietary intervention at this stage of life is to develop a knowledge that will enable for healthy choices, providing opportunities for a better future for this population.

  7. Design, Implementation, and Study Protocol of a Kindergarten-Based Health Promotion Intervention

    Directory of Open Access Journals (Sweden)

    Susanne Kobel

    2017-01-01

    Full Text Available Inactivity and an unhealthy diet amongst others have led to an increased prevalence of overweight and obesity even in young children. Since most health behaviours develop during childhood health promotion has to start early. The setting kindergarten has been shown as ideal for such interventions. “Join the Healthy Boat” is a kindergarten-based health promotion programme with a cluster-randomised study focussing on increased physical activity, reduced screen media use, and sugar-sweetened beverages, as well as a higher fruit and vegetable intake. Intervention and materials were developed using Bartholomew’s Intervention Mapping approach considering Bandura’s social-cognitive theory and Bronfenbrenner’s ecological framework for human development. The programme is distributed using a train-the-trainer approach and currently implemented in 618 kindergartens. The effectiveness of this one-year intervention with an intervention and a control group will be examined in 62 kindergartens using standardised protocols, materials, and tools for outcome and process evaluation. A sample of 1021 children and their parents provided consent and participated in the intervention. Results of this study are awaited to give a better understanding of health behaviours in early childhood and to identify strategies for effective health promotion. The current paper describes development and design of the intervention and its implementation and planned evaluation. Trial Registration. The study is registered at the German Clinical Trials Register (DRKS, Freiburg University, Germany, ID: DRKS00010089.

  8. Formalized informal learning

    DEFF Research Database (Denmark)

    Levinsen, Karin; Sørensen, Birgitte Holm

    2011-01-01

    and other relevant stakeholders, as well as participant observations in the classroom documented by thick descriptions, formal and informal interviews and focus group interviews. The aim of the study was to explore and identify relations between designs for teaching and learning and the students' learning......This paper presents findings from a large-scale longitudinal, qualitative study - Project ICT and Learning (PIL) - that engaged the participation of eight primary schools in Denmark, and was conducted between 2006 and 2008. The research design was based on action research, involving teachers...... of school subjects within defined learning goals and curricula, along with various implementations of ICT in the pedagogical everyday practice (Levinsen & Sørensen 2008). However, another research strand - the topic of this paper - emerged during the project's life cycle as a consequence of ongoing changes...

  9. Voice Over Internet Protocol Testbed Design for Non-Intrusive, Objective Voice Quality Assessment

    National Research Council Canada - National Science Library

    Manka, David L

    2007-01-01

    Voice over Internet Protocol (VoIP) is an emerging technology with the potential to assist the United States Marine Corps in solving communication challenges stemming from modern operational concepts...

  10. Survey of Existing Tools for Formal Verification.

    Energy Technology Data Exchange (ETDEWEB)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.; Jackson, Mayo

    2014-12-01

    Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  11. Formal Verification -26 ...

    Indian Academy of Sciences (India)

    by testing of the components and successful testing leads to the software being ... Formal verification is based on formal methods which are mathematically based ..... scenario under which a similar error could occur. There are various other ...

  12. Formalizing Informal Logic

    Directory of Open Access Journals (Sweden)

    Douglas Walton

    2015-12-01

    Full Text Available This paper presents a formalization of informal logic using the Carneades Argumentation System (CAS, a formal, computational model of argument that consists of a formal model of argument graphs and audiences. Conflicts between pro and con arguments are resolved using proof standards, such as preponderance of the evidence. CAS also formalizes argumentation schemes. Schemes can be used to check whether a given argument instantiates the types of argument deemed normatively appropriate for the type of dialogue.

  13. Pragmatics for formal semantics

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2011-01-01

    This tech talk describes how to write and how to inter-derive formal semantics for sequential programming languages. The progress reported here is (1) concrete guidelines to write each formal semantics to alleviate their proof obligations, and (2) simple calculational tools to obtain a formal...

  14. The randomized shortened dental arch study (RaSDA: design and protocol

    Directory of Open Access Journals (Sweden)

    Kern Matthias

    2010-02-01

    Full Text Available Abstract Background Various treatment options for the prosthetic treatment of jaws where all molars are lost are under discussion. Besides the placement of implants, two main treatment types can be distinguished: replacement of the missing molars with removable dental prostheses and non-replacement of the molars, i.e. preservation of the shortened dental arch. Evidence is lacking regarding the long-term outcome and the clinical performance of these approaches. High treatment costs and the long time required for the treatment impede respective clinical trials. Methods/design This 14-center randomized controlled investigator-initiated trial is ongoing. Last patient out will be in 2010. Patients over 35 years of age with all molars missing in one jaw and with at least both canines and one premolar left on each side were eligible. One group received a treatment with removable dental prostheses for molar replacement (treatment A. The other group received a treatment limited to the replacement of all missing anterior and premolar teeth using fixed bridges (treatment B. A pilot trial with 32 patients was carried out. Two hundred and fifteen patients were enrolled in the main trial where 109 patients were randomized for treatment A and 106 for treatment B. The primary outcome measure is further tooth loss during the 5-year follow-up. The secondary outcome measures encompassed clinical, technical and subjective variables. The study is funded by the Deutsche Forschungsgemeinschaft (German Research Foundation, DFG WA 831/2-1, 2-2, 2-3, 2-4, 2-5. Discussion The particular value of this trial is the adaptation of common design components to the very specific features of complex dental prosthetic treatments. The pilot trial proved to be indispensable because it led to a number of adjustments in the study protocol that considerably improved the practicability. The expected results are of high clinical relevance and will show the efficacy of two common

  15. Using knowledge translation as a framework for the design of a research protocol.

    Science.gov (United States)

    Fredericks, Suzanne; Martorella, Géraldine; Catallo, Cristina

    2015-05-01

    Knowledge translation has been defined as the synthesis, dissemination, exchange and ethically sound application of knowledge to improve health, resulting in a stronger health-care system. Using KT activities to aid in the adoption of evidence into practice can address current health-care challenges such as increasing organizational practice standards, alleviating the risk for adverse events and meeting practitioner needs for evidence at the bedside. Two general forms of KT have been identified. These being integrated KT and end-of-grant KT. Integrated KT involves the knowledge users in the research team and in the majority of stages of the research process. End-of-grant KT relates to the translation of findings through a well-developed dissemination plan. This paper describes the process of using an integrated knowledge translation approach to design a research protocol that will examine the effectiveness of a web-based patient educational intervention. It begins with a description of integrated knowledge translation, followed by the presentation of a specific case example in which integrated knowledge translation is used to develop a nursing intervention. The major elements of integrated knowledge translation pertain to need for a knowledge user who represents the broad target user group, and who is knowledgeable in the area under investigation and who as authority to enact changes to practice. Use of knowledge users as equal partners within the research team; exploring all feasible opportunities for knowledge exchange; and working with knowledge users to identify all outcomes related to knowledge translation are the other major elements of integrated knowledge translation that are addressed throughout this paper. Furthermore, the relevance of psychosocial or educational interventions to knowledge translation is also discussed as a source of knowledge. In summary, integrated knowledge translation is an important tool for the development of new interventions, as

  16. Use of Online Learning Resources in the Development of Learning Environments at the Intersection of Formal and Informal Learning: The Student as Autonomous Designer

    Directory of Open Access Journals (Sweden)

    Maja Lebeničnik

    2015-06-01

    Full Text Available Learning resources that are used in the education of university students are often available online. The nature of new technologies causes an interweaving of formal and informal learning, with the result that a more active role is expected from students with regard to the use of ICT for their learning. The variety of online learning resources (learning content and learning tools facilitates informed use and enables students to create the learning environment that is most appropriate for their personal learning needs and preferences. In contemporary society, the creation of an inclusive learning environment supported by ICT is pervasive. The model of Universal Design for Learning is becoming increasingly significant in responding to the need for inclusive learning environments. In this article, we categorize different online learning activities into the principles of Universal Design for Learning. This study examines ICT use among university students (N = 138, comparing student teachers with students in other study programs. The findings indicate that among all students, activities with lower demands for engagement are most common. Some differences were observed between student teachers and students from other programs. Student teachers were more likely than their peers to perform certain activities aimed at meeting diverse learner needs, but the percentage of students performing more advanced activities was higher for students in other study programs than for student teachers. The categorization of activities revealed that student teachers are less likely to undertake activities that involve interaction with others. Among the sample of student teachers, we found that personal innovativeness is correlated with diversity of activities in only one category. The results show that student teachers should be encouraged to perform more advanced activities, especially activities involving interaction with others, collaborative learning and use of ICT to

  17. Designing protocols for the human teeth biobank of the Universidad Nacional de Colombia

    Directory of Open Access Journals (Sweden)

    Lina Constanza Gonzáles-Pita

    2014-07-01

    Full Text Available Protocols in a Tooth Bank are essential in order to assure smooth operation, reproducibility and standardization that minimize cross contamination, maintain original characteristics and physicochemical properties of teeth, fulll ethical and legal regulations and a proper disposal of residues. Objective: to propose the disinfection, storing and transportation protocols for the UNTB. Methods: A literature search was conducted using the words “teeth, human, tooth bank, disinfection, sterilization, storage, organization, biosecurity, biobank, protocol, prevention” in the Pubmed, Science Direct and Scielo databases. 37 papers ranging from 1988 up to 2014 were selected. International and Colombian ethical and legal regulations for organ donation, handling and investigation were taken into account as well as laboratory observations and chemical basic principles gained through several undergraduate and graduate thesis. All this input was carefully studied, analysed and critically modied for setting the recommended processes for the conversion of donated teeth into organs suitable for research. Results: Collection, transportation, cleaning/disinfection and storing protocols were planned and elaborated. Conclusions: Based on scientic literature, national and international regulations and experimental experience, several protocols for the UNTB were presented.

  18. New Computational Approaches for NMR-based Drug Design: A Protocol for Ligand Docking to Flexible Target Sites

    International Nuclear Information System (INIS)

    Gracia, Luis; Speidel, Joshua A.; Weinstein, Harel

    2006-01-01

    NMR-based drug design has met with some success in the last decade, as illustrated in numerous instances by Fesik's ''ligand screening by NMR'' approach. Ongoing efforts to generalize this success have led us to the development of a new paradigm in which quantitative computational approaches are being integrated with NMR derived data and biological assays. The key component of this work is the inclusion of the intrinsic dynamic quality of NMR structures in theoretical models and its use in docking. A new computational protocol is introduced here, designed to dock small molecule ligands to flexible proteins derived from NMR structures. The algorithm makes use of a combination of simulated annealing monte carlo simulations (SA/MC) and a mean field potential informed by the NMR data. The new protocol is illustrated in the context of an ongoing project aimed at developing new selective inhibitors for the PCAF bromodomains that interact with HIV Tat

  19. Design of PDT protocols using delta-aminolevulinic acid (5ALA)

    Science.gov (United States)

    Jacques, Steven L.; He, Xiao-Yan; Gofstein, Gary

    1993-06-01

    The kinetics of protoporphyrin IX (PPIX) synthesis, bioconversion to other metabolic products, and photobleaching were measured in cell cultures after incubation in media containing the metabolic precursor for heme synthesis, (delta) -aminolevulinic acid (5 ALA). A compartmental model described the kinetics in terms of rate constants for the three processes. The maximum amount of PPIX that can be attained in the cells and the concentration of 5 ALA in the medium that obtains this maximum were determined. Using this information, two dosimetry protocols are outlined which both involve complete photobleaching of the PPIX: (1) the classical acute protocol using maximum 5 ALA to produce maximum PPIX and a light treatment of about 0.5 - 1 hr, and (2) a novel prolonged protocol using continuous low-level 5 ALA delivery to produce only slightly elevated PPIX and an extended light exposure time of over 24 hrs.

  20. Generalization and formalization of the US EPA procedure for design of treated wastewater aquifer recharge basins: II. Retrofit of Souhil Wadi (Nabeul, Tunisia) pilot plant.

    Science.gov (United States)

    Kallali, Hamadi; Yoshida, Mitsuo; Tarhouni, Jamila; Jedidi, Naceur

    2013-01-01

    The 'Cap Bon' peninsula in Tunisia suffers from intensive tourist activities, high demographic increase and industrial development. As groundwater had been for a long time the main water source, aquifers had been subject to a severe depletion and seawater intrusion. Despite the measures taken prohibiting new drillings and water carrying by the construction of a waterway linking the region to the north-west region of Tunisia, the problem of water shortage persists. Artificial recharge of groundwater with treated wastewater has been decided as a technique to replenish the region aquifers. A pilot plant was constructed in the early 1980s in Souhil Wadi (Nabeul) area. Many experiments have been carried out on this plant and have led to controversial opinions about its performance and its impact on groundwater contamination. This contribution concerns the application of the procedure that we developed from the generalization and the formalization of the United States Environmental Protection Agency (US EPA) methodology for the design of treated wastewater aquifer recharge basins. This upgrading procedure implemented in a spreadsheet, has been used to retrofit the Souhil Wadi facility in order to improve its performance. This method highlighted the importance of the safety factor to estimate wastewater infiltration rate from clean water permeability measurements. It has, also, demonstrated the discordance between the initial design parameters of Souhil Wadi facility and their current status as they have changed with time and the infiltration capacity of the basins has been affected by clogging. Indeed, it has been demonstrated that with the current state of clogging of the basins, the design infiltration rate limited by the most restrictive layer (6.1 cm/hr) corresponds to 22% of the surface infiltration rate reached after a drying period of 10 d, which means that we need more basins to absorb the daily loading rate. The design method leads to the construct ion of five

  1. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  2. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    Science.gov (United States)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  3. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  4. Development of the protocol for purification of artemisinin based on combination of commercial and computationally designed adsorbents.

    Science.gov (United States)

    Piletska, Elena V; Karim, Kal; Cutler, Malcolm; Piletsky, Sergey A

    2013-01-01

    A polymeric adsorbent for extraction of the antimalarial drug artemisinin from Artemisia annua L. was computationally designed. This polymer demonstrated a high capacity for artemisinin (120 mg g(-1) ), quantitative recovery (87%) and was found to be an effective material for purification of artemisinin from complex plant matrix. The artemisinin quantification was conducted using an optimised HPLC-MS protocol, which was characterised by high precision and linearity in the concentration range between 0.05 and 2 μg mL(-1) . Optimisation of the purification protocol also involved screening of commercial adsorbents for the removal of waxes and other interfering natural compounds, which inhibit the crystallisation of artemisinin. As a result of a two step-purification protocol crystals of artemisinin were obtained, and artemisinin purity was evaluated as 75%. By performing the second stage of purification twice, the purity of artemisinin can be further improved to 99%. The developed protocol produced high-purity artemisinin using only a few purification steps that makes it suitable for large scale industrial manufacturing process. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. [Sampling and measurement methods of the protocol design of the China Nine-Province Survey for blindness, visual impairment and cataract surgery].

    Science.gov (United States)

    Zhao, Jia-liang; Wang, Yu; Gao, Xue-cheng; Ellwein, Leon B; Liu, Hu

    2011-09-01

    To design the protocol of the China nine-province survey for blindness, visual impairment and cataract surgery to evaluate the prevalence and main causes of blindness and visual impairment, and the prevalence and outcomes of the cataract surgery. The protocol design was began after accepting the task for the national survey for blindness, visual impairment and cataract surgery from the Department of Medicine, Ministry of Health, China, in November, 2005. The protocol in Beijing Shunyi Eye Study in 1996 and Guangdong Doumen County Eye Study in 1997, both supported by World Health Organization, was taken as the basis for the protocol design. The relative experts were invited to discuss and prove the draft protocol. An international advisor committee was established to examine and approve the draft protocol. Finally, the survey protocol was checked and approved by the Department of Medicine, Ministry of Health, China and Prevention Program of Blindness and Deafness, WHO. The survey protocol was designed according to the characteristics and the scale of the survey. The contents of the protocol included determination of target population and survey sites, calculation of the sample size, design of the random sampling, composition and organization of the survey teams, determination of the examinee, the flowchart of the field work, survey items and methods, diagnostic criteria of blindness and moderate and sever visual impairment, the measures of the quality control, the methods of the data management. The designed protocol became the standard and practical protocol for the survey to evaluate the prevalence and main causes of blindness and visual impairment, and the prevalence and outcomes of the cataract surgery.

  6. An extended protocol for usability validation of medical devices : Research design and reference model

    NARCIS (Netherlands)

    Schmettow, M.; Schnittker, R.; Schraagen, J.M.

    2017-01-01

    This paper proposes and demonstrates an extended protocol for usability validation testing of medical devices. A review of currently used methods for the usability evaluation of medical devices revealed two main shortcomings. Firstly, the lack of methods to closely trace the interaction sequences

  7. Industrial use of formal methods formal verification

    CERN Document Server

    Boulanger, Jean-Louis

    2012-01-01

    At present the literature gives students and researchers of the very general books on the formal technics. The purpose of this book is to present in a single book, a return of experience on the used of the "formal technics" (such proof and model-checking) on industrial examples for the transportation domain. This book is based on the experience of people which are completely involved in the realization and the evaluation of safety critical system software based.  The implication of the industrialists allows to raise the problems of confidentiality which could appear and so allow

  8. Formal Women-only Networks

    DEFF Research Database (Denmark)

    Villesèche, Florence; Josserand, Emmanuel

    2017-01-01

    /organisations and the wider social group of women in business. Research limitations/implications: The authors focus on the distinction between external and internal formal women-only networks while also acknowledging the broader diversity that can characterise such networks. Their review provides the reader with an insight...... member level, the authors suggest that such networks can be of value for organisations and the wider social group of women in management and leadership positions.......Purpose: The purpose of this paper is to review the emerging literature on formal women-only business networks and outline propositions to develop this under-theorised area of knowledge and stimulate future research. Design/methodology/approach: The authors review the existing literature on formal...

  9. Informal work and formal plans

    DEFF Research Database (Denmark)

    Dalsted, Rikke Juul; Hølge-Hazelton, Bibi; Kousgaard, Marius Brostrøm

    2012-01-01

    INTRODUCTION: Formal pathways models outline that patients should receive information in order to experience a coherent journey but do not describe an active role for patients or their relatives. The aim of this is paper is to articulate and discuss the active role of patients during their cancer...... trajectories. METHODS AND THEORY: An in-depth case study of patient trajectories at a Danish hospital and surrounding municipality using individual interviews with patients. Theory about trajectory and work by Strauss was included. RESULTS: Patients continuously took initiatives to organize their treatment....... The patients' requests were not sufficiently supported in the professional organisation of work or formal planning. Patients' insertion and use of information in their trajectories challenged professional views and working processes. And the design of the formal pathway models limits the patients' active...

  10. Healthy School, Happy School: Design and Protocol for a Randomized Clinical Trial Designed to Prevent Weight Gain in Children.

    Science.gov (United States)

    Schuh, Daniela Schneid; Goulart, Maíra Ribas; Barbiero, Sandra Mari; Sica, Caroline D'Azevedo; Borges, Raphael; Moraes, David William; Pellanda, Lucia Campos

    2017-06-01

    Schools have become a key figure for the promotion of health and obesity interventions, bringing the development of critical awareness to the construction and promotion of a healthy diet, physical activity, and the monitoring of the nutritional status in childhood and adolescence. To describe a study protocol to evaluate the effectiveness of an intervention designed to improve knowledge of food choices in the school environment. This is a cluster-randomized, parallel, two-arm study conducted in public elementary and middle schools in Brazil. Participants will be children and adolescents between the ages of 5 and 15 years, from both genders. The interventions will be focusing on changes in lifestyle, physical activities and nutritional education. Intervention activities will occur monthly in the school's multimedia room or sports court. The control group arm will receive usual recommendations by the school. The primary outcome variable will be anthropometric measures, such as body mass index percentiles and levels of physical activity by the International Physical Activity Questionnaire. We expect that after the study children will increase the ingestion of fresh food, reduce excessive consumption of sugary and processed foods, and reduce the hours of sedentary activities. The purpose of starting the dietary intervention at this stage of life is to develop a knowledge that will enable for healthy choices, providing opportunities for a better future for this population. As escolas tornaram-se essenciais para a promoção de saúde e de intervenções para obesidade, propiciando o desenvolvimento de consciência crítica para a construção e promoção de dieta saudável, atividade física e monitoramento do status nutricional na infância e adolescência. Descrever um protocolo de estudo para avaliar a eficiência de uma intervenção projetada para aprimorar o conhecimento sobre escolhas alimentares no ambiente escolar. Estudo clínico randomizado em cluster

  11. Fear of the Formal

    DEFF Research Database (Denmark)

    du Gay, Paul; Lopdrup-Hjorth, Thomas

    Over recent decades, institutions exhibiting high degrees of formality have come in for severe criticism. From the private to the public sector, and across a whole spectrum of actors spanning from practitioners to academics, formal organization is viewed with increasing doubt and skepticism....... In a “Schumpetarian world” (Teece et al., 1997: 509) of dynamic competition and incessant reform, formal organization appears as well suited to survival as a fish out of water. Indeed, formal organization, and its closely overlapping semantic twin bureaucracy, are not only represented as ill suited to the realities...... is that formal organization is an obstacle to be overcome. For that very reason, critics, intellectuals and reformers alike have urged public and private organizations to break out of the stifling straightjacket of formality, to dispense with bureaucracy, and to tear down hierarchies. This could either be done...

  12. Integrating semi-formal and formal requirements

    NARCIS (Netherlands)

    Wieringa, Roelf J.; Olivé, Antoni; Dubois, Eric; Pastor, Joan Antoni; Huyts, Sander

    1997-01-01

    In this paper, we report on the integration of informal, semiformal and formal requirements specification techniques. We present a framework for requirements specification called TRADE, within which several well-known semiformal specification techniques are placed. TRADE is based on an analysis of

  13. Design and Research of a New secure Authentication Protocol in GSM networks

    Directory of Open Access Journals (Sweden)

    Qi Ai-qin

    2016-01-01

    Full Text Available As the first line of defense in the security application system, Authentication is an important security service. Its typical scheme is challenge/response mechanism and this scheme which is simple-structured and easy to realize has been used worldwide. But these protocols have many following problems In the GSM networks such as the leakage of user indentity privacy, no security protection between home registers and foreign registers and the vicious intruders’ information stealing and so on. This paper presents an authentication protocol in GSM networks based on maths operation and modular square root technique . The analysis of the security and performance has also been done. The results show that it is more robust and secure compared to the previous agreements.

  14. Formal And Informal Macro-Regional Transport Clusters As A Primary Step In The Design And Implementation Of Cluster-Based Strategies

    Directory of Open Access Journals (Sweden)

    Nežerenko Olga

    2015-09-01

    Full Text Available The aim of the study is the identification of a formal macro-regional transport and logistics cluster and its development trends on a macro-regional level in 2007-2011 by means of the hierarchical cluster analysis. The central approach of the study is based on two concepts: 1 the concept of formal and informal macro-regions, and 2 the concept of clustering which is based on the similarities shared by the countries of a macro-region and tightly related to the concept of macro-region. The authors seek to answer the question whether the formation of a formal transport cluster could provide the BSR a stable competitive position in the global transportation and logistics market.

  15. Design and Implementation of Software Protocol in VAX/VMS Using Ethernet Local Area Network.

    Science.gov (United States)

    1983-06-01

    firm hclding the trademark: INTEL Ccrporation, Santa Clara, California INTELLEC IDS Multbus DIGITAL Research, Pacific Grove, California CE/M-80...bcard NS2030 VMS device driver and N11010 diagnostic program DIGITAL Equipment Corporation, Maynard, Massachusetts V&Z-11/780 Mini computer VAX/VMS...8217 . . - - . , . editors, libary , etc.) of one node to an application process in another ncde. Such protocols may include: 1) .. 11 T f6 - allowing a process in one node to

  16. Design and Analysis of a secure multi-party communication protocol

    OpenAIRE

    Herberth, Klaus

    2016-01-01

    In the past years digital communication became an important aspect in every day life. Everything is shared and discussed in groups of friends, family or business part- ners without a proper way to protect that information. This master thesis introduces the first secure robust multi-party communication protocol which mimics a physical conversation with the help of a Diffie-Hellman key tree and social behaviours. Robust- ness against offline group members is reached by taking advantage of trans...

  17. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    Science.gov (United States)

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  18. Active SAmpling Protocol (ASAP) to Optimize Individual Neurocognitive Hypothesis Testing: A BCI-Inspired Dynamic Experimental Design.

    Science.gov (United States)

    Sanchez, Gaëtan; Lecaignard, Françoise; Otman, Anatole; Maby, Emmanuel; Mattout, Jérémie

    2016-01-01

    The relatively young field of Brain-Computer Interfaces has promoted the use of electrophysiology and neuroimaging in real-time. In the meantime, cognitive neuroscience studies, which make extensive use of functional exploration techniques, have evolved toward model-based experiments and fine hypothesis testing protocols. Although these two developments are mostly unrelated, we argue that, brought together, they may trigger an important shift in the way experimental paradigms are being designed, which should prove fruitful to both endeavors. This change simply consists in using real-time neuroimaging in order to optimize advanced neurocognitive hypothesis testing. We refer to this new approach as the instantiation of an Active SAmpling Protocol (ASAP). As opposed to classical (static) experimental protocols, ASAP implements online model comparison, enabling the optimization of design parameters (e.g., stimuli) during the course of data acquisition. This follows the well-known principle of sequential hypothesis testing. What is radically new, however, is our ability to perform online processing of the huge amount of complex data that brain imaging techniques provide. This is all the more relevant at a time when physiological and psychological processes are beginning to be approached using more realistic, generative models which may be difficult to tease apart empirically. Based upon Bayesian inference, ASAP proposes a generic and principled way to optimize experimental design adaptively. In this perspective paper, we summarize the main steps in ASAP. Using synthetic data we illustrate its superiority in selecting the right perceptual model compared to a classical design. Finally, we briefly discuss its future potential for basic and clinical neuroscience as well as some remaining challenges.

  19. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  20. Formal Methods for Life-Critical Software

    Science.gov (United States)

    Butler, Ricky W.; Johnson, Sally C.

    1993-01-01

    The use of computer software in life-critical applications, such as for civil air transports, demands the use of rigorous formal mathematical verification procedures. This paper demonstrates how to apply formal methods to the development and verification of software by leading the reader step-by-step through requirements analysis, design, implementation, and verification of an electronic phone book application. The current maturity and limitations of formal methods tools and techniques are then discussed, and a number of examples of the successful use of formal methods by industry are cited.

  1. Geometry and Formal Linguistics.

    Science.gov (United States)

    Huff, George A.

    This paper presents a method of encoding geometric line-drawings in a way which allows sets of such drawings to be interpreted as formal languages. A characterization of certain geometric predicates in terms of their properties as languages is obtained, and techniques usually associated with generative grammars and formal automata are then applied…

  2. Formalizing Evaluation in Music Information Retrieval

    DEFF Research Database (Denmark)

    Sturm, Bob L.

    2013-01-01

    We develop a formalism to disambiguate the evaluation of music information retrieval systems. We define a ``system,'' what it means to ``analyze'' one, and make clear the aims, parts, design, execution, interpretation, and assumptions of its ``evaluation.'' We apply this formalism to discuss...

  3. Use of Online Learning Resources in the Development of Learning Environments at the Intersection of Formal and Informal Learning: The Student as Autonomous Designer

    Science.gov (United States)

    Lebenicnik, Maja; Pitt, Ian; Istenic Starcic, Andreja

    2015-01-01

    Learning resources that are used in the education of university students are often available online. The nature of new technologies causes an interweaving of formal and informal learning, with the result that a more active role is expected from students with regard to the use of ICT for their learning. The variety of online learning resources…

  4. Formality in Brackets

    DEFF Research Database (Denmark)

    Garsten, Christina; Nyqvist, Anette

    Ethnographic work in formal organizations involves learning to recognize the many layers of front stage and back stage of organized life, and to bracket formality. It means to be alert to the fact that what is formal and front stage for one some actors, and in some situations, may in fact be back...... stage and informal for others. Walking the talk, donning the appropriate attire, wearing the proper suit, may be part of what is takes to figure out the code of formal organizational settings – an entrance ticket to the backstage, as it were. Oftentimes, it involves a degree of mimicry, of ‘following...... suits’ (Nyqvist 2013), and of doing ‘ethnography by failure’ (Garsten 2013). In this paper, we explore the layers of informality and formality in our fieldwork experiences among financial investors and policy experts, and discuss how to ethnographically represent embodied fieldwork practices. How do we...

  5. Design and Analysis of QoS Routing Framework integrated with OLSR protocol for Multimedia Traffic in Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    S. Soni

    2017-06-01

    Full Text Available MANETs (Mobile Ad-hoc Networks is the self organizing wireless structure of mobile hosts. Wireless media is used for communication in MANETs. Considering the developing requirements for multimedia and real-time traffic applications in real world, QoS (Quality-of-Service support is essential in MANETs. But most of the characteristics of MANETs make QoS support a difficult problem. It is challenging to support QoS routing in MANET due to dynamic behavior and mobility of the hosts. The OLSR (Optimized Link State Routing protocol can be efficiently used in MANETs to provide QoS routing because of its dynamic MPR (Multi Point Relay selection criteria and proactive nature. In this paper, a design of QoS routing framework integrated with OLSR protocol is proposed and also analyzed using network simulator. Proposed QoS framework combines a bandwidth estimation algorithm with explicit resource reservation, QoS routing and connection admission control (CAC. OLSR protocol is extended for QoS framework to solve performance issues related to node mobility using cross layer approach. Results after simulation conclude about efficiency of the proposed QoS routing framework.

  6. Annotating Mutational Effects on Proteins and Protein Interactions: Designing Novel and Revisiting Existing Protocols.

    Science.gov (United States)

    Li, Minghui; Goncearenco, Alexander; Panchenko, Anna R

    2017-01-01

    In this review we describe a protocol to annotate the effects of missense mutations on proteins, their functions, stability, and binding. For this purpose we present a collection of the most comprehensive databases which store different types of sequencing data on missense mutations, we discuss their relationships, possible intersections, and unique features. Next, we suggest an annotation workflow using the state-of-the art methods and highlight their usability, advantages, and limitations for different cases. Finally, we address a particularly difficult problem of deciphering the molecular mechanisms of mutations on proteins and protein complexes to understand the origins and mechanisms of diseases.

  7. The Palaeoclimate and Terrestrial Exoplanet Radiative Transfer Model Intercomparison Project (PALAEOTRIP: experimental design and protocols

    Directory of Open Access Journals (Sweden)

    C. Goldblatt

    2017-11-01

    Full Text Available Accurate radiative transfer calculation is fundamental to all climate modelling. For deep palaeoclimate, and increasingly terrestrial exoplanet climate science, this brings both the joy and the challenge of exotic atmospheric compositions. The challenge here is that most standard radiation codes for climate modelling have been developed for modern atmospheric conditions and may perform poorly away from these. The palaeoclimate or exoclimate modeller must either rely on these or use bespoke radiation codes, and in both cases rely on either blind faith or ad hoc testing of the code. In this paper, we describe the protocols for the Palaeoclimate and Terrestrial Exoplanet Radiative Transfer Model Intercomparison Project (PALAEOTRIP to systematically address this. This will compare as many radiation codes used for palaeoclimate or exoplanets as possible, with the aim of identifying the ranges of far-from-modern atmospheric compositions in which the codes perform well. This paper describes the experimental protocol and invites community participation in the project through 2017–2018.

  8. The Dutch 'Focus on Strength' intervention study protocol: programme design and production, implementation and evaluation plan.

    Science.gov (United States)

    Ten Hoor, G A; Kok, G; Rutten, G M; Ruiter, R A C; Kremers, S P J; Schols, A M J W; Plasqui, G

    2016-06-10

    Overweight youngsters are better in absolute strength exercises than their normal-weight counterparts; a physiological phenomenon with promising psychological impact. In this paper we describe the study protocol of the Dutch, school-based program 'Focus on Strength' that aims to improve body composition of 11-13 year old students, and with that to ultimately improve their quality of life. The development of this intervention is based on the Intervention Mapping (IM) protocol, which starts from a needs assessment, uses theory and empirical research to develop a detailed intervention plan, and anticipates program implementation and evaluation. This novel intervention targets first year students in preparatory secondary vocational education (11-13 years of age). Teachers are the program implementers. One part of the intervention involves a 30 % increase of strength exercises in the physical education lessons. The other part is based on Motivational Interviewing, promoting autonomous motivation of students to become more physically active outside school. Performance and change objectives are described for both teachers and students. The effectiveness of the intervention will be tested in a Randomized Controlled Trial in 9 Dutch high schools. Intervention Mapping is a useful framework for program planning a school-based program to improve body composition and motivation to exercise in 11-13 year old adolescents by a "Focus on Strength". NTR5676 , registered 8 February 2016 (retrospectively registered).

  9. Interaction systems design and the protocol- and middleware-centred paradigms in distributed application development

    NARCIS (Netherlands)

    Andrade Almeida, João; van Sinderen, Marten J.; Quartel, Dick; Ferreira Pires, Luis

    2003-01-01

    This paper aims at demonstrating the benefits and importance of interaction systems design in the development of distributed applications. We position interaction systems design with respect to two paradigms that have influenced the design of distributed applications: the middleware-centred and the

  10. SDL-Based Protocol Validation for the Integrated Safety Communication Network in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Jung-hun; Kim, Dong-hoon; Lee, Dong-young; Park, Sung-woo

    2006-01-01

    The communication protocol in nuclear power plants needs to be validated systematically to avoid the critical situation that may be caused by its own faults. We establish the methodology to validate the protocol designed for the Integrated Safety Communication Networks (ISCN) of Korea Nuclear Instrumentation and Control System (KNICS). The ISCN protocol is specified using the formal description technique called the SDL. The validation of ISCN protocol is done via the Simulator and Validator, both of which are main functions provided by the SDL

  11. Necessity of Integral Formalism

    International Nuclear Information System (INIS)

    Tao Yong

    2011-01-01

    To describe the physical reality, there are two ways of constructing the dynamical equation of field, differential formalism and integral formalism. The importance of this fact is firstly emphasized by Yang in case of gauge field [Phys. Rev. Lett. 33 (1974) 445], where the fact has given rise to a deeper understanding for Aharonov-Bohm phase and magnetic monopole [Phys. Rev. D 12 (1975) 3845]. In this paper we shall point out that such a fact also holds in general wave function of matter, it may give rise to a deeper understanding for Berry phase. Most importantly, we shall prove a point that, for general wave function of matter, in the adiabatic limit, there is an intrinsic difference between its integral formalism and differential formalism. It is neglect of this difference that leads to an inconsistency of quantum adiabatic theorem pointed out by Marzlin and Sanders [Phys. Rev. Lett. 93 (2004) 160408]. It has been widely accepted that there is no physical difference of using differential operator or integral operator to construct the dynamical equation of field. Nevertheless, our study shows that the Schrödinger differential equation (i.e., differential formalism for wave function) shall lead to vanishing Berry phase and that the Schrödinger integral equation (i.e., integral formalism for wave function), in the adiabatic limit, can satisfactorily give the Berry phase. Therefore, we reach a conclusion: There are two ways of describing physical reality, differential formalism and integral formalism; but the integral formalism is a unique way of complete description. (general)

  12. Specification and Design of a Fault Recovery Model for the Reliable Multicast Protocol

    Science.gov (United States)

    Montgomery, Todd; Callahan, John R.; Whetten, Brian

    1996-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  13. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  14. Study, design and realization of a fault-tolerant and predictable synchronous communication protocol on off-the-shelf components

    International Nuclear Information System (INIS)

    Chabrol, D.

    2006-06-01

    This PhD thesis contributes to the design and realization of safety-critical real-time systems on multiprocessor architectures with distributed memory. They are essential to compute systems that have to ensure complex and critical functions. This PhD thesis deals with communication media management. The communication management conditions strongly the capability of the system to fulfill the timeliness property and the dependability requirements. Our contribution includes: - The design of predictable and fault-tolerant synchronous communication protocol; - The study and the definition of the execution model to have a efficient and safe communications management; - The proposal of a method to generate automatically the communications scheduling. Our approach is based on a communication model that allows the analysis of the feasibility, before execution, of a distributed safe-critical real-time system with timeliness and safety requirements. This leads to the definition of an execution model based on a time-triggered and parallel communication management. A set of linear constraints system is generated automatically to compute the network scheduling and the network load with timeliness fulfillment. Then, the proposed communication interface is based on an advanced version of TDMA protocol which allows to use proprietary components (TTP, FlexRay) as well as standard components (Ethernet). The concepts presented in this thesis lead to the realisation and evaluation of a prototype within the framework of the OASIS project done at the CEA/List. (author)

  15. Integrated formal operations plan

    Energy Technology Data Exchange (ETDEWEB)

    Cort, G.; Dearholt, W.; Donahue, S.; Frank, J.; Perkins, B.; Tyler, R.; Wrye, J.

    1994-01-05

    The concept of formal operations (that is, a collection of business practices to assure effective, accountable operations) has vexed the Laboratory for many years. To date most attempts at developing such programs have been based upon rigid, compliance-based interpretations of a veritable mountain of Department of Energy (DOE) orders, directives, notices, and standards. These DOE dictates seldom take the broad view but focus on highly specialized programs isolated from the overall context of formal operations. The result is a confusing array of specific, and often contradictory, requirements that produce a patchwork of overlapping niche programs. This unnecessary duplication wastes precious resources, dramatically increases the complexity of our work processes, and communicates a sense of confusion to our customers and regulators. Coupled with the artificial divisions that have historically existed among the Laboratory`s formal operations organizations (quality assurance, configuration management, records management, training, etc.), this approach has produced layers of increasingly vague and complex formal operations plans, each of which interprets its parent and adds additional requirements of its own. Organizational gridlock ensues whenever an activity attempts to implement these bureaucratic monstrosities. The integrated formal operations plan presented is to establish a set of requirements that must be met by an integrated formal operations program, assign responsibilities for implementation and operation of the program, and specify criteria against which the performance of the program will be measured. The accountable line manager specifies the items, processes, and information (the controlled elements) to which the formal operations program specified applies. The formal operations program is implemented using a graded approach based on the level of importance of the various controlled elements and the scope of the activities in which they are involved.

  16. Systematic review of economic analyses in patient safety: a protocol designed to measure development in the scope and quality of evidence.

    Science.gov (United States)

    Carter, Alexander W; Mandavia, Rishi; Mayer, Erik; Marti, Joachim; Mossialos, Elias; Darzi, Ara

    2017-08-18

    Recent avoidable failures in patient care highlight the ongoing need for evidence to support improvements in patient safety. According to the most recent reviews, there is a dearth of economic evidence related to patient safety. These reviews characterise an evidence gap in terms of the scope and quality of evidence available to support resource allocation decisions. This protocol is designed to update and improve on the reviews previously conducted to determine the extent of methodological progress in economic analyses in patient safety. A broad search strategy with two core themes for original research (excluding opinion pieces and systematic reviews) in 'patient safety' and 'economic analyses' has been developed. Medline, Econlit and National Health Service Economic Evaluation Database bibliographic databases will be searched from January 2007 using a combination of medical subject headings terms and research-derived search terms (see table 1). The method is informed by previous reviews on this topic, published in 2012. Screening, risk of bias assessment (using the Cochrane collaboration tool) and economic evaluation quality assessment (using the Drummond checklist) will be conducted by two independent reviewers, with arbitration by a third reviewer as needed. Studies with a low risk of bias will be assessed using the Drummond checklist. High-quality economic evaluations are those that score >20/35. A qualitative synthesis of evidence will be performed using a data collection tool to capture the study design(s) employed, population(s), setting(s), disease area(s), intervention(s) and outcome(s) studied. Methodological quality scores will be compared with previous reviews where possible. Effect size(s) and estimate uncertainty will be captured and used in a quantitative synthesis of high-quality evidence, where possible. Formal ethical approval is not required as primary data will not be collected. The results will be disseminated through a peer

  17. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  18. The UNC/UMN Baby Connectome Project (BCP): An overview of the study design and protocol development.

    Science.gov (United States)

    Howell, Brittany R; Styner, Martin A; Gao, Wei; Yap, Pew-Thian; Wang, Li; Baluyot, Kristine; Yacoub, Essa; Chen, Geng; Potts, Taylor; Salzwedel, Andrew; Li, Gang; Gilmore, John H; Piven, Joseph; Smith, J Keith; Shen, Dinggang; Ugurbil, Kamil; Zhu, Hongtu; Lin, Weili; Elison, Jed T

    2018-03-22

    The human brain undergoes extensive and dynamic growth during the first years of life. The UNC/UMN Baby Connectome Project (BCP), one of the Lifespan Connectome Projects funded by NIH, is an ongoing study jointly conducted by investigators at the University of North Carolina at Chapel Hill and the University of Minnesota. The primary objective of the BCP is to characterize brain and behavioral development in typically developing infants across the first 5 years of life. The ultimate goals are to chart emerging patterns of structural and functional connectivity during this period, map brain-behavior associations, and establish a foundation from which to further explore trajectories of health and disease. To accomplish these goals, we are combining state of the art MRI acquisition and analysis techniques, including high-resolution structural MRI (T1-and T2-weighted images), diffusion imaging (dMRI), and resting state functional connectivity MRI (rfMRI). While the overall design of the BCP largely is built on the protocol developed by the Lifespan Human Connectome Project (HCP), given the unique age range of the BCP cohort, additional optimization of imaging parameters and consideration of an age appropriate battery of behavioral assessments were needed. Here we provide the overall study protocol, including approaches for subject recruitment, strategies for imaging typically developing children 0-5 years of age without sedation, imaging protocol and optimization, a description of the battery of behavioral assessments, and QA/QC procedures. Combining HCP inspired neuroimaging data with well-established behavioral assessments during this time period will yield an invaluable resource for the scientific community. Copyright © 2018 Elsevier Inc. All rights reserved.

  19. The design of maternal centered life-style modification program for weight gain management during pregnancy - a study protocol.

    Science.gov (United States)

    Farajzadegan, Ziba; Pozveh, Zahra Amini

    2013-08-01

    Abnormal weight gain during pregnancy increases the adverse health outcomes during the pregnancy, delivery, and the postpartum period. Most of the pregnant women develop weight gain more than the recommended limits; therefore, interventions to manage such disproportionate weight gain are needed. In this paper, the design of the maternal centered life-style intervention study is described, which focuses on controlling weight gaining during pregnancy for all body mass index (BMI) groups. In our randomized field trial, 160 pregnant women with 6-10 weeks of gestational age who visit one of the participating Isfahan four urban public-health centers and 4 private obstetric offices are included. The maternal centered life-style intervention carried out by trained midwives is standardized in a protocol. All the participants are visited at 6-10, 11-15, 16-20, 21-25, 26-30, 31-34, 35-37, 38, 39, and 40 weeks of pregnancy. The women who are randomized in the intervention group receive maternal centered educational package of prenatal care for the pregnant woman and a log book in the first visit. Counselors accompany the pregnant women to maintain or develop a healthy life-style. Data collection will perform monthly measuring body weight, BMI. Because, we don't have structured protocol for weight management during pregnancy especially, in private sectors if the maternal centered life-style intervention proves to be effective, it will be suggested to merge this package to routine care. Therewith by empowering women to manage their weight the public-health burden can be reduced. Beside that private obstetricians also have structured protocol for their client management.

  20. Variability of protein level and phosphorylation status caused by biopsy protocol design in human skeletal muscle analyses

    Directory of Open Access Journals (Sweden)

    Caron Marc-André

    2011-11-01

    Full Text Available Abstract Background Bergström needle biopsy is widely used to sample skeletal muscle in order to study cell signaling directly in human tissue. Consequences of the biopsy protocol design on muscle protein quantity and quality remain unclear. The aim of the present study was to assess the impact of different events surrounding biopsy protocol on the stability of the Western blot signal of eukaryotic translation initiation factor 4E binding protein 1 (4E-BP1, Akt, glycogen synthase kinase-3β (GSK-3β, muscle RING finger protein 1 (MuRF1 and p70 S6 kinase (p70 S6K. Six healthy subjects underwent four biopsies of the vastus lateralis, distributed into two distinct visits spaced by 48 hrs. At visit 1, a basal biopsy in the right leg was performed in the morning (R1 followed by a second in the left leg in the afternoon (AF. At visit 2, a second basal biopsy (R2 was collected from the right leg. Low intensity mobilization (3 × 20 right leg extensions was performed and a final biopsy (Mob was collected using the same incision site as R2. Results Akt and p70 S6K phosphorylation levels were increased by 83% when AF biopsy was compared to R1. Mob condition induced important phosphorylation of p70 S6K when compared to R2. Comparison of R1 and R2 biopsies revealed a relative stability of the signal for both total and phosphorylated proteins. Conclusions This study highlights the importance to standardize muscle biopsy protocols in order to minimize the method-induced variation when analyzing Western blot signals.

  1. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  2. Informal work and formal plans

    DEFF Research Database (Denmark)

    Dalsted, Rikke Juul; Hølge-Hazelton, Bibi; Kousgaard, Marius Brostrøm

    2012-01-01

    trajectories. METHODS AND THEORY: An in-depth case study of patient trajectories at a Danish hospital and surrounding municipality using individual interviews with patients. Theory about trajectory and work by Strauss was included. RESULTS: Patients continuously took initiatives to organize their treatment...... and care. They initiated processes in the trajectories, and acquired information, which they used to form their trajectories. Patients presented problems to the healthcare professionals in order to get proper help when needed. DISCUSSION: Work done by patients was invisible and not perceived as work....... The patients' requests were not sufficiently supported in the professional organisation of work or formal planning. Patients' insertion and use of information in their trajectories challenged professional views and working processes. And the design of the formal pathway models limits the patients' active...

  3. Critical formalism or digital biomorphology. The contemporary architecture formal dilema

    Directory of Open Access Journals (Sweden)

    Beatriz Villanueva Cajide

    2018-05-01

    Full Text Available With the dawn of digital media the architecture’s formal possibilities reached a level unknown before. The Guggenheim Museo branch in Bilbao appears in 1993 as the materialisation of the possibilities of the use of digital tools in architecture’s design, starting the development of a digital based architecture which currently has reached an exhaustion level that is evident in the repetition biomorphologic shapes emerged from the digital determinism to which some contemporary architectural practices have converged. While the digitalisation of the architectural process is irreversible and desirable, it is necessary to rethink the terms of this collaboration beyond the possibilities of the digital tools themselves. This article proposes to analyse seven texts written in the very moment when digitalisation became a real possibility, between Gehry’s conception of the Guggenheim Museum in 1992 and the Congress on Morphogenesis hold in the Architectural Association in 2004, in order to explore the possibility of reversing the process that has led to the formal exhaustion of digital architecture, from the acceptance of incorporating strategies coming from a contemporary critical formalism.

  4. Formalizing Probabilistic Safety Claims

    Science.gov (United States)

    Herencia-Zapana, Heber; Hagen, George E.; Narkawicz, Anthony J.

    2011-01-01

    A safety claim for a system is a statement that the system, which is subject to hazardous conditions, satisfies a given set of properties. Following work by John Rushby and Bev Littlewood, this paper presents a mathematical framework that can be used to state and formally prove probabilistic safety claims. It also enables hazardous conditions, their uncertainties, and their interactions to be integrated into the safety claim. This framework provides a formal description of the probabilistic composition of an arbitrary number of hazardous conditions and their effects on system behavior. An example is given of a probabilistic safety claim for a conflict detection algorithm for aircraft in a 2D airspace. The motivation for developing this mathematical framework is that it can be used in an automated theorem prover to formally verify safety claims.

  5. A Protocol for Bioinspired Design: A Ground Sampler Based on Sea Urchin Jaws

    Science.gov (United States)

    Frank, Michael B.; Naleway, Steven E.; Wirth, Taylor S.; Jung, Jae-Young; Cheung, Charlene L.; Loera, Faviola B.; Medina, Sandra; Sato, Kirk N.; Taylor, Jennifer R. A.; McKittrick, Joanna

    2016-01-01

    Bioinspired design is an emerging field that takes inspiration from nature to develop high-performance materials and devices. The sea urchin mouthpiece, known as the Aristotle's lantern, is a compelling source of bioinspiration with an intricate network of musculature and calcareous teeth that can scrape, cut, chew food and bore holes into rocky substrates. We describe the bioinspiration process as including animal observation, specimen characterization, device fabrication and mechanism bioexploration. The last step of bioexploration allows for a deeper understanding of the initial biology. The design architecture of the Aristotle's lantern is analyzed with micro-computed tomography and individual teeth are examined with scanning electron microscopy to identify the microstructure. Bioinspired designs are fabricated with a 3D printer, assembled and tested to determine the most efficient lantern opening and closing mechanism. Teeth from the bioinspired lantern design are bioexplored via finite element analysis to explain from a mechanical perspective why keeled tooth structures evolved in the modern sea urchins we observed. This circular approach allows for new conclusions to be drawn from biology and nature. PMID:27166636

  6. A Fully Automated Diabetes Prevention Program, Alive-PD: Program Design and Randomized Controlled Trial Protocol.

    Science.gov (United States)

    Block, Gladys; Azar, Kristen Mj; Block, Torin J; Romanelli, Robert J; Carpenter, Heather; Hopkins, Donald; Palaniappan, Latha; Block, Clifford H

    2015-01-21

    In the United States, 86 million adults have pre-diabetes. Evidence-based interventions that are both cost effective and widely scalable are needed to prevent diabetes. Our goal was to develop a fully automated diabetes prevention program and determine its effectiveness in a randomized controlled trial. Subjects with verified pre-diabetes were recruited to participate in a trial of the effectiveness of Alive-PD, a newly developed, 1-year, fully automated behavior change program delivered by email and Web. The program involves weekly tailored goal-setting, team-based and individual challenges, gamification, and other opportunities for interaction. An accompanying mobile phone app supports goal-setting and activity planning. For the trial, participants were randomized by computer algorithm to start the program immediately or after a 6-month delay. The primary outcome measures are change in HbA1c and fasting glucose from baseline to 6 months. The secondary outcome measures are change in HbA1c, glucose, lipids, body mass index (BMI), weight, waist circumference, and blood pressure at 3, 6, 9, and 12 months. Randomization and delivery of the intervention are independent of clinic staff, who are blinded to treatment assignment. Outcomes will be evaluated for the intention-to-treat and per-protocol populations. A total of 340 subjects with pre-diabetes were randomized to the intervention (n=164) or delayed-entry control group (n=176). Baseline characteristics were as follows: mean age 55 (SD 8.9); mean BMI 31.1 (SD 4.3); male 68.5%; mean fasting glucose 109.9 (SD 8.4) mg/dL; and mean HbA1c 5.6 (SD 0.3)%. Data collection and analysis are in progress. We hypothesize that participants in the intervention group will achieve statistically significant reductions in fasting glucose and HbA1c as compared to the control group at 6 months post baseline. The randomized trial will provide rigorous evidence regarding the efficacy of this Web- and Internet-based program in reducing or

  7. Flaws in current human training protocols for spontaneous Brain-Computer Interfaces: lessons learned from instructional design

    Directory of Open Access Journals (Sweden)

    Fabien eLotte

    2013-09-01

    Full Text Available While recent research on Brain-Computer Interfaces (BCI has highlighted their potential for many applications, they remain barely used outside laboratories. The main reason is their lack of robustness. Indeed, with current BCI, mental state recognition is usually slow and often incorrect. Spontaneous BCI (i.e., mental imagery-based BCI often rely on mutual learning efforts by the user and the machine, with BCI users learning to produce stable EEG patterns (spontaneous BCI control being widely acknowledged as a skill while the computer learns to automatically recognize these EEG patterns, using signal processing. Most research so far was focused on signal processing, mostly neglecting the human in the loop. However, how well the user masters the BCI skill is also a key element explaining BCI robustness. Indeed, if the user is not able to produce stable and distinct EEG patterns, then no signal processing algorithm would be able to recognize them. Unfortunately, despite the importance of BCI training protocols, they have been scarcely studied so far, and used mostly unchanged for years.In this paper, we advocate that current human training approaches for spontaneous BCI are most likely inappropriate. We notably study instructional design literature in order to identify the key requirements and guidelines for a successful training procedure that promotes a good and efficient skill learning. This literature study highlights that current spontaneous BCI user training procedures satisfy very few of these requirements and hence are likely to be suboptimal. We therefore identify the flaws in BCI training protocols according to instructional design principles, at several levels: in the instructions provided to the user, in the tasks he/she has to perform, and in the feedback provided. For each level, we propose new research directions that are theoretically expected to address some of these flaws and to help users learn the BCI skill more efficiently.

  8. A web-based computer-tailored smoking prevention programme for primary school children: intervention design and study protocol

    Science.gov (United States)

    2012-01-01

    Background Although the number of smokers has declined in the last decade, smoking is still a major health problem among youngsters and adolescents. For this reason, there is a need for effective smoking prevention programmes targeting primary school children. A web-based computer-tailored feedback programme may be an effective intervention to stimulate youngsters not to start smoking, and increase their knowledge about the adverse effects of smoking and their attitudes and self-efficacy regarding non-smoking. Methods & design This paper describes the development and evaluation protocol of a web-based out-of-school smoking prevention programme for primary school children (age 10-13 years) entitled ‘Fun without Smokes’. It is a transformation of a postal mailed intervention to a web-based intervention. Besides this transformation the effects of prompts will be examined. This web-based intervention will be evaluated in a 2-year cluster randomised controlled trial (c-RCT) with three study arms. An intervention and intervention + prompt condition will be evaluated for effects on smoking behaviour, compared with a no information control condition. Information about pupils’ smoking status and other factors related to smoking will be obtained using a web-based questionnaire. After completing the questionnaire pupils in both intervention conditions will receive three computer-tailored feedback letters in their personal e-mail box. Attitudes, social influences and self-efficacy expectations will be the content of these personalised feedback letters. Pupils in the intervention + prompt condition will - in addition to the personalised feedback letters - receive e-mail and SMS messages prompting them to revisit the ‘Fun without Smokes’ website. The main outcome measures will be ever smoking and the utilisation of the ‘Fun without Smokes’ website. Measurements will be carried out at baseline, 12 months and 24 months of follow-up. Discussion The present study

  9. A web-based computer-tailored smoking prevention programme for primary school children: intervention design and study protocol

    Directory of Open Access Journals (Sweden)

    Cremers Henricus-Paul

    2012-06-01

    Full Text Available Abstract Background Although the number of smokers has declined in the last decade, smoking is still a major health problem among youngsters and adolescents. For this reason, there is a need for effective smoking prevention programmes targeting primary school children. A web-based computer-tailored feedback programme may be an effective intervention to stimulate youngsters not to start smoking, and increase their knowledge about the adverse effects of smoking and their attitudes and self-efficacy regarding non-smoking. Methods & design This paper describes the development and evaluation protocol of a web-based out-of-school smoking prevention programme for primary school children (age 10-13 years entitled ‘Fun without Smokes’. It is a transformation of a postal mailed intervention to a web-based intervention. Besides this transformation the effects of prompts will be examined. This web-based intervention will be evaluated in a 2-year cluster randomised controlled trial (c-RCT with three study arms. An intervention and intervention + prompt condition will be evaluated for effects on smoking behaviour, compared with a no information control condition. Information about pupils’ smoking status and other factors related to smoking will be obtained using a web-based questionnaire. After completing the questionnaire pupils in both intervention conditions will receive three computer-tailored feedback letters in their personal e-mail box. Attitudes, social influences and self-efficacy expectations will be the content of these personalised feedback letters. Pupils in the intervention + prompt condition will - in addition to the personalised feedback letters - receive e-mail and SMS messages prompting them to revisit the ‘Fun without Smokes’ website. The main outcome measures will be ever smoking and the utilisation of the ‘Fun without Smokes’ website. Measurements will be carried out at baseline, 12 months and 24 months of follow

  10. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  11. User-centered design and the development of patient decision aids: protocol for a systematic review.

    Science.gov (United States)

    Witteman, Holly O; Dansokho, Selma Chipenda; Colquhoun, Heather; Coulter, Angela; Dugas, Michèle; Fagerlin, Angela; Giguere, Anik Mc; Glouberman, Sholom; Haslett, Lynne; Hoffman, Aubri; Ivers, Noah; Légaré, France; Légaré, Jean; Levin, Carrie; Lopez, Karli; Montori, Victor M; Provencher, Thierry; Renaud, Jean-Sébastien; Sparling, Kerri; Stacey, Dawn; Vaisson, Gratianne; Volk, Robert J; Witteman, William

    2015-01-26

    Providing patient-centered care requires that patients partner in their personal health-care decisions to the full extent desired. Patient decision aids facilitate processes of shared decision-making between patients and their clinicians by presenting relevant scientific information in balanced, understandable ways, helping clarify patients' goals, and guiding decision-making processes. Although international standards stipulate that patients and clinicians should be involved in decision aid development, little is known about how such involvement currently occurs, let alone best practices. This systematic review consisting of three interlinked subreviews seeks to describe current practices of user involvement in the development of patient decision aids, compare these to practices of user-centered design, and identify promising strategies. A research team that includes patient and clinician representatives, decision aid developers, and systematic review method experts will guide this review according to the Cochrane Handbook and PRISMA reporting guidelines. A medical librarian will hand search key references and use a peer-reviewed search strategy to search MEDLINE, EMBASE, PubMed, Web of Science, the Cochrane Library, the ACM library, IEEE Xplore, and Google Scholar. We will identify articles across all languages and years describing the development or evaluation of a patient decision aid, or the application of user-centered design or human-centered design to tools intended for patient use. Two independent reviewers will assess article eligibility and extract data into a matrix using a structured pilot-tested form based on a conceptual framework of user-centered design. We will synthesize evidence to describe how research teams have included users in their development process and compare these practices to user-centered design methods. If data permit, we will develop a measure of the user-centeredness of development processes and identify practices that are likely

  12. Fear of the Formal

    DEFF Research Database (Denmark)

    du Gay, Paul; Lopdrup-Hjorth, Thomas

    2016-01-01

    term this ‘fear of the formal’, outlining key elements of its genealogy and exploring its contemporary manifestation in relation to recent and ongoing reforms of organisational life in a range of contexts. At the same time, we seek to indicate the continuing constitutive significance of formality...

  13. Formalization of Medical Guidelines

    Czech Academy of Sciences Publication Activity Database

    Peleška, Jan; Anger, Z.; Buchtela, David; Šebesta, K.; Tomečková, Marie; Veselý, Arnošt; Zvára, K.; Zvárová, Jana

    2005-01-01

    Roč. 1, - (2005), s. 133-141 ISSN 1801-5603 R&D Projects: GA AV ČR 1ET200300413 Institutional research plan: CEZ:AV0Z10300504 Keywords : GLIF model * formalization of guidelines * prevention of cardiovascular diseases Subject RIV: IN - Informatics, Computer Science

  14. Readings in Formal Epistemology

    DEFF Research Database (Denmark)

    Formal epistemology’ is a term coined in the late 1990s for a new constellation of interests in philosophy,the roots of which are found in earlier works of epistemologists, philosophers of science, and logicians. It addresses a growing agenda of problems concerning knowledge, belief, certainty, ...

  15. Criteria for logical formalization

    Czech Academy of Sciences Publication Activity Database

    Peregrin, Jaroslav; Svoboda, Vladimír

    2013-01-01

    Roč. 190, č. 14 (2013), s. 2897-2924 ISSN 0039-7857 R&D Projects: GA ČR(CZ) GAP401/10/1279 Institutional support: RVO:67985955 Keywords : logic * logical form * formalization * reflective equilibrium Subject RIV: AA - Philosophy ; Religion Impact factor: 0.637, year: 2013

  16. IDEF3 Formalization Report

    Science.gov (United States)

    1991-10-01

    SUBJECT TERMS 15. NUMBER OF PAGES engineering management information systems method formalization 60 information engineering process modeling 16 PRICE...CODE information systems requirements definition methods knowlede acquisition methods systems engineering 17. SECURITY CLASSIFICATION ji. SECURITY... Management , Inc., Santa Monica, California. CORYNEN, G. C., 1975, A Mathematical Theory of Modeling and Simula- tion. Ph.D. Dissertation, Department

  17. The Benefits of Formalization

    DEFF Research Database (Denmark)

    Rand, John; Torm, Nina Elisabeth

    2012-01-01

    Based on unique panel data consisting of both formal and informal firms, this paper uses a matched double difference approach to examine the relationship between legal status and firm level outcomes in micro, small and medium manufacturing enterprises (SMEs) in Vietnam. Controlling for determinin...

  18. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  19. Co-Designing Mobile Apps to Assist in Clinical Nursing Education: A Study Protocol.

    Science.gov (United States)

    O'Connor, Siobhan; Andrews, Tom

    2016-01-01

    Mobile applications (apps) to train health professionals is gaining momentum as the benefits of mobile learning (mLearning) are becoming apparent in complex clinical environments. However, most educational apps are generic, off-the-shelf pieces of software that do not take into consideration the unique needs of nursing students. The proposed study will apply a user-centred design process to create a tailored mobile app for nursing students to learn and apply clinical skills in practice. The app will be piloted and evaluated to understand how nursing students use mobile technology in clinical settings to support their learning and educational needs.

  20. Alternate MIMO AF relaying networks with interference alignment: Spectral efficient protocol and linear filter design

    KAUST Repository

    Park, Kihong

    2013-02-01

    In this paper, we study a two-hop relaying network consisting of one source, one destination, and three amplify-and-forward (AF) relays with multiple antennas. To compensate for the capacity prelog factor loss of 1/2$ due to the half-duplex relaying, alternate transmission is performed among three relays, and the inter-relay interference due to the alternate relaying is aligned to make additional degrees of freedom. In addition, suboptimal linear filter designs at the nodes are proposed to maximize the achievable sum rate for different fading scenarios when the destination utilizes a minimum mean-square error filter. © 1967-2012 IEEE.

  1. Methods and Experimental Protocols to Design a Simulated Bio-Mimetic Quadruped Robot

    Directory of Open Access Journals (Sweden)

    Hadi El Daou

    2013-05-01

    Full Text Available Abstract This paper presents a bio-mimetic approach to design and simulate a tortoise-like virtual robot. This study takes a multidisciplinary approach: from in vivo and in vitro experiments on animals, data are collected and used to design, control and simulate a bio-mimetic virtual robot using MD ADAMS platform. From the in vitro experiments, the geometrical and inertial properties of body limbs are measured, and a model of tortoise kinematics is derived. From the in vivo experiments the contact forces between each limb and the ground are measured. The contributions of hind and forelimbs in the generation of propelling and braking forces are studied. The motion of the joints between limb segments are recorded and used to solve the inverse kinematics problem. A virtual model of a tortoise-like robot is built; it is a linkage of 15 rigid bodies articulated by 22 degrees of freedom. This model is referred to as TATOR II. It has the inertial and geometrical properties measured during the in vitro experiments. TATOR II motion is achieved using a Proportional-Derivative controller copying the joint angle trajectories calculated from the in vivo experiments.

  2. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due...

  3. Design and protocol of the weight loss lottery- a cluster randomized trial.

    Science.gov (United States)

    van der Swaluw, Koen; Lambooij, Mattijs S; Mathijssen, Jolanda J P; Schipper, Maarten; Zeelenberg, Marcel; Polder, Johan J; Prast, Henriëtte M

    2016-07-01

    People often intend to exercise but find it difficult to attend their gyms on a regular basis. At times, people seek and accept deadlines with consequences to realize their own goals (i.e. commitment devices). The aim of our cluster randomized controlled trial is to test whether a lottery-based commitment device can promote regular gym attendance. The winners of the lottery always get feedback on the outcome but can only claim their prize if they attended their gyms on a regular basis. In this paper we present the design and baseline characteristics of a three-arm trial which is performed with 163 overweight participants in six in-company fitness centers in the Netherlands. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. Design of ion-pump power supply control software system based on TCP/IP protocol

    International Nuclear Information System (INIS)

    Lin Feiyu; Huang Jijiang; Guo Yuhui; Fang Zheng; Wang Yanyu

    2009-01-01

    This paper discuss a Ion-pump Power Supply control system making use of RS232 series bus and Intranet. The system's hardware VAC800 is composed of MSP430F149 mixed-signal processors produced by TI and UA7000A network model. MSP430F149 has advantages of ultra-low-power and high-integration. The Ion-pump Power Supply control system has the characteristics of strong function, simple structure, high reliability, strong resistance of noise, no peripheral chip, etc. Visual studio 2005 is used to design the system's software. The Ion-pump Power supplier control system can remotely monitor and control Ion-pump Power Suppliers. (authors)

  5. DESIGN OF A DIDACTIC PROTOTYPE FOR WIRELESS SENSOR NETWORKS IMPLEMENTATION BASED IN ZIGBEE PROTOCOL

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez-Ayala

    2011-09-01

    Full Text Available The present work tries to describe the design and implementation of a didactic wireless data acquisition station (node with the capacity of net operation. Which nodes, are based in the Xbee wireless communication module of Digi International, which are capable of achieve long periods of autonomous energetic, approximately 30 months with just a simple 9 volts battery and under specific conditions of transference of data via RF.We think that the present work has a very important contribution and significant impact in the automation of processes of nature environment monitoring like ecological reserves, health of the forests, early forest fires detection, monitoring of the diverse variables of the sows in a greenhouse or out of them, monitoring and supervision of variables in shrimp and Tilapia farms in the region up to the energy save through the implementation of smart spaces and the demotic.

  6. Protocols for the in vitro design of animal articular cartilage based on tissue engineering methods

    Directory of Open Access Journals (Sweden)

    Diego Correa

    2002-01-01

    Full Text Available The articular cartilage is the structure that covers the joint ends. It has some specific tasks crucial to the correct joint physiology. It may experience a large amount of injuries that could generate considerable disabilities. Unfortunately its selfrepair capacity is too limited; therefore, many treatments have been developed with partial success, given the suboptimal biomechanical behavior of the resultant tissue. Given that, Tissue Engineering offers an alternative, based on the design of a new tissue with biological and biomechanical features which resembles the native tissue. In this work, the authors describe the methodologies followed to accomplish that goal, studying the chondrocytes harvesting, the cellular cultures, the scaffold seeding processes, the mechanical stimulation and the structural and biomechanical evaluation. Finally, exposed some of the preliminary results, as a experimental validation of the methods proposed are.

  7. Design of real-time voice over internet protocol system under bandwidth network

    Science.gov (United States)

    Zhang, Li; Gong, Lina

    2017-04-01

    With the increasing bandwidth of the network and network convergence accelerating, VoIP means of communication across the network is becoming increasingly popular phenomenon. The real-time identification and analysis for VOIP flow over backbone network become the urgent needs and research hotspot of network operations management. Based on this, the paper proposes a VoIP business management system over backbone network. The system first filters VoIP data stream over backbone network and further resolves the call signaling information and media voice. The system can also be able to design appropriate rules to complete real-time reduction and presentation of specific categories of calls. Experimental results show that the system can parse and process real-time backbone of the VoIP call, and the results are presented accurately in the management interface, VoIP-based network traffic management and maintenance provide the necessary technical support.

  8. Safer@home—Simulation and training: the study protocol of a qualitative action research design

    Science.gov (United States)

    Wiig, Siri; Guise, Veslemøy; Anderson, Janet; Storm, Marianne; Lunde Husebø, Anne Marie; Testad, Ingelin; Søyland, Elsa; Moltu, Kirsti L

    2014-01-01

    Introduction While it is predicted that telecare and other information and communication technology (ICT)-assisted services will have an increasingly important role in future healthcare services, their implementation in practice is complex. For implementation of telecare to be successful and ensure quality of care, sufficient training for staff (healthcare professionals) and service users (patients) is fundamental. Telecare training has been found to have positive effects on attitudes to, sustained use of, and outcomes associated with telecare. However, the potential contribution of training in the adoption, quality and safety of telecare services is an under-investigated research field. The overall aim of this study is to develop and evaluate simulation-based telecare training programmes to aid the use of videophone technology in elderly home care. Research-based training programmes will be designed for healthcare professionals, service users and next of kin, and the study will explore the impact of training on adoption, quality and safety of new telecare services. Methods and analysis The study has a qualitative action research design. The research will be undertaken in close collaboration with a multidisciplinary team consisting of researchers and managers and clinical representatives from healthcare services in two Norwegian municipalities, alongside experts in clinical education and simulation, as well as service user (patient) representatives. The qualitative methods used involve focus group interviews, semistructured interviews, observation and document analysis. To ensure trustworthiness in the data analysis, we will apply member checks and analyst triangulation; in addition to providing contextual and sample description to allow for evaluation of transferability of our results to other contexts and groups. Ethics and dissemination The study is approved by the Norwegian Social Science Data Services. The study is based on voluntary participation and informed

  9. WE-D-207-03: CT Protocols for Screening and the ACR Designated Lung Screening Program

    International Nuclear Information System (INIS)

    McNitt-Gray, M.

    2015-01-01

    implementing Lung Cancer Screening protocols for CT, including utilizing resources such as the AAPM Protocols and the ACR Designated Lung Screening Center program. UCLA Department of Radiology has an Institutional research agreement with Siemens Healthcare; Dr. McNitt-Gray has been a recipient of Research Support from Siemens Healthcare in the past. Dr. Aberle has been a Member of Advisory Boards for the LUNGevity Foundation (2011-present) and Siemens Medical Solutions. (2013)

  10. Caffeine increases anaerobic work and restores cycling performance following a protocol designed to lower endogenous carbohydrate availability.

    Directory of Open Access Journals (Sweden)

    Marcos David Silva-Cavalcante

    Full Text Available The purpose this study was to examine the effects of caffeine ingestion on performance and energy expenditure (anaerobic and aerobic contribution during a 4-km cycling time trial (TT performed after a carbohydrate (CHO availability-lowering exercise protocol. After preliminary and familiarization trials, seven amateur cyclists performed three 4-km cycling TT in a double-blind, randomized and crossover design. The trials were performed either after no previous exercise (CON, or after a CHO availability-lowering exercise protocol (DEP performed in the previous evening, followed by either placebo (DEP-PLA or 5 mg.kg(-1 of caffeine intake (DEP-CAF 1 hour before the trial. Performance was reduced (-2.1% in DEP-PLA vs CON (421.0±12.3 vs 412.4±9.7 s. However, performance was restored in DEP-CAF (404.6±17.1 s compared with DEP-PLA, while no differences were found between DEP-CAF and CON. The anaerobic contribution was increased in DEP-CAF compared with both DEP-PLA and CON (67.4±14.91, 47. 3±14.6 and 55.3±14.0 W, respectively, and this was more pronounced in the first 3 km of the trial. Similarly, total anaerobic work was higher in DEP-CAF than in the other conditions. The integrated electromyographic activity, plasma lactate concentration, oxygen uptake, aerobic contribution and total aerobic work were not different between the conditions. The reduction in performance associated with low CHO availability is reversed with caffeine ingestion due to a higher anaerobic contribution, suggesting that caffeine could access an anaerobic "reserve" that is not used under normal conditions.

  11. Caffeine Increases Anaerobic Work and Restores Cycling Performance following a Protocol Designed to Lower Endogenous Carbohydrate Availability

    Science.gov (United States)

    Silva-Cavalcante, Marcos David; Correia-Oliveira, Carlos Rafaell; Santos, Ralmony Alcantara; Lopes-Silva, João Paulo; Lima, Hessel Marani; Bertuzzi, Romulo; Duarte, Marcos; Bishop, David John; Lima-Silva, Adriano Eduardo

    2013-01-01

    The purpose this study was to examine the effects of caffeine ingestion on performance and energy expenditure (anaerobic and aerobic contribution) during a 4-km cycling time trial (TT) performed after a carbohydrate (CHO) availability-lowering exercise protocol. After preliminary and familiarization trials, seven amateur cyclists performed three 4-km cycling TT in a double-blind, randomized and crossover design. The trials were performed either after no previous exercise (CON), or after a CHO availability-lowering exercise protocol (DEP) performed in the previous evening, followed by either placebo (DEP-PLA) or 5 mg.kg−1 of caffeine intake (DEP-CAF) 1 hour before the trial. Performance was reduced (−2.1%) in DEP-PLA vs CON (421.0±12.3 vs 412.4±9.7 s). However, performance was restored in DEP-CAF (404.6±17.1 s) compared with DEP-PLA, while no differences were found between DEP-CAF and CON. The anaerobic contribution was increased in DEP-CAF compared with both DEP-PLA and CON (67.4±14.91, 47. 3±14.6 and 55.3±14.0 W, respectively), and this was more pronounced in the first 3 km of the trial. Similarly, total anaerobic work was higher in DEP-CAF than in the other conditions. The integrated electromyographic activity, plasma lactate concentration, oxygen uptake, aerobic contribution and total aerobic work were not different between the conditions. The reduction in performance associated with low CHO availability is reversed with caffeine ingestion due to a higher anaerobic contribution, suggesting that caffeine could access an anaerobic “reserve” that is not used under normal conditions. PMID:23977198

  12. Protocol of the Definition for the Assessment of Time-to-event Endpoints in CANcer trials (DATECAN) project: formal consensus method for the development of guidelines for standardised time-to-event endpoints' definitions in cancer clinical trials.

    Science.gov (United States)

    Bellera, Carine A; Pulido, Marina; Gourgou, Sophie; Collette, Laurence; Doussau, Adélaïde; Kramar, Andrew; Dabakuyo, Tienhan Sandrine; Ouali, Monia; Auperin, Anne; Filleron, Thomas; Fortpied, Catherine; Le Tourneau, Christophe; Paoletti, Xavier; Mauer, Murielle; Mathoulin-Pélissier, Simone; Bonnetain, Franck

    2013-03-01

    In randomised phase III cancer clinical trials, the most objectively defined and only validated time-to-event endpoint is overall survival (OS). The appearance of new types of treatments and the multiplication of lines of treatment have resulted in the use of surrogate endpoints for overall survival such as progression-free survival (PFS), or time-to-treatment failure. Their development is strongly influenced by the necessity of reducing clinical trial duration, cost and number of patients. However, while these endpoints are frequently used, they are often poorly defined and definitions can differ between trials which may limit their use as primary endpoints. Moreover, this variability of definitions can impact on the trial's results by affecting estimation of treatments' effects. The aim of the Definition for the Assessment of Time-to-event Endpoints in CANcer trials (DATECAN) project is to provide recommendations for standardised definitions of time-to-event endpoints in randomised cancer clinical trials. We will use a formal consensus methodology based on experts' opinions which will be obtained in a systematic manner. Definitions will be independently developed for several cancer sites, including pancreatic, breast, head and neck and colon cancer, as well as sarcomas and gastrointestinal stromal tumours (GISTs). The DATECAN project should lead to the elaboration of recommendations that can then be used as guidelines by researchers participating in clinical trials. This process should lead to a standardisation of the definitions of commonly used time-to-event endpoints, enabling appropriate comparisons of future trials' results. Copyright © 2012 Elsevier Ltd. All rights reserved.

  13. A Nutrition Education Intervention Trial for Adolescent Girls in Isfahan: Study Design and Protocol

    Directory of Open Access Journals (Sweden)

    Morvarid Ghasab Shirazi

    2016-11-01

    Full Text Available BackgroundNutrition behaviors of adolescent girls is of serious health concerns. Although nutrition education interventions in Iran have met with some success, most of them could not promote nutrition behavioral changes. The aim of our study is to determine a school-based nutrition education intervention to improve adolescents’ nutrition behaviors and behavioral mediators based on the social cognitive theory (SCT.Materials and MethodsThis study is a single-blind randomized controlled trial. Eligible participants will be all student girls in grade 6 and 7, their parents and teachers in Isfahan governmental schools. This multi com­ponent school-based intervention include adolescents’ nutrition education package, parents’ nutrition massages, participatory homework, parents and teachers nutrition education package, supportive group, and collaboration with decision makers. Changing in nutrition behaviors including breakfast, fruit and vegetable, snack and fast food consumption will be examined, as primary outcome. Secondary outcome will be behavioral mediators such as knowledge, self-efficacy, intention, situation, self-regulation, social support, outcome expectations and expectancies, in adolescent girls. The outcomes will be assessed at baseline, and after 3 and 6-month follow-up.DiscussionThis study evaluates a school-based, guided SCT intervention, designed to improve healthy dietary behaviors, nutrition knowledge of adolescent girls. Few behavioral interventions have targeted this high-risk population in Iran. The intervention seems to be promising and has the potential to bridge the gap of the limited program outcomes of nutrition education in Iranian adolescents.

  14. Design and protocol of a randomized multiple behavior change trial: Make Better Choices 2 (MBC2).

    Science.gov (United States)

    Pellegrini, Christine A; Steglitz, Jeremy; Johnston, Winter; Warnick, Jennifer; Adams, Tiara; McFadden, H G; Siddique, Juned; Hedeker, Donald; Spring, Bonnie

    2015-03-01

    Suboptimal diet and inactive lifestyle are among the most prevalent preventable causes of premature death. Interventions that target multiple behaviors are potentially efficient; however the optimal way to initiate and maintain multiple health behavior changes is unknown. The Make Better Choices 2 (MBC2) trial aims to examine whether sustained healthful diet and activity change are best achieved by targeting diet and activity behaviors simultaneously or sequentially. Study design approximately 250 inactive adults with poor quality diet will be randomized to 3 conditions examining the best way to prescribe healthy diet and activity change. The 3 intervention conditions prescribe: 1) an increase in fruit and vegetable consumption (F/V+), decrease in sedentary leisure screen time (Sed-), and increase in physical activity (PA+) simultaneously (Simultaneous); 2) F/V+ and Sed- first, and then sequentially add PA+ (Sequential); or 3) Stress Management Control that addresses stress, relaxation, and sleep. All participants will receive a smartphone application to self-monitor behaviors and regular coaching calls to help facilitate behavior change during the 9 month intervention. Healthy lifestyle change in fruit/vegetable and saturated fat intakes, sedentary leisure screen time, and physical activity will be assessed at 3, 6, and 9 months. MBC2 is a randomized m-Health intervention examining methods to maximize initiation and maintenance of multiple healthful behavior changes. Results from this trial will provide insight about an optimal technology supported approach to promote improvement in diet and physical activity. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. Code Generation for Protocols from CPN models Annotated with Pragmatics

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    software implementation satisfies the properties verified for the model. Coloured Petri Nets (CPNs) have been widely used to model and verify protocol software, but limited work exists on using CPN models of protocol software as a basis for automated code generation. In this report, we present an approach...... modelling languages, MDE further has the advantage that models are amenable to model checking which allows key behavioural properties of the software design to be verified. The combination of formally verified models and automated code generation contributes to a high degree of assurance that the resulting...... for generating protocol software from a restricted class of CPN models. The class of CPN models considered aims at being descriptive in that the models are intended to be helpful in understanding and conveying the operation of the protocol. At the same time, a descriptive model is close to a verifiable version...

  16. Formal methods for industrial critical systems a survey of applications

    CERN Document Server

    Margaria-Steffen, Tiziana

    2012-01-01

    "Today, formal methods are widely recognized as an essential step in the design process of industrial safety-critical systems. In its more general definition, the term formal methods encompasses all notations having a precise mathematical semantics, together with their associated analysis methods, that allow description and reasoning about the behavior of a system in a formal manner.Growing out of more than a decade of award-winning collaborative work within the European Research Consortium for Informatics and Mathematics, Formal Methods for Industrial Critical Systems: A Survey of Applications presents a number of mainstream formal methods currently used for designing industrial critical systems, with a focus on model checking. The purpose of the book is threefold: to reduce the effort required to learn formal methods, which has been a major drawback for their industrial dissemination; to help designers to adopt the formal methods which are most appropriate for their systems; and to offer a panel of state-of...

  17. The Depression in Visual Impairment Trial (DEPVIT: trial design and protocol

    Directory of Open Access Journals (Sweden)

    Margrain Tom H

    2012-07-01

    Full Text Available Abstract Background The prevalence of depression in people with a visual disability is high but screening for depression and referral for treatment is not yet an integral part of visual rehabilitation service provision. One reason for this may be that there is no good evidence about the effectiveness of treatments in this patient group. This study is the first to evaluate the effect of depression treatments on people with a visual impairment and co morbid depression. Methods /design The study is an exploratory, multicentre, individually randomised waiting list controlled trial. Participants will be randomised to receive Problem Solving Therapy (PST, a ‘referral to the GP’ requesting treatment according to the NICE’s ‘stepped care’ recommendations or the waiting list arm of the trial. The primary outcome measure is change (from randomisation in depressive symptoms as measured by the Beck’s Depression Inventory (BDI-II at 6 months. Secondary outcomes include change in depressive symptoms at 3 months, change in visual function as measured with the near vision subscale of the VFQ-48 and 7 item NEI-VFQ at 3 and 6 months, change in generic health related quality of life (EQ5D, the costs associated with PST, estimates of incremental cost effectiveness, and recruitment rate estimation. Discussion Depression is prevalent in people with disabling visual impairment. This exploratory study will establish depression screening and referral for treatment in visual rehabilitation clinics in the UK. It will be the first to explore the efficacy of PST and the effectiveness of NICE’s ‘stepped care’ approach to the treatment of depression in people with a visual impairment. Trial registration ISRCTN46824140

  18. Social media for health promotion in diabetes: study protocol for a participatory public health intervention design.

    Science.gov (United States)

    Gabarron, E; Bradway, M; Fernandez-Luque, L; Chomutare, T; Hansen, A H; Wynn, R; Årsand, E

    2018-06-05

    Participatory health approaches are increasingly drawing attention among the scientific community, and could be used for health promotion programmes on diabetes through social media. The main aim of this project is to research how to best use social media to promote healthy lifestyles with and within the Norwegian population. The design of the health promotion intervention (HPI) will be participatory, and will involve both a panel of healthcare experts and social media users following the Norwegian Diabetes Association. The panel of experts will agree on the contents by following the Delphi method, and social media users will participate in the definition of the HPI by expressing their opinions through an adhoc online questionnaire. The agreed contents between both parties to be used in the HPI will be posted on three social media channels (Facebook, Twitter and Instagram) along 24 months. The 3 months before starting the HPI, and the 3 months after the HPI will be used as control data. The effect of the HPI will be assessed by comparing formats, frequency, and reactions to the published HPI messages, as well as comparing potential changes in five support-intended communication behaviours expressed on social media, and variations in sentiment analysis before vs during and after the HPI. The HPI's effect on social media users' health-related lifestyles, online health behaviours, and satisfaction with the intervention will be assessed every 6 months through online questionnaires. A separate questionnaire will be used to assess the panel of experts' satisfaction and perceptions of the benefits for health professionals of a HPI as this one. The time constraints of today's medical practice combined with the piling demand of chronic conditions such as diabetes make any additional request of extra time used by health care professionals a challenge. Social media channels provide efficient, ubiquitous and user-friendly platforms that can encourage participation

  19. Design and protocol for the Dialysis Optimal Health Program (DOHP) randomised controlled trial.

    Science.gov (United States)

    Knowles, Simon R; Ski, Chantal F; Langham, Robyn; O'Flaherty, Emmet; Thompson, David R; Rossell, Susan L; Moore, Gaye; Hsueh, Ya-Seng Arthur; Castle, David J

    2016-09-09

    Chronic kidney disease (CKD) and end-stage kidney disease (ESKD) are serious and growing health problems with enormous impact on psychological and social functioning. Despite high rates of comorbid depression and anxiety in these patient populations, and the adverse impact these have upon treatment adherence, quality of life, social connectedness and healthcare costs there has been little attention focused on the prevention or management of these problems. Thus, our aim was to evaluate the Dialysis Optimal Health Program (DOHP) that adopts a person-centred approach and engages collaborative therapy to educate and support those diagnosed with ESKD who are commencing dialysis. The study design is a randomised controlled trial. Ninety-six adult patients initiating haemodialysis or peritoneal dialysis will be randomly allocated to either the intervention (DOHP) or usual care group. Participants receiving the intervention will receive nine (8 + 1 booster session) sequential sessions based on a structured information/workbook, psychosocial and educational supports and skills building. The primary outcome measures are depression and anxiety (assessed by the Hospital Anxiety and Depression Scale; HADS). Secondary outcomes include health-related quality of life (assessed by the Kidney Disease Quality of Life instrument; KDQOL), self-efficacy (assessed by General Self-Efficacy Scale) and clinical indices (e.g. albumin and haemoglobin levels). Cost-effectiveness analysis and process evaluation will also be performed to assess the economic value and efficacy of the DOHP. Primary and secondary measures will be collected at baseline and at 3-, 6-, and 12-month follow-up time points. We believe that this innovative trial will enhance knowledge of interventions aimed at supporting patients in the process of starting dialysis, and will broaden the focus from physical symptoms to include psychosocial factors such as depression, anxiety, self-efficacy, wellbeing and community

  20. What makes industries believe in formal methods

    NARCIS (Netherlands)

    Vissers, C.A.; van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Danthine, A.S.; Leduc, G.; Wolper, P.

    1993-01-01

    The introduction of formal methods in the design and development departments of an industrial company has far reaching and long lasting consequences. In fact it changes the whole environment of methods, tools and skills that determine the design culture of that company. A decision to replace current

  1. Formalisms for reuse and systems integration

    CERN Document Server

    Rubin, Stuart

    2015-01-01

    Reuse and integration are defined as synergistic concepts, where reuse addresses how to minimize redundancy in the creation of components; while, integration focuses on component composition. Integration supports reuse and vice versa. These related concepts support the design of software and systems for maximizing performance while minimizing cost. Knowledge, like data, is subject to reuse; and, each can be interpreted as the other. This means that inherent complexity, a measure of the potential utility of a system, is directly proportional to the extent to which it maximizes reuse and integration. Formal methods can provide an appropriate context for the rigorous handling of these synergistic concepts. Furthermore, formal languages allow for non ambiguous model specification; and, formal verification techniques provide support for insuring the validity of reuse and integration mechanisms.   This edited book includes 12 high quality research papers written by experts in formal aspects of reuse and integratio...

  2. Safe bunker designing for the 18 MV Varian 2100 Clinac: a comparison between Monte Carlo simulation based upon data and new protocol recommendations.

    Science.gov (United States)

    Beigi, Manije; Afarande, Fatemeh; Ghiasi, Hosein

    2016-01-01

    The aim of this study was to compare two bunkers designed by only protocols recommendations and Monte Carlo (MC) based upon data derived for an 18 MV Varian 2100Clinac accelerator. High energy radiation therapy is associated with fast and thermal photoneutrons. Adequate shielding against the contaminant neutron has been recommended by IAEA and NCRP new protocols. The latest protocols released by the IAEA (safety report No. 47) and NCRP report No. 151 were used for the bunker designing calculations. MC method based upon data was also derived. Two bunkers using protocols and MC upon data were designed and discussed. From designed door's thickness, the door designed by the MC simulation and Wu-McGinley analytical method was closer in both BPE and lead thickness. In the case of the primary and secondary barriers, MC simulation resulted in 440.11 mm for the ordinary concrete, total concrete thickness of 1709 mm was required. Calculating the same parameters value with the recommended analytical methods resulted in 1762 mm for the required thickness using 445 mm as recommended by TVL for the concrete. Additionally, for the secondary barrier the thickness of 752.05 mm was obtained. Our results showed MC simulation and the followed protocols recommendations in dose calculation are in good agreement in the radiation contamination dose calculation. Difference between the two analytical and MC simulation methods revealed that the application of only one method for the bunker design may lead to underestimation or overestimation in dose and shielding calculations.

  3. Formal modeling of virtual machines

    Science.gov (United States)

    Cremers, A. B.; Hibbard, T. N.

    1978-01-01

    Systematic software design can be based on the development of a 'hierarchy of virtual machines', each representing a 'level of abstraction' of the design process. The reported investigation presents the concept of 'data space' as a formal model for virtual machines. The presented model of a data space combines the notions of data type and mathematical machine to express the close interaction between data and control structures which takes place in a virtual machine. One of the main objectives of the investigation is to show that control-independent data type implementation is only of limited usefulness as an isolated tool of program development, and that the representation of data is generally dictated by the control context of a virtual machine. As a second objective, a better understanding is to be developed of virtual machine state structures than was heretofore provided by the view of the state space as a Cartesian product.

  4. An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study

    Science.gov (United States)

    Perigo, Levi

    2013-01-01

    In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…

  5. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  6. Cognitive Protocol Stack Design

    Science.gov (United States)

    2015-12-30

    an active shooter drill, a science festival scenario, and an emergency response drill involving a simulated dirty bomb attack. The network behavior...operations and provide Internet connectivity to attendees of the science festival . Our passive network measurements provided valuable insights to configure...motivated by the amount of traffic which is increasing dramatically: social media has driven the spread of file sharing (photos, music , and video), while

  7. Formalizing the concept of sound.

    Energy Technology Data Exchange (ETDEWEB)

    Kaper, H. G.; Tipei, S.

    1999-08-03

    The notion of formalized music implies that a musical composition can be described in mathematical terms. In this article we explore some formal aspects of music and propose a framework for an abstract approach.

  8. Formal Analysis of Domain Models

    National Research Council Canada - National Science Library

    Bharadwaj, Ramesh

    2002-01-01

    Recently, there has been a great deal of interest in the application of formal methods, in particular, precise formal notations and automatic analysis tools for the creation and analysis of requirements specifications (i.e...

  9. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  10. Formalization of Database Systems -- and a Formal Definition of {IMS}

    DEFF Research Database (Denmark)

    Bjørner, Dines; Løvengreen, Hans Henrik

    1982-01-01

    Drawing upon an analogy between Programming Language Systems and Database Systems we outline the requirements that architectural specifications of database systems must futfitl, and argue that only formal, mathematical definitions may 6atisfy these. Then we illustrate home aspects and touch upon...... come ueee of formal definitions of data models and databaee management systems. A formal model of INS will carry this discussion. Finally we survey some of the exkting literature on formal definitions of database systems. The emphasis will be on constructive definitions in the denotationul semantics...... style of the VCM: Vienna Development Nethd. The role of formal definitions in international standardiaation efforts is briefly mentioned....

  11. Canonical formalism for relativistic dynamics

    International Nuclear Information System (INIS)

    Penafiel-Nava, V.M.

    1982-01-01

    The possibility of a canonical formalism appropriate for a dynamical theory of isolated relativistic multiparticle systems involving scalar interactions is studied. It is shown that a single time-parameter structure satisfying the requirements of Poincare invariance and simultaneity of the constituents (global tranversality) can not be derived from a homogeneous Lagrangian. The dynamics is deduced initially from a non-homogeneous but singular Lagrangian designed to accommodate the global tranversality constraints with the equaltime plane associated to the total momentum of the system. An equivalent standard Lagrangian is used to generalize the parametrization procedure which is referred to an arbitrary geodesic in Minkowski space. The equations of motion and the definition of center of momentum are invariant with respect to the choice of geodesic and the entire formalism becomes separable. In the original 8N-dimensional phase-space, the symmetries of the Lagrangian give rise to a canonical realization of a fifteen-generator Lie algebra which is projected in the 6N dimensional hypersurface of dynamical motions. The time-component of the total momentum is thus reduced to a neutral element and the canonical Hamiltonian survives as the only generator for time-translations so that the no-interaction theorem becomes inapplicable

  12. Topical Roots of Formal Dialectic

    NARCIS (Netherlands)

    Krabbe, Erik C. W.

    Formal dialectic has its roots in ancient dialectic. We can trace this influence in Charles Hamblin's book on fallacies, in which he introduced his first formal dialectical systems. Earlier, Paul Lorenzen proposed systems of dialogical logic, which were in fact formal dialectical systems avant la

  13. Peer support for family carers of people with dementia, alone or in combination with group reminiscence in a factorial design: study protocol for a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Wenborn Jennifer

    2011-09-01

    Full Text Available Abstract Background Peer support interventions can improve carer wellbeing and interventions that engage both the carer and person with dementia can have significant mutual benefits. Existing research has been criticised for inadequate rigour of design or reporting. This paper describes the protocol for a complex trial that evaluates one-to-one peer support and a group reminiscence programme, both separately and together, in a factorial design. Design A 2 × 2 factorial multi-site randomised controlled trial of individual peer support and group reminiscence interventions for family carers and people with dementia in community settings in England, addressing both effectiveness and cost-effectiveness. Discussion The methods described in this protocol have implications for research into psychosocial interventions, particularly complex interventions seeking to test both individual and group approaches. Trial Registration ISRCTN37956201

  14. Formal description of the OSI session layer: introduction

    NARCIS (Netherlands)

    Ajubi, I.; Scollo, Giuseppe; van Sinderen, Marten J.; van Eijk, P.H.J.; Vissers, C.A.; Diaz, M.

    1989-01-01

    The LOTOS formal description of the OSI session layer is introduced with the purpose of familiarizing the reader with the design choices that influenced the development of the formal description. Such design choices concern the adoptation of specification styles and the reflection of elements of the

  15. Botulinum toxin type a injections for cervical and shoulder girdle myofascial pain using an enriched protocol design.

    Science.gov (United States)

    Nicol, Andrea L; Wu, Irene I; Ferrante, F Michael

    2014-06-01

    Myofascial pain syndrome is a regional condition of muscle pain and stiffness and is classically characterized by the presence of trigger points in affected musculature. Botulinum toxin type A (BoNT-A) has been shown to have antinociceptive properties and elicit sustained muscle relaxation, thereby possibly affording even greater relief than traditional strategies. Our goal was to determine whether direct injection of BoNT-A into painful muscle groups is effective for cervical and shoulder girdle myofascial pain. An enriched protocol design was used, wherein 114 patients with cervical and shoulder girdle myofascial pain underwent injection of BoNT-A to determine their response to the drug. Fifty-four responders were then enrolled in a 12-week, randomized, double-blind, placebo-controlled trial. Pain scales and quality of life measures were assessed at baseline and at routine follow-up visits until completion of the study after 26 weeks. Injection of BoNT-A into painful muscle groups improved average visual numerical pain scores in subjects who received a second dose of BoNT-A compared to placebo (P = 0.019 [0.26, 2.78]). Subjects who received a second dose of BoNT-A had a reduced number of headaches per week (P = 0.04 [0.07, 4.55]). Brief Pain Inventory interference scores for general activity and sleep were improved (P = 0.046 [0.038, 3.700] and 0.02 [0.37, 4.33], respectively) in those who received a second dose of BoNT-A. BoNT-A injected directly into painful muscle groups improves average pain scores and certain aspects of quality of life in patients experiencing severe cervical and shoulder girdle myofascial pain.

  16. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  17. Formal aspects of resilience

    Directory of Open Access Journals (Sweden)

    Diana-Maria Drigă

    2015-12-01

    Full Text Available The concept of resilience has represented during the recent years a leading concern both in Romania, within the European Union and worldwide. Specialists in economics, management, finance, legal sciences, political sciences, sociology, psychology, grant a particular interest to this concept. Multidisciplinary research of resilience has materialized throughout the time in multiple conceptualizations and theorizing, but without being a consensus between specialists in terms of content, specificity and scope. Through this paper it is intended to clarify the concept of resilience, achieving an exploration of the evolution of this concept in ecological, social and economic environment. At the same time, the paper presents aspects of feedback mechanisms and proposes a formalization of resilience using the logic and mathematical analysis.

  18. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  19. Intraarticular Facet Injections for Low Back Pain: Design Considerations, Consensus Methodology to Develop the Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Mars, Tom; Ellard, David R; Antrobus, James H L; Cairns, Melinda; Underwood, Martin; Haywood, Kirstie; Keohane, Susie; Sandhu, Harbinder; Griffiths, Frances

    2015-01-01

    Since the publication of guidelines by the UK National Institute for Health and Care Excellence (NICE) and the American Pain Society guidelines for low back pain in 2009 there have been deep divisions in the pain treatment community about the use of therapeutic intraarticular facet joint injections. While evidence for the effectiveness or not of intraarticular facet joint injections remains sparse, uncertainty will remain. The Warwick feasibility study, along with a concurrent study with a different design led by another group, aims to provide a stable platform from which the effectiveness and cost effectiveness of intraarticular facet joint injections added to normal care could be evaluated in randomized controlled trials (RCTs). To reach consensus on key design considerations for the Warwick facet feasibility study from which the study protocol and working manuals will be developed. A consensus conference involving expert professionals and lay members. Preliminary work identified 5 key design considerations for deliberation at our consensus conference. Three concerned patient assessment and treatment: diagnosis of possible facet joint pain, interaarticular facet joint injection technique, and best usual care. Two concerned trial analysis: a priori sub-groups and minimally important difference and are reported elsewhere. We did systematic evidence reviews of the design considerations and summarized the evidence. Our design questions and evidence summaries were distributed to all delegates. This formed the basis for discussions on the day. Clinical experts in all aspects of facet joint injection from across the UK along with lay people were invited via relevant organizations. Nominal group technique was used in 15 facilitated initial small group discussions. Further discussion and ranking was undertaken in plenary. All small group and plenary results were recorded and checked and verified post conference. Where necessary participants were contacted via email to

  20. Rationale, design, and protocol for the prevention of low back pain in the military (POLM trial (NCT00373009

    Directory of Open Access Journals (Sweden)

    Dugan Jessica L

    2007-09-01

    . Soldiers will receive a monthly email that queries whether any LBP was experienced in the previous calendar month. Soldiers reporting LBP will enter episode-specific data related to pain intensity, pain-related disability, fear-avoidance beliefs, and pain catastrophizing. We are hypothesizing that Soldiers receiving the CSEP and PSEP will report the longest duration to first episode of LBP, the lowest frequency of LBP, and the lowest severity of LBP episodes. Statistical comparisons will be made between each of the randomly assigned prevention programs to test our hypotheses related to determining which of the 4 programs is most effective. Discussion We have presented the design and protocol for the POLM trial. Completion of this trial will provide important information on how to effectively train Soldiers for the prevention of LBP. Trial registration NCT00373009

  1. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    Science.gov (United States)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  2. Educational attainment, formal employment and contraceptives ...

    African Journals Online (AJOL)

    Based on this, the study examines educational attainment, formal employment and contraceptives practices among working women in Lagos State University. Survey design was adopted for the study. Using Stratified and simple random sampling techniques, quantitative data was gathered through the administration of ...

  3. Simulation and formal analysis of visual attention

    NARCIS (Netherlands)

    Bosse, T.; Maanen, P.P. van; Treur, J.

    2009-01-01

    In this paper a simulation model for visual attention is discussed and formally analysed. The model is part of the design of an agent-based system that supports a naval officer in its task to compile a tactical picture of the situation in the field. A case study is described in which the model is

  4. Informal and Formal Learning of General Practitioners

    Science.gov (United States)

    Spaan, Nadia Roos; Dekker, Anne R. J.; van der Velden, Alike W.; de Groot, Esther

    2016-01-01

    Purpose: The purpose of this study is to understand the influence of formal learning from a web-based training and informal (workplace) learning afterwards on the behaviour of general practitioners (GPs) with respect to prescription of antibiotics. Design/methodology/approach: To obtain insight in various learning processes, semi-structured…

  5. Informal and formal learning of general practitioners

    NARCIS (Netherlands)

    Spaan, Nadia Roos; Dekker, Anne R. J.; van der Velden, Alike W.; de Groot, Esther

    2016-01-01

    Purpose The purpose of this study is to understand the influence of formal learning from a web-based training and informal (workplace) learning afterwards on the behaviour of general practitioners (GPs) with respect to prescription of antibiotics. Design/methodology/approach To obtain insight in

  6. Formal Method of Description Supporting Portfolio Assessment

    Science.gov (United States)

    Morimoto, Yasuhiko; Ueno, Maomi; Kikukawa, Isao; Yokoyama, Setsuo; Miyadera, Youzou

    2006-01-01

    Teachers need to assess learner portfolios in the field of education. However, they need support in the process of designing and practicing what kind of portfolios are to be assessed. To solve the problem, a formal method of describing the relations between the lesson forms and portfolios that need to be collected and the relations between…

  7. Toward a bioethical framework for antibiotic use, antimicrobial resistance and for empirically designing ethically robust strategies to protect human health: a research protocol.

    Science.gov (United States)

    Hernández-Marrero, Pablo; Martins Pereira, Sandra; de Sá Brandão, Patrícia Joana; Araújo, Joana; Carvalho, Ana Sofia

    2017-12-01

    Introduction Antimicrobial resistance (AMR) is a challenging global and public health issue, raising bioethical challenges, considerations and strategies. Objectives This research protocol presents a conceptual model leading to formulating an empirically based bioethics framework for antibiotic use, AMR and designing ethically robust strategies to protect human health. Methods Mixed methods research will be used and operationalized into five substudies. The bioethical framework will encompass and integrate two theoretical models: global bioethics and ethical decision-making. Results Being a study protocol, this article reports on planned and ongoing research. Conclusions Based on data collection, future findings and using a comprehensive, integrative, evidence-based approach, a step-by-step bioethical framework will be developed for (i) responsible use of antibiotics in healthcare and (ii) design of strategies to decrease AMR. This will entail the analysis and interpretation of approaches from several bioethical theories, including deontological and consequentialist approaches, and the implications of uncertainty to these approaches.

  8. Design and implementation of a telemedicine system using Bluetooth protocol and GSM/GPRS network, for real time remote patient monitoring.

    Science.gov (United States)

    Jasemian, Yousef; Nielsen, Lars Arendt

    2005-01-01

    This paper introduces the design and implementation of a generic wireless and Real-time Multi-purpose Health Care Telemedicine system applying Bluetooth protocol, Global System for Mobile Communications (GSM) and General Packet Radio Service (GPRS). The paper explores the factors that should be considered when evaluating different technologies for application in telemedicine system. The design and implementation of an embedded wireless communication platform utilising Bluetooth protocol is described, and the implementation problems and limitations are investigated. The system is tested and its telecommunication general aspects are verified. The results showed that the system has (97.9 +/- 1.3)% Up-time, 2.5 x 10(-5) Bit Error Rate, 1% Dropped Call Rate, 97.4% Call Success Rate, 5 second transmission delay in average, (3.42 +/- 0.11) kbps throughput, and the system may have application in electrocardiography.

  9. Design of a Channel Error Simulator using Virtual Instrument Techniques for the Initial Testing of TCP/IP and SCPS Protocols

    Science.gov (United States)

    Horan, Stephen; Wang, Ru-Hai

    1999-01-01

    There exists a need for designers and developers to have a method to conveniently test a variety of communications parameters for an overall system design. This is no different when testing network protocols as when testing modulation formats. In this report, we discuss a means of providing a networking test device specifically designed to be used for space communications. This test device is a PC-based Virtual Instrument (VI) programmed using the LabVIEW(TM) version 5 software suite developed by National Instruments(TM)TM. This instrument was designed to be portable and usable by others without special, additional equipment. The programming was designed to replicate a VME-based hardware module developed earlier at New Mexico State University (NMSU) and to provide expanded capabilities exceeding the baseline configuration existing in that module. This report describes the design goals for the VI module in the next section and follows that with a description of the design of the VI instrument. This is followed with a description of the validation tests run on the VI. An application of the error-generating VI to networking protocols is then given.

  10. Spinor formalism and complex-vector formalism of general relativity

    International Nuclear Information System (INIS)

    Han-ying, G.; Yong-shi, W.; Gendao, L.

    1974-01-01

    In this paper, using E. Cartan's exterior calculus, we give the spinor form of the structure equations, which leads naturally to the Newman--Penrose equations. Furthermore, starting from the spinor spaces and the el (2C) algebra, we construct the general complex-vector formalism of general relativity. We find that both the Cahen--Debever--Defrise complex-vector formalism and that of Brans are its special cases. Thus, the spinor formalism and the complex-vector formalism of general relativity are unified on the basis of the uni-modular group SL(2C) and its Lie algebra

  11. Efficacy of Internet-Based Guided Treatment for Genito-Pelvic Pain/Penetration Disorder: Rationale, Treatment Protocol, and Design of a Randomized Controlled Trial

    OpenAIRE

    Anna-Carlotta Zarski; Anna-Carlotta Zarski; Matthias Berking; David Daniel Ebert

    2018-01-01

    IntroductionGenito-pelvic pain/penetration disorder (GPPPD) not only adversely affects women’s sexuality and sexual satisfaction but is also associated with a wide range of psychosocial consequences such as reduced quality of life and well-being, mental health comorbidities, and relationship distress. Evidence for effective treatment options is scarce.AimThis article describes the rationale, treatment protocol, and study design for a randomized controlled trial examining the efficacy of an In...

  12. Efficacy of Internet-Based Guided Treatment for Genito-Pelvic Pain/Penetration Disorder: Rationale, Treatment Protocol, and Design of a Randomized Controlled Trial

    OpenAIRE

    Zarski, Anna-Carlotta; Berking, Matthias; Ebert, David Daniel

    2018-01-01

    Introduction Genito-pelvic pain/penetration disorder (GPPPD) not only adversely affects women’s sexuality and sexual satisfaction but is also associated with a wide range of psychosocial consequences such as reduced quality of life and well-being, mental health comorbidities, and relationship distress. Evidence for effective treatment options is scarce. Aim This article describes the rationale, treatment protocol, and study design for a randomized controlled trial examining the efficacy of an...

  13. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    : multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.

  14. Formalizing Darwinism and inclusive fitness theory.

    Science.gov (United States)

    Grafen, Alan

    2009-11-12

    Inclusive fitness maximization is a basic building block for biological contributions to any theory of the evolution of society. There is a view in mathematical population genetics that nothing is caused to be maximized in the process of natural selection, but this is explained as arising from a misunderstanding about the meaning of fitness maximization. Current theoretical work on inclusive fitness is discussed, with emphasis on the author's 'formal Darwinism project'. Generally, favourable conclusions are drawn about the validity of assuming fitness maximization, but the need for continuing work is emphasized, along with the possibility that substantive exceptions may be uncovered. The formal Darwinism project aims more ambitiously to represent in a formal mathematical framework the central point of Darwin's Origin of Species, that the mechanical processes of inheritance and reproduction can give rise to the appearance of design, and it is a fitting ambition in Darwin's bicentenary year to capture his most profound discovery in the lingua franca of science.

  15. Enhancing System Realisation in Formal Model Development

    DEFF Research Database (Denmark)

    Tran-Jørgensen, Peter Würtz Vinther

    and requirements of software extensions targeting Overture. The tools developed in this PhD project have successfully supported three case studies from externally funded projects. The feedback received from the case study work has further helped improve the code generation infrastructure and the tools built using...... implementation. One way to realise the system’s software is by automatically generating it from the formal specification – a technique referred to as code generation. However, in general it is difficult to make guarantees about the correctness of the generated code – especially while requiring automation...... of the steps involved in realising the formal specification. This PhD dissertation investigates ways to improve the automation of the steps involved in realising and validating a system based on a formal specification. The approach aims to develop properly designed software tools which support the integration...

  16. Internet protocol television for personalized home-based health information: design-based research on a diabetes education system.

    Science.gov (United States)

    Gray, Kathleen Mary; Clarke, Ken; Alzougool, Basil; Hines, Carolyn; Tidhar, Gil; Frukhtman, Feodor

    2014-03-10

    The use of Internet protocol television (IPTV) as a channel for consumer health information is a relatively under-explored area of medical Internet research. IPTV may afford new opportunities for health care service providers to provide health information and for consumers, patients, and caretakers to access health information. The technologies of Web 2.0 add a new and even less explored dimension to IPTV's potential. Our research explored an application of Web 2.0 integrated with IPTV for personalized home-based health information in diabetes education, particularly for people with diabetes who are not strong computer and Internet users, and thus may miss out on Web-based resources. We wanted to establish whether this system could enable diabetes educators to deliver personalized health information directly to people with diabetes in their homes; and whether this system could encourage people with diabetes who make little use of Web-based health information to build their health literacy via the interface of a home television screen and remote control. This project was undertaken as design-based research in two stages. Stage 1 comprised a feasibility study into the technical work required to integrate an existing Web 2.0 platform with an existing IPTV system, populated with content and implemented for user trials in a laboratory setting. Stage 2 comprised an evaluation of the system by consumers and providers of diabetes information. The project succeeded in developing a Web 2.0 IPTV system for people with diabetes and low literacies and their diabetes educators. The performance of the system in the laboratory setting gave them the confidence to engage seriously in thinking about the actual and potential features and benefits of a more widely-implemented system. In their feedback they pointed out a range of critical usability and usefulness issues related to Web 2.0 affordances and learning fundamentals. They also described their experiences with the system in

  17. Protein misfolding, amyotrophic lateral sclerosis and guanabenz: protocol for a phase II RCT with futility design (ProMISe trial).

    Science.gov (United States)

    Bella, Eleonora Dalla; Tramacere, Irene; Antonini, Giovanni; Borghero, Giuseppe; Capasso, Margherita; Caponnetto, Claudia; Chiò, Adriano; Corbo, Massimo; Eleopra, Roberto; Filosto, Massimiliano; Giannini, Fabio; Granieri, Enrico; Bella, Vincenzo La; Lunetta, Christian; Mandrioli, Jessica; Mazzini, Letizia; Messina, Sonia; Monsurrò, Maria Rosaria; Mora, Gabriele; Riva, Nilo; Rizzi, Romana; Siciliano, Gabriele; Silani, Vincenzo; Simone, Isabella; Sorarù, Gianni; Volanti, Paolo; Lauria, Giuseppe

    2017-08-11

    Recent studies suggest that endoplasmic reticulum stress may play a critical role in the pathogenesis of amyotrophic lateral sclerosis (ALS) through an altered regulation of the proteostasis, the cellular pathway-balancing protein synthesis and degradation. A key mechanism is thought to be the dephosphorylation of eIF2α, a factor involved in the initiation of protein translation. Guanabenz is an alpha-2-adrenergic receptor agonist safely used in past to treat mild hypertension and is now an orphan drug. A pharmacological action recently discovered is its ability to modulate the synthesis of proteins by the activation of translational factors preventing misfolded protein accumulation and endoplasmic reticulum overload. Guanabenz proved to rescue motoneurons from misfolding protein stress both in in vitro and in vivo ALS models, making it a potential disease-modifying drug in patients. It is conceivable investigating whether its neuroprotective effects based on the inhibition of eIF2α dephosphorylation can change the progression of ALS. Protocolised Management In Sepsis is a multicentre, randomised, double-blind, placebo-controlled phase II clinical trial with futility design. We will investigate clinical outcomes, safety, tolerability and biomarkers of neurodegeneration in patients with ALS treated with guanabenz or riluzole alone for 6 months. The primary aim is to test if guanabenz can reduce the proportion of patients progressed to a higher stage of disease at 6 months compared with their baseline stage as measured by the ALS Milano-Torino Staging (ALS-MITOS) system and to the placebo group. Secondary aims are safety, tolerability and change in at least one biomarker of neurodegeneration in the guanabenz arm compared with the placebo group. Findings will provide reliable data on the likelihood that guanabenz can slow the course of ALS in a phase III trial. The study protocol was approved by the Ethics Committee of IRCCS 'Carlo Besta Foundation' of Milan

  18. Design of durability test protocol for vehicular fuel cell systems operated in power-follow mode based on statistical results of on-road data

    Science.gov (United States)

    Xu, Liangfei; Reimer, Uwe; Li, Jianqiu; Huang, Haiyan; Hu, Zunyan; Jiang, Hongliang; Janßen, Holger; Ouyang, Minggao; Lehnert, Werner

    2018-02-01

    City buses using polymer electrolyte membrane (PEM) fuel cells are considered to be the most likely fuel cell vehicles to be commercialized in China. The technical specifications of the fuel cell systems (FCSs) these buses are equipped with will differ based on the powertrain configurations and vehicle control strategies, but can generally be classified into the power-follow and soft-run modes. Each mode imposes different levels of electrochemical stress on the fuel cells. Evaluating the aging behavior of fuel cell stacks under the conditions encountered in fuel cell buses requires new durability test protocols based on statistical results obtained during actual driving tests. In this study, we propose a systematic design method for fuel cell durability test protocols that correspond to the power-follow mode based on three parameters for different fuel cell load ranges. The powertrain configurations and control strategy are described herein, followed by a presentation of the statistical data for the duty cycles of FCSs in one city bus in the demonstration project. Assessment protocols are presented based on the statistical results using mathematical optimization methods, and are compared to existing protocols with respect to common factors, such as time at open circuit voltage and root-mean-square power.

  19. Security protocol specification and verification with AnBx

    DEFF Research Database (Denmark)

    Bugliesi, Michele; Calzavara, Stefano; Mödersheim, Sebastian Alexander

    2016-01-01

    Designing distributed protocols is complex and requires actions at very different levels: from the design of an interaction flow supporting the desired application-specific guarantees to the selection of the most appropriate network-level protection mechanisms. To tame this complexity, we propose...... with a novel notion of forwarding channels, enforcing specific security guarantees from the message originator to the final recipient along a number of intermediate forwarding agents. We give a formal semantics of AnBx in terms of a state transition system expressed in the AVISPA Intermediate Format. We devise...

  20. Formal System Verification - Extension 2

    Science.gov (United States)

    2012-08-08

    vision of truly trustworthy systems has been to provide a formally verified microkernel basis. We have previously developed the seL4 microkernel...together with a formal proof (in the theorem prover Isabelle/HOL) of its functional correctness [6]. This means that all the behaviours of the seL4 C...source code are included in the high-level, formal specification of the kernel. This work enabled us to provide further formal guarantees about seL4 , in

  1. Formalized Epistemology, Logic, and Grammar

    Science.gov (United States)

    Bitbol, Michel

    The task of a formal epistemology is defined. It appears that a formal epistemology must be a generalization of "logic" in the sense of Wittgenstein's Tractatus. The generalization is required because, whereas logic presupposes a strict relation between activity and language, this relation may be broken in some domains of experimental enquiry (e.g., in microscopic physics). However, a formal epistemology should also retain a major feature of Wittgenstein's "logic": It must not be a discourse about scientific knowledge, but rather a way of making manifest the structures usually implicit in knowledge-gaining activity. This strategy is applied to the formalism of quantum mechanics.

  2. Formal, Non-Formal and Informal Learning in the Sciences

    Science.gov (United States)

    Ainsworth, Heather L.; Eaton, Sarah Elaine

    2010-01-01

    This research report investigates the links between formal, non-formal and informal learning and the differences between them. In particular, the report aims to link these notions of learning to the field of sciences and engineering in Canada and the United States, including professional development of adults working in these fields. It offers…

  3. Recasting a traditional laboratory practical as a "Design-your-own protocol" to teach a universal research skill.

    Science.gov (United States)

    Whitworth, David E

    2016-07-08

    Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to develop generic practical skills. To provide an opportunity for students to develop the skills needed to create bespoke protocols for experimental benchwork, a traditional practical was repurposed. Students were given a list of available resources and an experimental goal, and directed to create a bench protocol to achieve the aim (measuring the iron in hemoglobin). In a series of teaching events students received feedback from staff, and peers prototyped the protocols, before protocols were finally implemented. Graduates highlighted this exercise as one of the most important of their degrees, primarily because of the clear relevance of the skills acquired to professional practice. The exercise exemplifies a range of pedagogic principles, but arguably its most important innovation is that it repurposed a pre-existing practical. This had the benefits of automatically providing scaffolding to direct the students' thought processes, while retaining the advantages of a "discovery learning" exercise, and allowing facile adoption of the approach across the sector. © 2016 by The International Union of Biochemistry and Molecular Biology, 44(4):377-380, 2016. © 2016 The International Union of Biochemistry and Molecular Biology.

  4. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications.

    Science.gov (United States)

    Hernández-Rojas, Dixys L; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Escudero, Carlos J

    2017-12-27

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google's open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  5. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Science.gov (United States)

    2017-01-01

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential. PMID:29280975

  6. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Directory of Open Access Journals (Sweden)

    Dixys L. Hernández-Rojas

    2017-12-01

    Full Text Available The Internet of Things (IoT involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons, LP4S-X (for more powerful beacons and LP4S-J (for beacons able to run complex firmware. In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6 is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format. Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  7. Formal specifications for safety grade systems

    International Nuclear Information System (INIS)

    Chisholm, G.H.; Smith, B.T.; Wojcik, A.S.

    1992-01-01

    The authors describe the findings of a study into the application of formal methods to the specification of a safety system for an operating nuclear reactor. They developed a formal specification that is used to verify and validate that no unsafe condition will result from action or inaction of the system. For this reason, the specification must facilitate thinking about, talking about, and implementing the system. In fact, the specification must provide a bridge between people (designers, engineers, policy makers) and diverse implementations (hardware, software, sensors, power supplies) at all levels. For a specification to serve as an effective linkage, it must have the following properties: (1) completeness, (2) conciseness, (3) unambiguity, and (4) communicativeness. In this paper they describe the development of a specification that has three properties. This development is based on the use of formal methods, i.e., methods that add mathematical rigor to the development, analysis and operation of computer systems and to applications based thereon (Neumann). They demonstrate that a specification derived from a formal basis facilitates development of the design and its subsequent verification

  8. 'Be active, eat right', evaluation of an overweight prevention protocol among 5-year-old children: design of a cluster randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Veldhuis Lydian

    2009-06-01

    Full Text Available Abstract Background The prevalence of overweight and obesity in children has at least doubled in the past 25 years with a major impact on health. In 2005 a prevention protocol was developed applicable within Youth Health Care. This study aims to assess the effects of this protocol on prevalence of overweight and health behaviour among children. Methods and design A cluster randomised controlled trial is conducted among 5-year-old children included by 44 Youth Health Care teams randomised within 9 Municipal Health Services. The teams are randomly allocated to the intervention or control group. The teams measure the weight and height of all children. When a child in the intervention group is detected with overweight according to the international age and gender specific cut-off points of BMI, the prevention protocol is applied. According to this protocol parents of overweight children are invited for up to three counselling sessions during which they receive personal advice about a healthy lifestyle, and are motivated for and assisted in behavioural change. The primary outcome measures are Body Mass Index and waist circumference of the children. Parents will complete questionnaires to assess secondary outcome measures: levels of overweight inducing/reducing behaviours (i.e. being physically active, having breakfast, drinking sweet beverages and watching television/playing computer games, parenting styles, parenting practices, and attitudes of parents regarding these behaviours, health-related quality of life of the children, and possible negative side effects of the prevention protocol. Data will be collected at baseline (when the children are aged 5 years, and after 12 and 24 months of follow-up. Additionally, a process and a cost-effectiveness evaluation will be conducted. Discussion In this study called 'Be active, eat right' we evaluate an overweight prevention protocol for use in the setting of Youth Health Care. It is hypothesized that the

  9. 40 years of formal methods

    DEFF Research Database (Denmark)

    Bjørner, Dines; Havelund, Klaus

    2014-01-01

    In this "40 years of formal methods" essay we shall first delineate, Sect. 1, what we mean by method, formal method, computer science, computing science, software engineering, and model-oriented and algebraic methods. Based on this, we shall characterize a spectrum from specification-oriented met...

  10. Leibniz' First Formalization of Syllogistics

    DEFF Research Database (Denmark)

    Robering, Klaus

    2014-01-01

    of letters just those which belong to the useful, i.e., valid, modes. The set of codes of valid modes turns out to be a so-called "regular" language (in the sense of formal-language-theory). Leibniz' formalization of syllogistics in his Dissertatio thus contains an estimation of the computational complexity...

  11. Seniority in projection operator formalism

    International Nuclear Information System (INIS)

    Ullah, N.

    1976-01-01

    It is shown that the concept of seniority can be introduced in projection operator formalism through the use of the operator Q, which has been defined by de-Shalit and Talmi. The usefulness of seniority concept in projection operator formalism is discussed. An example of four nucleons in j=3/2 configuration is given for illustrative purposes

  12. A Formalization of Linkage Analysis

    DEFF Research Database (Denmark)

    Ingolfsdottir, Anna; Christensen, A.I.; Hansen, Jens A.

    In this report a formalization of genetic linkage analysis is introduced. Linkage analysis is a computationally hard biomathematical method, which purpose is to locate genes on the human genome. It is rooted in the new area of bioinformatics and no formalization of the method has previously been ...

  13. Enhancing Formal E-Learning with Edutainment on Social Networks

    Science.gov (United States)

    Labus, A.; Despotovic-Zrakic, M.; Radenkovic, B.; Bogdanovic, Z.; Radenkovic, M.

    2015-01-01

    This paper reports on the investigation of the possibilities of enhancing the formal e-learning process by harnessing the potential of informal game-based learning on social networks. The goal of the research is to improve the outcomes of the formal learning process through the design and implementation of an educational game on a social network…

  14. Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    This paper presents the formal definition of Pragmatics Annotated Coloured Petri Nets (PA-CPNs). PA-CPNs represent a class of Coloured Petri Nets (CPNs) that are designed to support automated code genera-tion of protocol software. PA-CPNs restrict the structure of CPN models and allow Petri net...... elements to be annotated with so-called pragmatics, which are exploited for code generation. The approach and tool for gen-erating code is called PetriCode and has been discussed and evaluated in earlier work already. The contribution of this paper is to give a formal def-inition for PA-CPNs; in addition...

  15. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    Science.gov (United States)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  16. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  17. DESIGN OF CAUCUS MEDIUM ACCESS CONTROL (C-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS IN SMART GRIDS

    Directory of Open Access Journals (Sweden)

    JEETU SHARMA

    2017-10-01

    Full Text Available A Caucus-based medium access control protocol (C-MAC is proposed to reduce the end to end delay and battery consumption of the sensor nodes deployed in the monitoring of various smart grid regions, such as substation, pole and wires, perimeter security, real time and non-real-time monitoring using wireless sensor networks. The objective is to prolong the network lifetime and to reduce the end to end delay by mitigating the energy-hole problem and by eliminating bottlenecks significantly by using caucus based efficient synchronization techniques in multi-hop square grid topology of the wireless sensor networks (WSNs. The protocol self-reliantly and adaptively schedules node’s wake-up times, decreases idle listening and collisions, increases network throughput, and extends network lifetime. It induces a low duty cycle for adjusting wake-up times of sensor nodes. The appropriate selection of active and sleep time slots and next hop relay nodes are proposed to minimize the data transmission latency and to reduce battery consumption to increase the network lifetime. The uniform and synchronized transmission of the data packets is of prime importance to improve the network performance. Simulation results justify that the proposed C-MAC protocol increases the network lifetime, successful data transmission ratio along-with the reduction in end to end delay. The objective of this paper is to envisage benefits and utilization of C-MAC protocol for WSNs deployed in smart grids and to draw the attention of researchers in this area.

  18. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  19. Mobile Application to Promote Adherence to Oral Chemotherapy and Symptom Management: A Protocol for Design and Development.

    Science.gov (United States)

    Fishbein, Joel Nathan; Nisotel, Lauren Ellen; MacDonald, James John; Amoyal Pensak, Nicole; Jacobs, Jamie Michele; Flanagan, Clare; Jethwani, Kamal; Greer, Joseph Andrew

    2017-04-20

    symptoms and side effects. At every stage in this trial, we are engaging stakeholders to solicit feedback on our progress and next steps. To our knowledge, we are the first to describe the development of an app designed for people taking oral chemotherapy. The app addresses many concerns with oral chemotherapy, such as medication adherence and symptom management. Soliciting feedback from stakeholders with broad perspectives and expertise ensured that the app was acceptable and potentially beneficial for patients, caregivers, and clinicians. In our development process, we instantiated 7 of the 8 best practices proposed in a recent review of mobile health app development. Our process demonstrated the importance of effective communication between research groups and technical teams, as well as meticulous planning of technical specifications before development begins. Future efforts should consider incorporating other proven strategies in software, such as gamification, to bolster the impact of mobile health apps. Forthcoming results from our randomized controlled trial will provide key data on the effectiveness of this app in improving medication adherence and symptom management. ClinicalTrials.gov NCT02157519; https://clinicaltrials.gov/ct2/show/NCT02157519 (Archived by WebCite at http://www.webcitation.org/6prj3xfKA). ©Joel Nathan Fishbein, Lauren Ellen Nisotel, James John MacDonald, Nicole Amoyal Pensak, Jamie Michele Jacobs, Clare Flanagan, Kamal Jethwani, Joseph Andrew Greer. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 20.04.2017.

  20. Formal genetic maps

    African Journals Online (AJOL)

    Mohammad Saad Zaghloul Salem

    2014-12-24

    Dec 24, 2014 ... ome/transcriptome/proteome, experimental induced maps that are intentionally designed and con- ... genetic maps imposed their application in nearly all fields of medical genetics including ..... or genes located adjacent to, or near, them. ...... types of markers, e.g., clinical markers (eye color), genomic.

  1. A Comparitive Study of Subject Knowledge of B.Ed Graduates of Formal and Non-Formal Teacher Education Systems

    Science.gov (United States)

    Saif, Perveen; Reba, Amjad; ud Din, Jalal

    2017-01-01

    This study was designed to compare the subject knowledge of B.Ed graduates of formal and non-formal teacher education systems. The population of the study included all teachers from Girls High and Higher Secondary Schools both from private and public sectors from the district of Peshawar. Out of the total population, twenty schools were randomly…

  2. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  3. Formal verification - Robust and efficient code: Introduction to Formal Verification

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    In general, FV means "proving that certain properties hold for a given system using formal mathematics". This definition can certainly feel daunting, however, as we will learn, we can reap benefits from the paradigm without digging too deep into ...

  4. Comparing formal verification approaches of interlocking systems

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Nguyen, Hoang Nga; Roggenbach, Markus

    2016-01-01

    these approaches. As a first step towards this, in this paper we suggest a way to compare different formal approaches for verifying designs of route-based interlocking systems and we demonstrate it on modelling and verification approaches developed within the research groups at DTU/Bremen and at Surrey......The verification of railway interlocking systems is a challenging task, and therefore several research groups have suggested to improve this task by using formal methods, but they use different modelling and verification approaches. To advance this research, there is a need to compare....../Swansea. The focus is on designs that are specified by so-called control tables. The paper can serve as a starting point for further comparative studies. The DTU/Bremen research has been funded by the RobustRailS project granted by Innovation Fund Denmark. The Surrey/Swansea research has been funded by the Safe...

  5. Physics student ideas on quantum state and its formal representations

    International Nuclear Information System (INIS)

    Zuccarini, G.

    2014-01-01

    Developing a quantum way of thinking is a core and challenging task for physics students. The concept of quantum state, whose physical meaning is connected to the formal structure of the theory, plays an important role in the construction of a quantum perspective and in student difficulties elicited by research. A questionnaire and interview protocol were devised to explore student understanding of the state concept in connection to the properties of its formal representations and to quantum behavior. Results of a calibration of research instruments performed on 6 physics students from different universities are here presented.

  6. A Formal Model and Verification Problems for Software Defined Networks

    Directory of Open Access Journals (Sweden)

    V. A. Zakharov

    2013-01-01

    Full Text Available Software-defined networking (SDN is an approach to building computer networks that separate and abstract data planes and control planes of these systems. In a SDN a centralized controller manages a distributed set of switches. A set of open commands for packet forwarding and flow-table updating was defined in the form of a protocol known as OpenFlow. In this paper we describe an abstract formal model of SDN, introduce a tentative language for specification of SDN forwarding policies, and set up formally model-checking problems for SDN.

  7. Moving interprofessional learning forward through formal assessment.

    Science.gov (United States)

    Stone, Judy

    2010-04-01

    There is increasing agreement that graduates who finish tertiary education with the full complement of skills and knowledge required for their designated profession are not 'work-ready' unless they also acquire interpersonal, collaborative practice and team-working capabilities. Health workers are unable to contribute to organisational culture in a positive way unless they too attain these capabilities. These capabilities have been shown to improve health care in terms of patient safety, worker satisfaction and health service efficiency. Given the importance of interprofessional learning (IPL) which seeks to address these capabilities, why is IPL not consistently embedded into the education of undergraduates, postgraduates and vocationally qualified personnel through formal assessment? This paper offers an argument for the formal assessment of IPL. It illustrates how the interests of the many stakeholders in IPL can benefit from, and contribute to, the integration of IPL into mainstream professional development and tertiary education. It offers practical examples of assessment in IPL which could drive learning and offer authentic, contextual teaching and learning experiences to undergraduates and health workers alike. Assessment drives learning and without formal assessment IPL will continue to be viewed as an optional topic of little relative importance for learners. In order to make the next step forward, IPL needs to be recognised and endorsed through formal assessment, both at the tertiary education level and within the workplace environment. This is supported by workforce initiatives and tertiary education policy which can be used to specify the capabilities or generic skills necessary for effective teamwork and collaborative practice.

  8. Toward a Formal Model of Cognitive Synergy

    OpenAIRE

    Goertzel, Ben

    2017-01-01

    "Cognitive synergy" refers to a dynamic in which multiple cognitive processes, cooperating to control the same cognitive system, assist each other in overcoming bottlenecks encountered during their internal processing. Cognitive synergy has been posited as a key feature of real-world general intelligence, and has been used explicitly in the design of the OpenCog cognitive architecture. Here category theory and related concepts are used to give a formalization of the cognitive synergy concept....

  9. Design of steady-state positron emission tomography protocols for neurobehavioral studies: CO15O and 19Ne

    International Nuclear Information System (INIS)

    Kearfott, K.J.; Rottenberg, D.A.; Volpe, B.T.

    1983-01-01

    Although the [ 18 F]-2-fluoro-2-deoxyglucose positron emission tomographic technique for measuring regional glucose metabolic rate has been successfully employed for neurobehavioral studies, the long (greater than 30 min) equilibration time required may complicate the interpretation of experimental results. Positron emission tomography neurobehavioral protocols employing the continuous inhalation of CO 15 O and 19 Ne were developed for measuring regional cerebral blood flow during multiple control and stimulation periods. Timing, lung absorbed dose, statistical accuracy, and resolution were considered. Studies with 19 Ne require shorter equilibration and stimulation times than do CO 15 O studies but entail higher absorbed doses and yield poorer imaging statistics

  10. Balancing Opposing Forces—A Nested Process Evaluation Study Protocol for a Stepped Wedge Designed Cluster Randomized Controlled Trial of an Experience Based Codesign Intervention

    Directory of Open Access Journals (Sweden)

    Victoria Jane Palmer

    2016-10-01

    Full Text Available Background: Process evaluations are essential to understand the contextual, relational, and organizational and system factors of complex interventions. The guidance for developing process evaluations for randomized controlled trials (RCTs has until recently however, been fairly limited. Method/Design: A nested process evaluation (NPE was designed and embedded across all stages of a stepped wedge cluster RCT called the CORE study. The aim of the CORE study is to test the effectiveness of an experience-based codesign methodology for improving psychosocial recovery outcomes for people living with severe mental illness (service users. Process evaluation data collection combines qualitative and quantitative methods with four aims: (1 to describe organizational characteristics, service models, policy contexts, and government reforms and examine the interaction of these with the intervention; (2 to understand how the codesign intervention works, the cluster variability in implementation, and if the intervention is or is not sustained in different settings; (3 to assist in the interpretation of the primary and secondary outcomes and determine if the causal assumptions underpinning the codesign interventions are accurate; and (4 to determine the impact of a purposefully designed engagement model on the broader study retention and knowledge transfer in the trial. Discussion: Process evaluations require prespecified study protocols but finding a balance between their iterative nature and the structure offered by protocol development is an important step forward. Taking this step will advance the role of qualitative research within trials research and enable more focused data collection to occur at strategic points within studies.

  11. Influence of different luting protocols on shear bond strength of computer aided design/computer aided manufacturing resin nanoceramic material to dentin.

    Science.gov (United States)

    Poggio, Claudio; Pigozzo, Marco; Ceci, Matteo; Scribante, Andrea; Beltrami, Riccardo; Chiesa, Marco

    2016-01-01

    The purpose of this study was to evaluate the influence of three different luting protocols on shear bond strength of computer aided design/computer aided manufacturing (CAD/CAM) resin nanoceramic (RNC) material to dentin. In this in vitro study, 30 disks were milled from RNC blocks (Lava Ultimate/3M ESPE) with CAD/CAM technology. The disks were subsequently cemented to the exposed dentin of 30 recently extracted bovine permanent mandibular incisors. The specimens were randomly assigned into 3 groups of 10 teeth each. In Group 1, disks were cemented using a total-etch protocol (Scotchbond™ Universal Etchant phosphoric acid + Scotchbond Universal Adhesive + RelyX™ Ultimate conventional resin cement); in Group 2, disks were cemented using a self-etch protocol (Scotchbond Universal Adhesive + RelyX™ Ultimate conventional resin cement); in Group 3, disks were cemented using a self-adhesive protocol (RelyX™ Unicem 2 Automix self-adhesive resin cement). All cemented specimens were placed in a universal testing machine (Instron Universal Testing Machine 3343) and submitted to a shear bond strength test to check the strength of adhesion between the two substrates, dentin, and RNC disks. Specimens were stressed at a crosshead speed of 1 mm/min. Data were analyzed with analysis of variance and post-hoc Tukey's test at a level of significance of 0.05. Post-hoc Tukey testing showed that the highest shear strength values (P adhesives) showed better shear strength values compared to self-adhesive resin cements. Furthermore, conventional resin cements used together with a self-etch adhesive reported the highest values of adhesion.

  12. Concepts of formal concept analysis

    Science.gov (United States)

    Žáček, Martin; Homola, Dan; Miarka, Rostislav

    2017-07-01

    The aim of this article is apply of Formal Concept Analysis on concept of world. Formal concept analysis (FCA) as a methodology of data analysis, information management and knowledge representation has potential to be applied to a verity of linguistic problems. FCA is mathematical theory for concepts and concept hierarchies that reflects an understanding of concept. Formal concept analysis explicitly formalizes extension and intension of a concept, their mutual relationships. A distinguishing feature of FCA is an inherent integration of three components of conceptual processing of data and knowledge, namely, the discovery and reasoning with concepts in data, discovery and reasoning with dependencies in data, and visualization of data, concepts, and dependencies with folding/unfolding capabilities.

  13. ASLan++ — A Formal Security Specification Language for Distributed Systems

    DEFF Research Database (Denmark)

    Von Oheimb, David; Mödersheim, Sebastian Alexander

    2010-01-01

    This paper introduces ASLan++, the AVANTSSAR Specification Language. ASLan++ has been designed for formally specifying dynamically composed security-sensitive web services and service-oriented architectures, their associated security policies, as well as their security properties, at both communi...

  14. Formal and informal appropriation mechanisms: the role of openness and innovativeness

    NARCIS (Netherlands)

    Zobel, Ann-Kristin; Lokshin, Boris; Hagedoorn, John

    2016-01-01

    This paper analyses how firms’ degree of openness and innovativeness influence their use of formal and informal appropriation mechanisms. Patents, trademarks, copyrights, and design rights are formal appropriation mechanisms. Secrecy, lead-time, and complexity are examples of informal appropriation

  15. Helicity formalism and spin effects

    International Nuclear Information System (INIS)

    Anselmino, M.; Caruso, F.; Piovano, U.

    1990-01-01

    The helicity formalism and the technique to compute amplitudes for interaction processes involving leptons, quarks, photons and gluons are reviewed. Explicit calculations and examples of exploitation of symmetry properties are shown. The formalism is then applied to the discussion of several hadronic processes and spin effects: the experimental data, when related to the properties of the elementary constituent interactions, show many not understood features. Also the nucleon spin problem is briefly reviewed. (author)

  16. A Synthesized Framework for Formal Verification of Computing Systems

    Directory of Open Access Journals (Sweden)

    Nikola Bogunovic

    2003-12-01

    Full Text Available Design process of computing systems gradually evolved to a level that encompasses formal verification techniques. However, the integration of formal verification techniques into a methodical design procedure has many inherent miscomprehensions and problems. The paper explicates the discrepancy between the real system implementation and the abstracted model that is actually used in the formal verification procedure. Particular attention is paid to the seamless integration of all phases of the verification procedure that encompasses definition of the specification language and denotation and execution of conformance relation between the abstracted model and its intended behavior. The concealed obstacles are exposed, computationally expensive steps identified and possible improvements proposed.

  17. A formal expert judgment procedure for performance assessments of the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Guzowski, R.V.; Hora, S.C.

    1994-09-01

    The Waste Isolation Pilot Plant (WIPP) is an experimental facility located in southeastern New Mexico. It has been designed to determine the feasibility of the geologic disposal of defense-generated transuranic waste in a deep bedded-salt formation. The WIPP was also designed for disposal and will operate in that capacity if approved. The WIPP Performance Assessment Department at Sandia National Laboratories has been conducting analyses to assess the long-term performance of the WIPP. These analyses sometimes require the use of expert judgment. This Department has convened several expert-judgment panels and from that experience has developed an internal quality-assurance procedure to guide the formal elicitation of expert judgment. This protocol is based on the principles found in the decision-analysis literature

  18. A formal expert judgment procedure for performance assessments of the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Guzowski, R.V. [Science Applications International Corp., Albuquerque, NM (United States); Hora, S.C. [Univ. of Hawaii, Hilo, HI (United States). Business Administration & Economics Div.

    1994-09-01

    The Waste Isolation Pilot Plant (WIPP) is an experimental facility located in southeastern New Mexico. It has been designed to determine the feasibility of the geologic disposal of defense-generated transuranic waste in a deep bedded-salt formation. The WIPP was also designed for disposal and will operate in that capacity if approved. The WIPP Performance Assessment Department at Sandia National Laboratories has been conducting analyses to assess the long-term performance of the WIPP. These analyses sometimes require the use of expert judgment. This Department has convened several expert-judgment panels and from that experience has developed an internal quality-assurance procedure to guide the formal elicitation of expert judgment. This protocol is based on the principles found in the decision-analysis literature.

  19. A formal expert judgment procedure for performance assessments of the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Guzowski, R.V.; Hora, S.C.

    1993-01-01

    The Waste Isolation Pilot Plant (WIPP) is an experimental facility located in southeastern New Mexico. It has been designed to determine the feasibility of the geologic disposal of defense-generated transuranic waste in a deep bedded-salt formation. The WIPP was also designed for disposal and will operate in that capacity if approved. The WIPP Performance Assessment Department at Sandia National Laboratories has been conducting analyses to assess the long-term performance of the WIPP. These analyses sometimes require the use of expert judgment. This Department has convened several expert-judgment panels and from that experience has developed an internal quality-assurance procedure to guide the formal elicitation of expert judgment. This protocol is based on the principles found in the decision-analysis literature

  20. Effects of standard training in the use of closed-circuit televisions in visually impaired adults: design of a training protocol and a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    van Rens Ger HMB

    2010-03-01

    Full Text Available Abstract Background Reading problems are frequently reported by visually impaired persons. A closed-circuit television (CCTV can be helpful to maintain reading ability, however, it is difficult to learn how to use this device. In the Netherlands, an evidence-based rehabilitation program in the use of CCTVs was lacking. Therefore, a standard training protocol needed to be developed and tested in a randomized controlled trial (RCT to provide an evidence-based training program in the use of this device. Methods/Design To develop a standard training program, information was collected by studying literature, observing training in the use of CCTVs, discussing the content of the training program with professionals and organizing focus and discussion groups. The effectiveness of the program was evaluated in an RCT, to obtain an evidence-based training program. Dutch patients (n = 122 were randomized into a treatment group: normal instructions from the supplier combined with training in the use of CCTVs, or into a control group: instructions from the supplier only. The effect of the training program was evaluated in terms of: change in reading ability (reading speed and reading comprehension, patients' skills to operate the CCTV, perceived (vision-related quality of life and tasks performed in daily living. Discussion The development of the CCTV training protocol and the design of the RCT in the present study may serve as an example to obtain an evidence-based training program. The training program was adjusted to the needs and learning abilities of individual patients, however, for scientific reasons it might have been preferable to standardize the protocol further, in order to gain more comparable results. Trial registration http://www.trialregister.nl, identifier: NTR1031

  1. CaPiTo: protocol stacks for services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level...... allows to consider how security is obtained using asymmetric and symmetric cryptographic primitives. The CaPiTo approach therefore caters for a variety of developers that need to cooperate on designing and implementing service-oriented applications. We show how to formally analyse CaPiTo specifications...

  2. Formal Modeling and Verification for MVB

    Directory of Open Access Journals (Sweden)

    Mo Xia

    2013-01-01

    Full Text Available Multifunction Vehicle Bus (MVB is a critical component in the Train Communication Network (TCN, which is widely used in most of the modern train techniques of the transportation system. How to ensure security of MVB has become an important issue. Traditional testing could not ensure the system correctness. The MVB system modeling and verification are concerned in this paper. Petri Net and model checking methods are used to verify the MVB system. A Hierarchy Colored Petri Net (HCPN approach is presented to model and simulate the Master Transfer protocol of MVB. Synchronous and asynchronous methods are proposed to describe the entities and communication environment. Automata model of the Master Transfer protocol is designed. Based on our model checking platform M3C, the Master Transfer protocol of the MVB is verified and some system logic critical errors are found. Experimental results show the efficiency of our methods.

  3. Development of exercise design, development and implementation protocol in the utilization of simulators for response management training

    International Nuclear Information System (INIS)

    Giesen, J. H.

    1997-01-01

    Development and operation of a marine oil spill management simulator system at Texas A and M University's Galveston Center for Marine Training and Safety was described. The Spill Management Simulator is a multi-year joint program between the U. S. Coast Guard and the Center. Essentially, it is a a computer-based modelling and scenario generator for conducting and evaluating incident management training. An independent evaluation group has been set up by the U.S.Coast Guard to evaluate the Galveston and similar programs established under the same legislation throughout the United States. This paper discusses the creation of a development and implementation protocol for Spill Management Team simulation as a foundation upon which to integrate available and future technology and for making it available to the response community as a whole. 12 refs.,1 tab., 4 figs

  4. Ecosystem Fabrication (EcoFAB) Protocols for The Construction of Laboratory Ecosystems Designed to Study Plant-microbe Interactions.

    Science.gov (United States)

    Gao, Jian; Sasse, Joelle; Lewald, Kyle M; Zhalnina, Kateryna; Cornmesser, Lloyd T; Duncombe, Todd A; Yoshikuni, Yasuo; Vogel, John P; Firestone, Mary K; Northen, Trent R

    2018-04-10

    Beneficial plant-microbe interactions offer a sustainable biological solution with the potential to boost low-input food and bioenergy production. A better mechanistic understanding of these complex plant-microbe interactions will be crucial to improving plant production as well as performing basic ecological studies investigating plant-soil-microbe interactions. Here, a detailed description for ecosystem fabrication is presented, using widely available 3D printing technologies, to create controlled laboratory habitats (EcoFABs) for mechanistic studies of plant-microbe interactions within specific environmental conditions. Two sizes of EcoFABs are described that are suited for the investigation of microbial interactions with various plant species, including Arabidopsis thaliana, Brachypodium distachyon, and Panicum virgatum. These flow-through devices allow for controlled manipulation and sampling of root microbiomes, root chemistry as well as imaging of root morphology and microbial localization. This protocol includes the details for maintaining sterile conditions inside EcoFABs and mounting independent LED light systems onto EcoFABs. Detailed methods for addition of different forms of media, including soils, sand, and liquid growth media coupled to the characterization of these systems using imaging and metabolomics are described. Together, these systems enable dynamic and detailed investigation of plant and plant-microbial consortia including the manipulation of microbiome composition (including mutants), the monitoring of plant growth, root morphology, exudate composition, and microbial localization under controlled environmental conditions. We anticipate that these detailed protocols will serve as an important starting point for other researchers, ideally helping create standardized experimental systems for investigating plant-microbe interactions.

  5. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  6. Linguistic Formalism for Semi-Autonomous Reactor Operation

    International Nuclear Information System (INIS)

    Joo, Sungmoon; Seo, Sang Mun; Suh, Yong-Suk; Park, Cheol

    2017-01-01

    The ultimate goal of our work is to develop a novel, integrated system for semi-autonomous reactor operation by introducing an interfacing language shared by human reactor operators and artificially intelligent service agents (e.g., robots). We envision that human operators and artificially intelligent service agents operate the reactor cooperatively in the future. For example, an artificially intelligent service agent carries out a human reactor operator's command or reports the result of a task commanded by the human reactor operator. This work presents preliminary work towards a unified linguistic formalism for cooperative, semiautonomous reactor operation. Application of the proposed formalism to reactor operator communication domain shows that the formalism effectively captures the syntax and semantics of the domain-specific language defined by the communication protocol.

  7. The Tobacco Pack Surveillance System: A Protocol for Assessing Health Warning Compliance, Design Features, and Appeals of Tobacco Packs Sold in Low- and Middle-Income Countries.

    Science.gov (United States)

    Smith, Katherine; Washington, Carmen; Brown, Jennifer; Vadnais, Alison; Kroart, Laura; Ferguson, Jacqueline; Cohen, Joanna

    2015-01-01

    Tobacco remains the world's leading preventable cause of death, with the majority of tobacco-caused deaths occurring in low- and middle-income countries. The first global health treaty, the Framework Convention on Tobacco Control (FCTC), outlines a set of policy initiatives that have been demonstrated as effective in reducing tobacco use. Article 11 of the FCTC focuses on using the tobacco package to communicate tobacco-caused harms; it also seeks to restrict the delivery of misleading information about the product on the pack. The objective of this study was to establish a surveillance system for tobacco packs in the 14 low- and middle-income countries with the greatest number of smokers. The Tobacco Pack Surveillance System (TPackSS) monitors whether required health warnings on tobacco packages are being implemented as intended, and identifies pack designs and appeals that might violate or detract from the communication of harm-related information and undermine the impact of a country's tobacco packaging laws. The protocol outlined is intended to be applicable or adaptable for surveillance efforts in other countries. Tobacco packs were collected in 14 countries during 2013. The intention was, to the extent possible, to construct a census of "unique" pack presentations available for purchase in each country. The TPackSS team partnered with in-country field staff to implement a standardized protocol for acquiring packs from 36 diverse neighborhoods across three cities in each country. At the time of purchase, data on price and place of acquisition of each pack was recorded. The field staff, according to a standardized protocol, then photographed packs before they were shipped to the United States for coding and archiving. Each pack was coded for compliance with the country-specific health warning label laws, as well as for key design features of the pack and appeals of the branding elements. The coding protocols were developed based upon prior research, expert

  8. Virtual patients design and its effect on clinical reasoning and student experience: a protocol for a randomised factorial multi-centre study

    Directory of Open Access Journals (Sweden)

    Bateman James

    2012-08-01

    Full Text Available Abstract Background Virtual Patients (VPs are web-based representations of realistic clinical cases. They are proposed as being an optimal method for teaching clinical reasoning skills. International standards exist which define precisely what constitutes a VP. There are multiple design possibilities for VPs, however there is little formal evidence to support individual design features. The purpose of this trial is to explore the effect of two different potentially important design features on clinical reasoning skills and the student experience. These are the branching case pathways (present or absent and structured clinical reasoning feedback (present or absent. Methods/Design This is a multi-centre randomised 2x2 factorial design study evaluating two independent variables of VP design, branching (present or absent, and structured clinical reasoning feedback (present or absent.The study will be carried out in medical student volunteers in one year group from three university medical schools in the United Kingdom, Warwick, Keele and Birmingham. There are four core musculoskeletal topics. Each case can be designed in four different ways, equating to 16 VPs required for the research. Students will be randomised to four groups, completing the four VP topics in the same order, but with each group exposed to a different VP design sequentially. All students will be exposed to the four designs. Primary outcomes are performance for each case design in a standardized fifteen item clinical reasoning assessment, integrated into each VP, which is identical for each topic. Additionally a 15-item self-reported evaluation is completed for each VP, based on a widely used EViP tool. Student patterns of use of the VPs will be recorded. In one centre, formative clinical and examination performance will be recorded, along with a self reported pre and post-intervention reasoning score, the DTI. Our power calculations indicate a sample size of 112 is required for

  9. The role of formal specifications

    International Nuclear Information System (INIS)

    McHugh, J.

    1994-01-01

    The role of formal requirements specification is discussed under the premise that the primary purpose of such specifications is to facilitate clear and unambiguous communications among the communities of interest for a given project. An example is presented in which the failure to reach such an understanding resulted in an accident at a chemical plant. Following the example, specification languages based on logical formalisms and notations are considered. These are rejected as failing to serve the communications needs of diverse communities. The notion of a specification as a surrogate for a program is also considered and rejected. The paper ends with a discussion of the type of formal notation that will serve the communications role and several encouraging developments are noted

  10. Protocol Design and Performance Analysis of Multiuser Mixed RF and Hybrid FSO/RF Relaying With Buffers

    KAUST Repository

    Al-Eryani, Yasser F.

    2018-03-07

    In this paper, a multiuser mixed radio frequency (RF) and hybrid free-space optical (FSO)/RF system is considered, where multiple mobile users transmit their data to an intermediate decode-and-forward relay node through RF links using a virtual multiple-input multipleoutput (MIMO) system, and the relay node forwards the multiplexed data of all users through a FSO link that is supported by a RF MIMO backup system to the destination. The relay node is equipped with a buffer in the physical layer for temporal storage of the users\\' data until the best channel conditions at the relay-destination link aremet. For this communication setup, we first propose a transmission protocol that achieves a multiplexing gain through a virtual MIMO system. After that, we derive closed-form expressions for the end-to-end outage probability, asymptotic outage probability, average symbol error rate, and the ergodic capacity when considering the delay-tolerant (finite buffer size) scenario. The results show that buffering in the physical layer provides a significant enhancement to the system performance (outage, error rate, and ergodic capacity). It is also found that pointing error and severe weather turbulence conditions become more tolerable with the existence of the relay\\'s buffer and RF backup link (in the second hop). In addition, the proposed virtual MIMO scheme shows a significant performance enhancement at a high number of receiving antennas, which introduces potential lowcomplexity diversity gain-based massive MIMO schemes.

  11. Protocol Design and Performance Analysis of Multiuser Mixed RF and Hybrid FSO/RF Relaying With Buffers

    KAUST Repository

    Al-Eryani, Yasser F.; Salhab, Anas; Zummo, Salam A.; Alouini, Mohamed-Slim

    2018-01-01

    In this paper, a multiuser mixed radio frequency (RF) and hybrid free-space optical (FSO)/RF system is considered, where multiple mobile users transmit their data to an intermediate decode-and-forward relay node through RF links using a virtual multiple-input multipleoutput (MIMO) system, and the relay node forwards the multiplexed data of all users through a FSO link that is supported by a RF MIMO backup system to the destination. The relay node is equipped with a buffer in the physical layer for temporal storage of the users' data until the best channel conditions at the relay-destination link aremet. For this communication setup, we first propose a transmission protocol that achieves a multiplexing gain through a virtual MIMO system. After that, we derive closed-form expressions for the end-to-end outage probability, asymptotic outage probability, average symbol error rate, and the ergodic capacity when considering the delay-tolerant (finite buffer size) scenario. The results show that buffering in the physical layer provides a significant enhancement to the system performance (outage, error rate, and ergodic capacity). It is also found that pointing error and severe weather turbulence conditions become more tolerable with the existence of the relay's buffer and RF backup link (in the second hop). In addition, the proposed virtual MIMO scheme shows a significant performance enhancement at a high number of receiving antennas, which introduces potential lowcomplexity diversity gain-based massive MIMO schemes.

  12. Formal connections in deformation quantization

    DEFF Research Database (Denmark)

    Masulli, Paolo

    The field of this thesis is deformation quantization, and we consider mainly symplectic manifolds equipped with a star product. After reviewing basics in complex geometry, we introduce quantization, focusing on geometric quantization and deformation quantization. The latter is defined as a star...... characteristic class, and that formal connections form an affine space over the derivations of the star products. Moreover, if the parameter space for the family of star products is contractible, we obtain that any two flat formal connections are gauge equivalent via a self-equivalence of the family of star...

  13. Activity Theory as a means for multi-scale analysis of the engineering design process: A protocol study of design in practice

    DEFF Research Database (Denmark)

    Cash, Philip; Hicks, Ben; Culley, Steve

    2015-01-01

    investigates design activity across different scales, referred to as macro-, meso- and microscales. In addition to establishing the range of activities and tasks that occur at, and constitute, each scale the underlying relationships between the scales of activity are discussed. Further, the paper elucidates...... the wider implications of the proposed framework and its findings for both design research and practice. Central to these implications is the articulation of design as a complex fabric of interwoven processes. © 2015 Elsevier Ltd. All rights reserved....

  14. Qualitative simulation in formal process modelling

    International Nuclear Information System (INIS)

    Sivertsen, Elin R.

    1999-01-01

    In relation to several different research activities at the OECD Halden Reactor Project, the usefulness of formal process models has been identified. Being represented in some appropriate representation language, the purpose of these models is to model process plants and plant automatics in a unified way to allow verification and computer aided design of control strategies. The present report discusses qualitative simulation and the tool QSIM as one approach to formal process models. In particular, the report aims at investigating how recent improvements of the tool facilitate the use of the approach in areas like process system analysis, procedure verification, and control software safety analysis. An important long term goal is to provide a basis for using qualitative reasoning in combination with other techniques to facilitate the treatment of embedded programmable systems in Probabilistic Safety Analysis (PSA). This is motivated from the potential of such a combination in safety analysis based on models comprising both software, hardware, and operator. It is anticipated that the research results from this activity will benefit V and V in a wide variety of applications where formal process models can be utilized. Examples are operator procedures, intelligent decision support systems, and common model repositories (author) (ml)

  15. Machine Learning-based Intelligent Formal Reasoning and Proving System

    Science.gov (United States)

    Chen, Shengqing; Huang, Xiaojian; Fang, Jiaze; Liang, Jia

    2018-03-01

    The reasoning system can be used in many fields. How to improve reasoning efficiency is the core of the design of system. Through the formal description of formal proof and the regular matching algorithm, after introducing the machine learning algorithm, the system of intelligent formal reasoning and verification has high efficiency. The experimental results show that the system can verify the correctness of propositional logic reasoning and reuse the propositional logical reasoning results, so as to obtain the implicit knowledge in the knowledge base and provide the basic reasoning model for the construction of intelligent system.

  16. Formal systems for persuasion dialogue

    NARCIS (Netherlands)

    Prakken, Henry

    This article reviews formal systems that regulate persuasion dialogues. In such dialogues two or more participants aim to resolve a difference of opinion, each trying to persuade the other participants to adopt their point of view. Systems for persuasion dialogue have found application in various

  17. Charging transient in polyvinyl formal

    Indian Academy of Sciences (India)

    Unknown

    401–406. © Indian Academy of Sciences. 401. Charging transient in polyvinyl formal. P K KHARE*, P L JAIN† and R K PANDEY‡. Department of Postgraduate Studies & Research in Physics & Electronics, Rani Durgavati University,. Jabalpur 482 001, India. †Department of Physics, Government PG College, Damoh 470 ...

  18. A formalization of computational trust

    NARCIS (Netherlands)

    Güven - Ozcelebi, C.; Holenderski, M.J.; Ozcelebi, T.; Lukkien, J.J.

    2018-01-01

    Computational trust aims to quantify trust and is studied by many disciplines including computer science, social sciences and business science. We propose a formal computational trust model, including its parameters and operations on these parameters, as well as a step by step guide to compute trust

  19. Formal monkey linguistics : The debate

    NARCIS (Netherlands)

    Schlenker, Philippe; Chemla, Emmanuel; Schel, Anne M.|info:eu-repo/dai/nl/413333450; Fuller, James; Gautier, Jean Pierre; Kuhn, Jeremy; Veselinović, Dunja; Arnold, Kate; Cäsar, Cristiane; Keenan, Sumir; Lemasson, Alban; Ouattara, Karim; Ryder, Robin; Zuberbühler, Klaus

    2016-01-01

    We explain why general techniques from formal linguistics can and should be applied to the analysis of monkey communication - in the areas of syntax and especially semantics. An informed look at our recent proposals shows that such techniques needn't rely excessively on categories of human language:

  20. Rotor and wind turbine formalism

    DEFF Research Database (Denmark)

    Branlard, Emmanuel Simon Pierre

    2017-01-01

    The main conventions used in this book for the study of rotors are introduced in this chapter. The main assumptions and notations are provided. The formalism specific to wind turbines is presented. The forces, moments, velocities and dimensionless coefficients used in the study of rotors...

  1. Automatic Testing with Formal Methods

    NARCIS (Netherlands)

    Tretmans, G.J.; Belinfante, Axel

    1999-01-01

    The use of formal system specifications makes it possible to automate the derivation of test cases from specifications. This allows to automate the whole testing process, not only the test execution part of it. This paper presents the state of the art and future perspectives in testing based on

  2. Formal Methods: Practice and Experience

    DEFF Research Database (Denmark)

    Woodcock, Jim; Larsen, Peter Gorm; Bicarregui, Juan

    2009-01-01

    . Based on this, we discuss the issues surrounding the industrial adoption of formal methods. Finally, we look to the future and describe the development of a Verified Software Repository, part of the worldwide Verified Software Initiative. We introduce the initial projects being used to populate...... the repository, and describe the challenges they address. © 2009 ACM. (146 refs.)...

  3. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  4. Starting research in interaction design with visuals for low-functioning children in the autistic spectrum: a protocol.

    Science.gov (United States)

    Parés, Narcís; Carreras, Anna; Durany, Jaume; Ferrer, Jaume; Freixa, Pere; Gómez, David; Kruglanski, Orit; Parés, Roc; Ribas, J Ignasi; Soler, Miquel; Sanjurjo, Alex

    2006-04-01

    On starting to think about interaction design for low-functioning persons in the autistic spectrum (PAS), especially children, one finds a number of questions that are difficult to answer: Can we typify the PAS user? Can we engage the user in interactive communication without generating frustrating or obsessive situations? What sort of visual stimuli can we provide? Will they prefer representational or abstract visual stimuli? Will they understand three-dimensional (3D) graphic representation? What sort of interfaces will they accept? Can we set ambitious goals such as education or therapy? Unfortunately, most of these questions have no answer yet. Hence, we decided to set an apparently simple goal: to design a "fun application," with no intention to reach the level of education or therapy. The goal was to be attained by giving the users a sense of agency--by providing first a sense of control in the interaction dialogue. Our approach to visual stimuli design has been based on the use of geometric, abstract, two-dimensional (2D), real-time computer graphics in a full-body, non-invasive, interactive space. The results obtained within the European-funded project MultiSensory Environment Design for an Interface between Autistic and Typical Expressiveness (MEDIATE) have been extremely encouraging.

  5. Software Components and Formal Methods from a Computational Viewpoint

    OpenAIRE

    Lambertz, Christian

    2012-01-01

    Software components and the methodology of component-based development offer a promising approach to master the design complexity of huge software products because they separate the concerns of software architecture from individual component behavior and allow for reusability of components. In combination with formal methods, the specification of a formal component model of the later software product or system allows for establishing and verifying important system properties in an automatic a...

  6. A police education programme to integrate occupational safety and HIV prevention: protocol for a modified stepped-wedge study design with parallel prospective cohorts to assess behavioural outcomes

    Science.gov (United States)

    Strathdee, Steffanie A; Arredondo, Jaime; Rocha, Teresita; Abramovitz, Daniela; Rolon, Maria Luisa; Patiño Mandujano, Efrain; Rangel, Maria Gudelia; Olivarria, Horcasitas Omar; Gaines, Tommi; Patterson, Thomas L; Beletsky, Leo

    2015-01-01

    Introduction Policing practices are key drivers of HIV among people who inject drugs (PWID). This paper describes the protocol for the first study to prospectively examine the impact of a police education programme (PEP) to align law enforcement and HIV prevention. PEPs incorporating HIV prevention (including harm reduction programmes like syringe exchange) have been successfully piloted in several countries but were limited to brief pre–post assessments; the impact of PEPs on policing behaviours and occupational safety is unknown. Objectives Proyecto ESCUDO (SHIELD) aims to evaluate the efficacy of the PEP on uptake of occupational safety procedures, as assessed through the incidence of needle stick injuries (NSIs) (primary outcome) and changes in knowledge of transmission, prevention and treatment of HIV and viral hepatitis; attitudes towards PWID, adverse behaviours that interfere with HIV prevention and protective behaviours (secondary outcomes). Methods/analysis ESCUDO is a hybrid type I design that simultaneously tests an intervention and an implementation strategy. Using a modified stepped-wedge design involving all active duty street-level police officers in Tijuana (N=∼1200), we will administer one 3 h PEP course to groups of 20–50 officers until the entire force is trained. NSI incidence and geocoded arrest data will be assessed from department-wide de-identified data. Of the consenting police officers, a subcohort (N=500) will be randomly sampled from each class to undergo pre-PEP and post-PEP surveys with a semiannual follow-up for 2 years to assess self-reported NSIs, attitudes and behaviour changes. The impact on PWIDs will be externally validated through a parallel cohort of Tijuana PWIDs. Ethics/dissemination Research ethics approval was obtained from the USA and Mexico. Findings will be disseminated through open access to protocol materials through the Law Enforcement and HIV Network. Trial registration number NCT02444403. PMID:26260350

  7. Revaluation of biological variation of glycated hemoglobin (HbA(1c)) using an accurately designed protocol and an assay traceable to the IFCC reference system.

    Science.gov (United States)

    Braga, Federica; Dolci, Alberto; Montagnana, Martina; Pagani, Franca; Paleari, Renata; Guidi, Gian Cesare; Mosca, Andrea; Panteghini, Mauro

    2011-07-15

    Glycated hemoglobin (HbA(1c)) has a key role for diagnosing diabetes and monitoring glycemic state. As recently reviewed, available data on HbA(1c) biological variation show marked heterogeneity. Here we experimentally revaluated these data using a well designed protocol. We took five EDTA whole blood specimens from 18 apparently healthy subjects on the same day, every two weeks for two months. Samples were stored at -80°C until analysis and assayed in duplicate in a single run by Roche Tina-quant® Gen.2 immunoassay. Data were analyzed by the ANOVA. To assess the assay traceability to the IFCC reference method, we preliminarily carried out a correlation experiment. The bias (mean±SD) of the Roche immunoassay was 0.3%±0.7%, confirming the traceability of the employed assay. No difference was found in HbA(1c) values between men and women. Within- and between-subject CV were 2.5% and 7.1%, respectively. Derived desirable analytical goals for imprecision, bias, and total error resulted 1.3%, 1.9%, and 3.9%, respectively. HbA(1c) had marked individuality, limiting the use of population-based reference limits for test interpretation. The estimated critical difference was ~10%. For the first time we defined biological variation and derived indices for the clinical application of HbA(1c) measurements using an accurately designed protocol and an assay standardized according to the IFCC. Copyright © 2011 Elsevier B.V. All rights reserved.

  8. From Safety Analysis to Formal Specification

    DEFF Research Database (Denmark)

    Hansen, Kirsten Mark; Ravn, Anders P.; Stavridou, Victoria

    1998-01-01

    Software for safety critical systems must deal with the hazards identified bysafety analysis. This paper investigates, how the results of onesafety analysis technique, fault trees, are interpreted as software safetyrequirements to be used in the program design process. We propose thatfault tree...... analysis and program development use the samesystem model. This model is formalized in areal-time, interval logic, based on a conventional dynamic systems modelwith state evolving over time. Fault trees are interpreted astemporal formulas, and it is shown how such formulas can be usedfor deriving safety...

  9. Study protocol: developing a decision system for inclusive housing: applying a systematic, mixed-method quasi-experimental design

    Directory of Open Access Journals (Sweden)

    Heidi Zeeman

    2016-03-01

    Full Text Available Abstract Background Identifying the housing preferences of people with complex disabilities is a much needed, but under-developed area of practice and scholarship. Despite the recognition that housing is a social determinant of health and quality of life, there is an absence of empirical methodologies that can practically and systematically involve consumers in this complex service delivery and housing design market. A rigorous process for making effective and consistent development decisions is needed to ensure resources are used effectively and the needs of consumers with complex disability are properly met. Methods/Design This 3-year project aims to identify how the public and private housing market in Australia can better respond to the needs of people with complex disabilities whilst simultaneously achieving key corporate objectives. First, using the Customer Relationship Management framework, qualitative (Nominal Group Technique and quantitative (Discrete Choice Experiment methods will be used to quantify the housing preferences of consumers and their carers. A systematic mixed-method, quasi-experimental design will then be used to quantify the development priorities of other key stakeholders (e.g., architects, developers, Government housing services etc. in relation to inclusive housing for people with complex disabilities. Stakeholders randomly assigned to Group 1 (experimental group will participate in a series of focus groups employing Analytical Hierarchical Process (AHP methodology. Stakeholders randomly assigned to Group 2 (control group will participate in focus groups employing existing decision making processes to inclusive housing development (e.g., Risk, Opportunity, Cost, Benefit considerations. Using comparative stakeholder analysis, this research design will enable the AHP methodology (a proposed tool to guide inclusive housing development decisions to be tested. Discussion It is anticipated that the findings of this study

  10. Design and implementation of a medium speed communications interface and protocol for a low cost, refreshed display computer

    Science.gov (United States)

    Phyne, J. R.; Nelson, M. D.

    1975-01-01

    The design and implementation of hardware and software systems involved in using a 40,000 bit/second communication line as the connecting link between an IMLAC PDS 1-D display computer and a Univac 1108 computer system were described. The IMLAC consists of two independent processors sharing a common memory. The display processor generates the deflection and beam control currents as it interprets a program contained in the memory; the minicomputer has a general instruction set and is responsible for starting and stopping the display processor and for communicating with the outside world through the keyboard, teletype, light pen, and communication line. The processing time associated with each data byte was minimized by designing the input and output processes as finite state machines which automatically sequence from each state to the next. Several tests of the communication link and the IMLAC software were made using a special low capacity computer grade cable between the IMLAC and the Univac.

  11. Proceedings of the First NASA Formal Methods Symposium

    Science.gov (United States)

    Denney, Ewen (Editor); Giannakopoulou, Dimitra (Editor); Pasareanu, Corina S. (Editor)

    2009-01-01

    Topics covered include: Model Checking - My 27-Year Quest to Overcome the State Explosion Problem; Applying Formal Methods to NASA Projects: Transition from Research to Practice; TLA+: Whence, Wherefore, and Whither; Formal Methods Applications in Air Transportation; Theorem Proving in Intel Hardware Design; Building a Formal Model of a Human-Interactive System: Insights into the Integration of Formal Methods and Human Factors Engineering; Model Checking for Autonomic Systems Specified with ASSL; A Game-Theoretic Approach to Branching Time Abstract-Check-Refine Process; Software Model Checking Without Source Code; Generalized Abstract Symbolic Summaries; A Comparative Study of Randomized Constraint Solvers for Random-Symbolic Testing; Component-Oriented Behavior Extraction for Autonomic System Design; Automated Verification of Design Patterns with LePUS3; A Module Language for Typing by Contracts; From Goal-Oriented Requirements to Event-B Specifications; Introduction of Virtualization Technology to Multi-Process Model Checking; Comparing Techniques for Certified Static Analysis; Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder; jFuzz: A Concolic Whitebox Fuzzer for Java; Machine-Checkable Timed CSP; Stochastic Formal Correctness of Numerical Algorithms; Deductive Verification of Cryptographic Software; Coloured Petri Net Refinement Specification and Correctness Proof with Coq; Modeling Guidelines for Code Generation in the Railway Signaling Context; Tactical Synthesis Of Efficient Global Search Algorithms; Towards Co-Engineering Communicating Autonomous Cyber-Physical Systems; and Formal Methods for Automated Diagnosis of Autosub 6000.

  12. Study protocol: developing a decision system for inclusive housing: applying a systematic, mixed-method quasi-experimental design.

    Science.gov (United States)

    Zeeman, Heidi; Kendall, Elizabeth; Whitty, Jennifer A; Wright, Courtney J; Townsend, Clare; Smith, Dianne; Lakhani, Ali; Kennerley, Samantha

    2016-03-15

    Identifying the housing preferences of people with complex disabilities is a much needed, but under-developed area of practice and scholarship. Despite the recognition that housing is a social determinant of health and quality of life, there is an absence of empirical methodologies that can practically and systematically involve consumers in this complex service delivery and housing design market. A rigorous process for making effective and consistent development decisions is needed to ensure resources are used effectively and the needs of consumers with complex disability are properly met. This 3-year project aims to identify how the public and private housing market in Australia can better respond to the needs of people with complex disabilities whilst simultaneously achieving key corporate objectives. First, using the Customer Relationship Management framework, qualitative (Nominal Group Technique) and quantitative (Discrete Choice Experiment) methods will be used to quantify the housing preferences of consumers and their carers. A systematic mixed-method, quasi-experimental design will then be used to quantify the development priorities of other key stakeholders (e.g., architects, developers, Government housing services etc.) in relation to inclusive housing for people with complex disabilities. Stakeholders randomly assigned to Group 1 (experimental group) will participate in a series of focus groups employing Analytical Hierarchical Process (AHP) methodology. Stakeholders randomly assigned to Group 2 (control group) will participate in focus groups employing existing decision making processes to inclusive housing development (e.g., Risk, Opportunity, Cost, Benefit considerations). Using comparative stakeholder analysis, this research design will enable the AHP methodology (a proposed tool to guide inclusive housing development decisions) to be tested. It is anticipated that the findings of this study will enable stakeholders to incorporate consumer housing

  13. Digital system verification a combined formal methods and simulation framework

    CERN Document Server

    Li, Lun

    2010-01-01

    Integrated circuit capacity follows Moore's law, and chips are commonly produced at the time of this writing with over 70 million gates per device. Ensuring correct functional behavior of such large designs before fabrication poses an extremely challenging problem. Formal verification validates the correctness of the implementation of a design with respect to its specification through mathematical proof techniques. Formal techniques have been emerging as commercialized EDA tools in the past decade. Simulation remains a predominantly used tool to validate a design in industry. After more than 5

  14. Intradural approach to selective stimulation in the spinal cord for treatment of intractable pain: design principles and wireless protocol

    Science.gov (United States)

    Howard, M. A.; Utz, M.; Brennan, T. J.; Dalm, B. D.; Viljoen, S.; Jeffery, N. D.; Gillies, G. T.

    2011-08-01

    We introduce an intradural approach to spinal cord stimulation for the relief of intractable pain, and describe the biophysical rationale that underlies its design and performance requirements. The proposed device relies on wireless, inductive coupling between a pial surface implant and its epidural controller, and we present the results of benchtop experiments that demonstrate the ability to transmit and receive a frequency-modulated 1.6 MHz carrier signal between micro-coil antennae scaled to the ≈ 1 cm dimensions of the implant, at power levels of about 5 mW. Plans for materials selection, microfabrication, and other aspects of future development are presented and discussed.

  15. SABE Colombia: Survey on Health, Well-Being, and Aging in Colombia—Study Design and Protocol

    Science.gov (United States)

    Corchuelo, Jairo; Curcio, Carmen-Lucia; Calzada, Maria-Teresa; Mendez, Fabian

    2016-01-01

    Objective. To describe the design of the SABE Colombia study. The major health study of the old people in Latin America and the Caribbean (LAC) is the Survey on Health, Well-Being, and Aging in LAC, SABE (from initials in Spanish: SAlud, Bienestar & Envejecimiento). Methods. The SABE Colombia is a population-based cross-sectional study on health, aging, and well-being of elderly individuals aged at least 60 years focusing attention on social determinants of health inequities. Methods and design were similar to original LAC SABE. The total sample size of the study at the urban and rural research sites (244 municipalities) was 23.694 elderly Colombians representative of the total population. The study had three components: (1) a questionnaire covering active aging determinants including anthropometry, blood pressure measurement, physical function, and biochemical and hematological measures; (2) a subsample survey among family caregivers; (3) a qualitative study with gender and cultural perspectives of quality of life to understand different dimensions of people meanings. Conclusions. The SABE Colombia is a comprehensive, multidisciplinary study of the elderly with respect to active aging determinants. The results of this study are intended to inform public policies aimed at tackling health inequalities for the aging society in Colombia. PMID:27956896

  16. Protocol for the design of an instrument to measure preadolescent children's self-report of covert aggression and bullying

    Science.gov (United States)

    Nelson, Helen Jean; Kendall, Garth Edward; Burns, Sharyn; Schonert-Reichl, Kimberly

    2015-01-01

    Introduction Covert bullying in schools is associated with a range of academic, social, emotional and physical health problems. Much research has focused on bullying, but there remains a gap in understanding about covert aggression and how to most accurately and reliably measure children's own reports of this behaviour. This paper reviews relevant literature and outlines a research project that aims to develop a self-report instrument that effectively measures covert aggression and bullying. It is anticipated that this research will result in a standardised instrument that is suitable for exploring preadolescent children's experiences of covert aggressive behaviour. The data collected by the instrument will enhance health and education professionals understanding of covert bullying behaviours and will inform the design and evaluation of interventions. Methods and analysis Relational developmental systems theory will guide the design of an online self-report instrument. The first phase of the project will include a critical review of the research literature, focus groups with children aged 8–12 years (grades 4–6) in Perth, Western Australia, and expert review. The instrument will be explored for content and face validity prior to the assessment of convergent and discriminant validity, internal consistency and test-retest reliability. Ethics and dissemination The study has been approved by the Curtin University of Human Research Ethics Committee (RDHS-38-15) and by the Executive Principal of the participating school. PMID:26553834

  17. Formal Institutions and Subjective Wellbeing

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Dreher, Axel; Fischer, Justina A.V.

    2010-01-01

    A long tradition in economics explores the association between the quality of formal institutions and economic performance. The literature on the relationship between such institutions and happiness is, however, rather limited, and inconclusive. In this paper, we revisit the findings from recent...... cross-country studies on the institution-happiness association. Our findings suggest that their conclusions are qualitatively rather insensitive to the specific measure of 'happiness' used, while the associations between formal institutions and subjective well-being differ among poor and rich countries....... Separating different types of institutional quality, we find that in low-income countries the effects of economic-judicial institutions on happiness dominate those of political institutions, while analyses restricted to middle- and high-income countries show strong support for an additional beneficial effect...

  18. Contextual approach to quantum formalism

    CERN Document Server

    Khrennikov, Andrei

    2009-01-01

    The aim of this book is to show that the probabilistic formalisms of classical statistical mechanics and quantum mechanics can be unified on the basis of a general contextual probabilistic model. By taking into account the dependence of (classical) probabilities on contexts (i.e. complexes of physical conditions), one can reproduce all distinct features of quantum probabilities such as the interference of probabilities and the violation of Bell’s inequality. Moreover, by starting with a formula for the interference of probabilities (which generalizes the well known classical formula of total probability), one can construct the representation of contextual probabilities by complex probability amplitudes or, in the abstract formalism, by normalized vectors of the complex Hilbert space or its hyperbolic generalization. Thus the Hilbert space representation of probabilities can be naturally derived from classical probabilistic assumptions. An important chapter of the book critically reviews known no-go theorems...

  19. Polynomials formalism of quantum numbers

    International Nuclear Information System (INIS)

    Kazakov, K.V.

    2005-01-01

    Theoretical aspects of the recently suggested perturbation formalism based on the method of quantum number polynomials are considered in the context of the general anharmonicity problem. Using a biatomic molecule by way of example, it is demonstrated how the theory can be extrapolated to the case of vibrational-rotational interactions. As a result, an exact expression for the first coefficient of the Herman-Wallis factor is derived. In addition, the basic notions of the formalism are phenomenologically generalized and expanded to the problem of spin interaction. The concept of magneto-optical anharmonicity is introduced. As a consequence, an exact analogy is drawn with the well-known electro-optical theory of molecules, and a nonlinear dependence of the magnetic dipole moment of the system on the spin and wave variables is established [ru

  20. Methodology of formal software evaluation

    International Nuclear Information System (INIS)

    Tuszynski, J.

    1998-01-01

    Sydkraft AB, the major Swedish utility, owner of ca 6000 MW el installed in nuclear (NPP Barsebaeck and NPP Oskarshamn), fossil fuel and hydro Power Plants is facing modernization of the control systems of the plants. Standards applicable require structured, formal methods for implementation of the control functions in the modem, real time software systems. This presentation introduces implementation methodology as discussed presently at the Sydkraft organisation. The approach suggested is based upon the process of co-operation of three parties taking part in the implementation; owner of the plant, vendor and Quality Assurance (QA) organisation. QA will be based on tools for formal software validation and on systematic gathering by the owner of validated and proved-by-operation control modules for the concern-wide utilisation. (author)

  1. Stroh formalism and Rayleigh waves

    CERN Document Server

    Tanuma, Kazumi

    2008-01-01

    Introduces a powerful and elegant mathematical method for the analysis of anisotropic elasticity equationsThe reader can grasp the essentials as quickly as possibleCan be used as a textbook, which presents compactly introduction and applications of the Stroh formalismAppeals to the people not only in mathematics but also in mechanics and engineering sciencePrerequisites are only basic linear algebra, calculus and fundamentals of differential equations

  2. Variational formalism for spin particles

    International Nuclear Information System (INIS)

    Horvathy, P.

    1977-11-01

    The geometrical formulation of Hamilton's principle presented in a previous paper has been related to the usual one in terms of Lagrangian functions. The exact conditions for their equivalence are obtained and a method is given for the construction of a Lagrangian function. The formalism is extended to spin particles and a local Lagrangian is constructed in this case, too. However, this function cannot be extended to a global one. (D.P.)

  3. Review of the helicity formalism

    International Nuclear Information System (INIS)

    Barreiro, F.; Cerrada, M.; Fernandez, E.

    1972-01-01

    Our purpose in these notes has been to present a brief and general review of the helicity formalism. We begin by discussing Lorentz invariance, spin and helicity ideas, in section 1 . In section 2 we deal with the construction of relativistic states and scattering amplitudes in the helicity basis and we study their transformation properties under discrete symmetries. Finally we present some more sophisticated topics like kinematical singularities of helicity amplitudes, kinematical constraints and crossing relations 3, 4, 5 respectively. (Author) 8 refs

  4. Ashtekar formalism with real variables

    International Nuclear Information System (INIS)

    Kalau, W.; Nationaal Inst. voor Kernfysica en Hoge-Energiefysica

    1990-12-01

    A new approach to canonical gravity is presented which is based on the Ashtekar formalism. But, in contrast to Ashtekar's variables, this formulation does not need complex quantities nor does it lead to second class constraints. This is achieved using SO(3,1) as a gauge group instead of complexified SO(3). Because of the larger group additional first class constraints are needed which turn out to be cubic and quartic in the momenta. (author). 13 refs

  5. Implementation of evidence on the nurse-patient relationship in psychiatric wards through a mixed method design: study protocol.

    Science.gov (United States)

    Moreno-Poyato, Antonio R; Delgado-Hito, Pilar; Suárez-Pérez, Raquel; Leyva-Moral, Juan M; Aceña-Domínguez, Rosa; Carreras-Salvador, Regina; Roldán-Merino, Juan F; Lluch-Canut, Teresa; Montesó-Curto, Pilar

    2017-01-01

    Psychiatric nurses are aware of the importance of the therapeutic relationship in psychiatric units. Nevertheless, a review of the scientific evidence indicates that theoretical knowledge alone is insufficient to establish an adequate therapeutic alliance. Therefore, strategies are required to promote changes to enhance the establishment of the working relationship. The aims of the study are to generate changes in how nurses establish the therapeutic relationship in acute psychiatric units, based on participative action research and to evaluate the effectiveness of the implementation of evidence through this method. The study will use a mixed method design. Qualitative methodology, through participative action research, will be employed to implement scientific evidence on the therapeutic relationship. A quasi-experimental, one-group, pre-test/post-test design will also be used to quantitatively measure the effectiveness of the implementation of the evidence. Participants will consist of nurses and patients from two psychiatric units in Barcelona. Nurses will be selected by theoretical sampling, and patients assigned to each nurses will be selected by consecutive sampling. Qualitative data will be gathered through discussion groups and field diaries. Quantitative data will be collected through the Working Alliance Inventory and the Interpersonal Reactivity Index. Qualitative data will be analysed through the technique of content analysis and quantitative data through descriptive and inferential statistics. This study will help to understand the process of change in a nursing team working in an inpatient psychiatric ward and will allow nurses to generate knowledge, identify difficulties, and establish strategies to implement change, as well as to assess whether the quality of the care they provide shows a qualitative improvement.

  6. Formal specification level concepts, methods, and algorithms

    CERN Document Server

    Soeken, Mathias

    2015-01-01

    This book introduces a new level of abstraction that closes the gap between the textual specification of embedded systems and the executable model at the Electronic System Level (ESL). Readers will be enabled to operate at this new, Formal Specification Level (FSL), using models which not only allow significant verification tasks in this early stage of the design flow, but also can be extracted semi-automatically from the textual specification in an interactive manner.  The authors explain how to use these verification tasks to check conceptual properties, e.g. whether requirements are in conflict, as well as dynamic behavior, in terms of execution traces. • Serves as a single-source reference to a new level of abstraction for embedded systems, known as the Formal Specification Level (FSL); • Provides a variety of use cases which can be adapted to readers’ specific design flows; • Includes a comprehensive illustration of Natural Language Processing (NLP) techniques, along with examples of how to i...

  7. Understanding influences on the uptake of pulmonary rehabilitation in the East of England: an Inclusive Design/mixed-methods study protocol.

    Science.gov (United States)

    Liu, Yuanyuan; Dickerson, Terry; Early, Frances; Fuld, Jonathan; Clarkson, P John

    2018-04-24

    1.2 million people in the UK have chronic obstructive pulmonary disease (COPD) that causes breathlessness, difficulty with daily activities, infections and hospitalisation. Pulmonary rehabilitation (PR), a programme of supervised exercise and education, is recommended for patients with COPD. However, only 1 in 10 of those who need it receive PR. Also, the UK National COPD Audit Programme concluded that the COPD treatment might not be accessible to people with disabilities. This paper applies an Inclusive Design approach to community-based PR service provisions. It aims to inform improvements to the PR service by identifying barriers to the uptake of PR in the COPD care journey in relation to patients' capabilities that can affect their access to PR. The protocol includes four steps. Step 1 will involve interviews with healthcare professionals and patients to gather insight into their experiences and produce a hierarchical task analysis of the COPD care journeys. Step 2 will estimate the service exclusion: the demand of every task on patients' capabilities will be rated by predefined scales, and the proportion of the population excluded from the service will be estimated by an exclusion calculator. Step 3 will identify the challenges of the PR service; a framework analysis will guide the data analysis of the interviews and care journey. Step 4 will propose recommendations to help patients manage their COPD care informed by the challenges identified in step 3 and refine recommendations through interviews and focus groups. The Cambridge Central Research Ethics Committee gave the study protocol a positive ethical opinion (17/EE/0136). Study results will be disseminated through peer-reviewed journals, conferences and the British Lung Foundation networks. They will also be fed into a Research for Patient Benefit project on increasing the referral and uptake of PR. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All

  8. Computer classes and games in virtual reality environment to reduce loneliness among students of an elderly reference center: Study protocol for a randomised cross-over design.

    Science.gov (United States)

    Antunes, Thaiany Pedrozo Campos; Oliveira, Acary Souza Bulle de; Crocetta, Tania Brusque; Antão, Jennifer Yohanna Ferreira de Lima; Barbosa, Renata Thais de Almeida; Guarnieri, Regiani; Massetti, Thais; Monteiro, Carlos Bandeira de Mello; Abreu, Luiz Carlos de

    2017-03-01

    Physical and mental changes associated with aging commonly lead to a decrease in communication capacity, reducing social interactions and increasing loneliness. Computer classes for older adults make significant contributions to social and cognitive aspects of aging. Games in a virtual reality (VR) environment stimulate the practice of communicative and cognitive skills and might also bring benefits to older adults. Furthermore, it might help to initiate their contact to the modern technology. The purpose of this study protocol is to evaluate the effects of practicing VR games during computer classes on the level of loneliness of students of an elderly reference center. This study will be a prospective longitudinal study with a randomised cross-over design, with subjects aged 50 years and older, of both genders, spontaneously enrolled in computer classes for beginners. Data collection will be done in 3 moments: moment 0 (T0) - at baseline; moment 1 (T1) - after 8 typical computer classes; and moment 2 (T2) - after 8 computer classes which include 15 minutes for practicing games in VR environment. A characterization questionnaire, the short version of the Short Social and Emotional Loneliness Scale for Adults (SELSA-S) and 3 games with VR (Random, MoviLetrando, and Reaction Time) will be used. For the intervention phase 4 other games will be used: Coincident Timing, Motor Skill Analyser, Labyrinth, and Fitts. The statistical analysis will compare the evolution in loneliness perception, performance, and reaction time during the practice of the games between the 3 moments of data collection. Performance and reaction time during the practice of the games will also be correlated to the loneliness perception. The protocol is approved by the host institution's ethics committee under the number 52305215.3.0000.0082. Results will be disseminated via peer-reviewed journal articles and conferences. This clinical trial is registered at ClinicalTrials.gov identifier: NCT

  9. 'BioQuaRT' project: design of a novel in situ protocol for the simultaneous visualisation of chromosomal aberrations and micronuclei after irradiation at microbeam facilities

    International Nuclear Information System (INIS)

    Patrono, C.; Testa, A.; Monteiro Gil, O.; Giesen, U.; Langner, F.; Rabus, H.; Pinto, M.

    2015-01-01

    The aim of the 'BioQuaRT' (Biologically weighted Quantities in Radiotherapy) project is to develop measurement techniques for characterising charged particle track structure on different length scales, and to correlate at the cellular level the track structure properties with the biological effects of radiation. This multi-scale approach will allow characterisation of the radiation qualities used in radiotherapy and the related biological effects. Charged-particle microbeam facilities were chosen as the platforms for all radiobiology experiments in the 'BioQuaRT' project, because they allow targeting single cells (or compartments of a cell) with a predefined number of ionising particles and correlating the cell-by-cell induced damage with type and energy of the radiation and with the number of ions per cell. Within this project, a novel in situ protocol was developed for the analysis of the mis-repaired and/or unrepaired chromosome damage induced by charged-particle irradiations at the Physikalisch-Technische Bundesanstalt (PTB) ion microbeam facility. Among the cytogenetic biomarkers to detect and estimate radiation-induced DNA damage in radiobiology, chromosomal aberrations and micronuclei were chosen. The characteristics of the PTB irradiation system required the design of a special in situ assay: specific irradiation dishes with a base made from a bio-foil 25-μm thick and only 3000-4000 cells seeded and irradiated per dish. This method was developed on Chinese hamster ovary (CHO) cells, one of the most commonly used cell lines in radiobiology in vitro experiments. The present protocol allows the simultaneous scoring of chromosome aberrations and micronuclei on the same irradiated dish. Thanks to its versatility, this method could also be extended to other radiobiological applications besides the single-ion microbeam irradiations. (authors)

  10. Considerations for the design and execution of protocols for animal research and treatment to improve reproducibility and standardization: "DEPART well-prepared and ARRIVE safely".

    Science.gov (United States)

    Smith, M M; Clarke, E C; Little, C B

    2017-03-01

    To review the factors in experimental design that contribute to poor translation of pre-clinical research to therapies for patients with osteoarthritis (OA) and how this might be improved. Narrative review of the literature, and evaluation of the different stages of design conduct and analysis of studies using animal models of OA to define specific issues that might reduce quality of evidence and how this can be minimised. Preventing bias and improving experimental rigour and reporting are important modifiable factors to improve translation from pre-clinical animal models to successful clinical trials of therapeutic agents. Despite publication and adoption by many journals of guidelines such as Animals in Research: Reporting In Vivo Experiments (ARRIVE), experimental animal studies published in leading rheumatology journals are still deficient in their reporting. In part, this may be caused by researchers first consulting these guidelines after the completion of experiments, at the time of publication. This review discusses factors that can (1) bias the outcome of experimental studies using animal models of osteoarthritis or (2) alter the quality of evidence for translation. We propose a checklist to consult prior to starting experiments; in the Design and Execution of Protocols for Animal Research and Treatment (DEPART). Following DEPART during the design phase will enable completion of the ARRIVE checklist at the time of publication, and thus improve the quality of evidence for inclusion of experimental animal research in meta-analyses and systematic reviews: "DEPART well-prepared and ARRIVE safely". Copyright © 2016 Osteoarthritis Research Society International. Published by Elsevier Ltd. All rights reserved.

  11. Efficacy of acupuncture for chronic knee pain: protocol for a randomised controlled trial using a Zelen design

    Directory of Open Access Journals (Sweden)

    Hinman Rana S

    2012-09-01

    Full Text Available Abstract Background Chronic knee pain is a common and disabling condition in people over 50 years of age, with knee joint osteoarthritis being a major cause. Acupuncture is a popular form of complementary and alternative medicine for treating pain and dysfunction associated with musculoskeletal conditions. This pragmatic Zelen-design randomised controlled trial is investigating the efficacy and cost-effectiveness of needle and laser acupuncture, administered by medical practitioners, in people with chronic knee pain. Methods/Design Two hundred and eighty two people aged over 50 years with chronic knee pain have been recruited from metropolitan Melbourne and regional Victoria, Australia. Participants originally consented to participate in a longitudinal natural history study but were then covertly randomised into one of four treatment groups. One group continued as originally consented (ie natural history group and received no acupuncture treatment. The other three were treatment groups: i laser acupuncture, ii sham laser or, iii needle acupuncture. Acupuncture treatments used a combined Western and Traditional Chinese Medicine style, were delivered by general practitioners and comprised 8–12 visits over 12 weeks. Follow-up is currently ongoing. The primary outcomes are pain measured by an 11-point numeric rating scale (NRS and self-reported physical function measured by the Western Ontario and McMaster (WOMAC Universities Osteoarthritis Index subscale at the completion of treatment at 12 weeks. Secondary outcomes include quality of life, global rating of change scores and additional measures of pain (other NRS and WOMAC subscale and physical function (NRS. Additional parameters include a range of psychosocial measures in order to evaluate potential relationships with acupuncture treatment outcomes. Relative cost-effectiveness will be determined from health service usage and outcome data. Follow-up assessments will also occur at 12

  12. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  13. Decontamination systems information and research program -- Literature review in support of development of standard test protocols and barrier design models for in situ formed barriers project

    International Nuclear Information System (INIS)

    1994-12-01

    The US Department of Energy is responsible for approximately 3,000 sites in which contaminants such as carbon tetrachloride, trichlorethylene, perchlorethylene, non-volatile and soluble organic and insoluble organics (PCBs and pesticides) are encountered. In specific areas of these sites radioactive contaminants are stored in underground storage tanks which were originally designed and constructed with a 30-year projected life. Many of these tanks are now 10 years beyond the design life and failures have occurred allowing the basic liquids (ph of 8 to 9) to leak into the unconsolidated soils below. Nearly one half of the storage tanks located at the Hanford Washington Reservation are suspected of leaking and contaminating the soils beneath them. The Hanford site is located in a semi-arid climate region with rainfall of less than 6 inches annually, and studies have indicated that very little of this water finds its way to the groundwater to move the water down gradient toward the Columbia River. This provides the government with time to develop a barrier system to prevent further contamination of the groundwater, and to develop and test remediation systems to stabilize or remove the contaminant materials. In parallel to remediation efforts, confinement and containment technologies are needed to retard or prevent the advancement of contamination plumes through the environment until the implementation of remediation technology efforts are completed. This project examines the various confinement and containment technologies and protocols for testing the materials in relation to their function in-situ

  14. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents

    Directory of Open Access Journals (Sweden)

    Chunxue Wu

    2017-11-01

    Full Text Available Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  15. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents.

    Science.gov (United States)

    Wu, Chunxue; Wu, Wenliang; Wan, Caihua; Bekkering, Ernst; Xiong, Naixue

    2017-11-03

    Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  16. Evaluation of a clinical decision support tool for osteoporosis disease management: protocol for an interrupted time series design.

    Science.gov (United States)

    Kastner, Monika; Sawka, Anna; Thorpe, Kevin; Chignel, Mark; Marquez, Christine; Newton, David; Straus, Sharon E

    2011-07-22

    Osteoporosis affects over 200 million people worldwide at a high cost to healthcare systems. Although guidelines on assessing and managing osteoporosis are available, many patients are not receiving appropriate diagnostic testing or treatment. Findings from a systematic review of osteoporosis interventions, a series of mixed-methods studies, and advice from experts in osteoporosis and human-factors engineering were used collectively to develop a multicomponent tool (targeted to family physicians and patients at risk for osteoporosis) that may support clinical decision making in osteoporosis disease management at the point of care. A three-phased approach will be used to evaluate the osteoporosis tool. In phase 1, the tool will be implemented in three family practices. It will involve ensuring optimal functioning of the tool while minimizing disruption to usual practice. In phase 2, the tool will be pilot tested in a quasi-experimental interrupted time series (ITS) design to determine if it can improve osteoporosis disease management at the point of care. Phase 3 will involve conducting a qualitative postintervention follow-up study to better understand participants' experiences and perceived utility of the tool and readiness to adopt the tool at the point of care. The osteoporosis tool has the potential to make several contributions to the development and evaluation of complex, chronic disease interventions, such as the inclusion of an implementation strategy prior to conducting an evaluation study. Anticipated benefits of the tool may be to increase awareness for patients about osteoporosis and its associated risks and provide an opportunity to discuss a management plan with their physician, which may all facilitate patient self-management.

  17. Marathon Kids UK: study design and protocol for a mixed methods evaluation of a school-based running programme

    Science.gov (United States)

    Routen, Ash C; Harris, Jo P; Cale, Lorraine A; Gorely, Trish; Sherar, Lauren B

    2018-01-01

    Introduction Schools are promising settings for physical activity promotion; however, they are complex and adaptive systems that can influence the quality of programme implementation. This paper presents an evaluation of a school-based running programme (Marathon Kids). The aims of this study are (1) to identify the processes by which schools implement the programme, (2) identify and explain the contextual factors affecting implementation and explications of effectiveness and (3) examine the relationship between the level of implementation and perceived outcomes. Methods Using a realist evaluation framework, a mixed method single-group before-and-after design, strengthened by multiple interim measurements, will be used. Year 5 (9–10 years old) pupils and their teachers will be recruited from six state-funded primary schools in Leicestershire, UK. Data will be collected once prior to implementation, at five discrete time points during implementation and twice following implementation. A weekly implementation log will also be used. At time point 1 (TP1) (September 2016), data on school environment, teacher and pupil characteristics will be collected. At TP1 and TP6 (July 2017), accelerometry, pupil self-reported physical activity and psychosocial data (eg, social support and intention to be active) will be collected. At TP2, TP3 and TP5 (January, March and June 2017), observations will be conducted. At TP2 and TP5, there will be teacher interviews and pupil focus groups. Follow-up teacher interviews will be conducted at TP7 and TP8 (October 2017 and March 2018) and pupil focus group at TP8. In addition, synthesised member checking will be conducted (June 2018) with a mixed sample of schools. Ethics and dissemination Ethical approval for this study was obtained through Loughborough University Human Participants Ethics Subcommittee (R16-P032 & R16-P116). Findings will be disseminated via print, online media and dissemination events as well as practitioner and

  18. Formalized search strategies for human risk contributions

    International Nuclear Information System (INIS)

    Rasmussen, J.; Pedersen, O.M.

    1982-07-01

    For risk management, the results of a probabilistic risk analysis (PRA) as well as the underlying assumptions can be used as references in a closed-loop risk control; and the analyses of operational experiences as a means of feedback. In this context, the need for explicit definition and documentation of the PRA coverage, including the search strategies applied, is discussed and aids are proposed such as plant description in terms of a formal abstraction hierarchy and use of cause-consequence-charts for the documentation of not only the results of PRA but also of its coverage. Typical human risk contributions are described on the basis of general plant design features relevant for risk and accident analysis. With this background, search strategies for human risk contributions are treated: Under the designation ''work analysis'', procedures for the analysis of familiar, well trained, planned tasks are proposed. Strategies for identifying human risk contributions outside this category are outlined. (author)

  19. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  20. Exploiting formal, non-formal and informal learning when using business games in leadership education

    DEFF Research Database (Denmark)

    Børgesen, Kenneth; Nielsen, Rikke Kristine; Henriksen, Thomas Duus

    2016-01-01

    Purpose This paper aims to address the necessity of allowing non-formal and informal processes to unfold when using business games for leadership development. While games and simulations have long been used in management training and leadership development, emphasis has been placed on the formal...... of the process is not assessed. Practical implications This paper suggests that the use of business games in leadership development should focus more on the processes and activities surrounding the game rather than narrowly focusing on the game. Originality/value This paper suggests a novel approach to using...... parts of the process and especially on the gaming experience. Design/methodology/approach This paper is based on a qualitative study of a French management game on change management, in which the game-based learning process is examined in light of adult learning. Findings This paper concludes that less...

  1. Designing an implementation strategy to improve interprofessional shared decision making in sciatica: study protocol of the DISC study

    Directory of Open Access Journals (Sweden)

    Hofstede Stefanie N

    2012-06-01

    Full Text Available Abstract Background Sciatica is a common condition worldwide that is characterized by radiating leg pain and regularly caused by a herniated disc with nerve root compression. Sciatica patients with persisting leg pain after six to eight weeks were found to have similar clinical outcomes and associated costs after prolonged conservative treatment or surgery at one year follow-up. Guidelines recommend that the team of professionals involved in sciatica care and patients jointly decide about treatment options, so-called interprofessional shared decision making (SDM. However, there are strong indications that SDM for sciatica patients is not integrated in daily practice. We designed a study aiming to explore the barriers and facilitators associated with the everyday embedding of SDM for sciatica patients. All related relevant professionals and patients are involved to develop a tailored strategy to implement SDM for sciatica patients. Methods The study consists of two phases: identification of barriers and facilitators and development of an implementation strategy. First, barriers and facilitators are explored using semi-structured interviews among eight professionals of each (paramedical discipline involved in sciatica care (general practitioners, physical therapists, neurologists, neurosurgeons, and orthopedic surgeons. In addition, three focus groups will be conducted among patients. Second, the identified barriers and facilitators will be ranked using a questionnaire among a representative Dutch sample of 200 GPs, 200 physical therapists, 200 neurologists, all 124 neurosurgeons, 200 orthopedic surgeons, and 100 patients. A tailored team-based implementation strategy will be developed based on the results of the first phase using the principles of intervention mapping and an expert panel. Discussion Little is known about effective strategies to increase the uptake of SDM. Most implementation strategies only target a single discipline, whereas

  2. Designing an implementation strategy to improve interprofessional shared decision making in sciatica: study protocol of the DISC study.

    Science.gov (United States)

    Hofstede, Stefanie N; Marang-van de Mheen, Perla J; Assendelft, Willem J J; Vleggeert-Lankamp, Carmen L A; Stiggelbout, Anne M; Vroomen, Patrick C A J; van den Hout, Wilbert B; Vliet Vlieland, Thea P M; van Bodegom-Vos, Leti

    2012-06-15

    Sciatica is a common condition worldwide that is characterized by radiating leg pain and regularly caused by a herniated disc with nerve root compression. Sciatica patients with persisting leg pain after six to eight weeks were found to have similar clinical outcomes and associated costs after prolonged conservative treatment or surgery at one year follow-up. Guidelines recommend that the team of professionals involved in sciatica care and patients jointly decide about treatment options, so-called interprofessional shared decision making (SDM). However, there are strong indications that SDM for sciatica patients is not integrated in daily practice. We designed a study aiming to explore the barriers and facilitators associated with the everyday embedding of SDM for sciatica patients. All related relevant professionals and patients are involved to develop a tailored strategy to implement SDM for sciatica patients. The study consists of two phases: identification of barriers and facilitators and development of an implementation strategy. First, barriers and facilitators are explored using semi-structured interviews among eight professionals of each (para)medical discipline involved in sciatica care (general practitioners, physical therapists, neurologists, neurosurgeons, and orthopedic surgeons). In addition, three focus groups will be conducted among patients. Second, the identified barriers and facilitators will be ranked using a questionnaire among a representative Dutch sample of 200 GPs, 200 physical therapists, 200 neurologists, all 124 neurosurgeons, 200 orthopedic surgeons, and 100 patients. A tailored team-based implementation strategy will be developed based on the results of the first phase using the principles of intervention mapping and an expert panel. Little is known about effective strategies to increase the uptake of SDM. Most implementation strategies only target a single discipline, whereas multiple disciplines are involved in SDM among sciatica

  3. Systems consultation: protocol for a novel implementation strategy designed to promote evidence-based practice in primary care.

    Science.gov (United States)

    Quanbeck, Andrew; Brown, Randall T; E Zgierska, Aleksandra; A Johnson, Roberta; Robinson, James M; Jacobson, Nora

    2016-01-27

    Adoption of evidence-based practices takes place at a glacial place in healthcare. This research will pilot test an innovative implementation strategy - systems consultation -intended to speed the adoption of evidence-based practice in primary care. The strategy is based on tenets of systems engineering and has been extensively tested in addiction treatment. Three innovations have been included in the strategy - translation of a clinical practice guideline into a checklist-based implementation guide, the use of physician peer coaches ('systems consultants') to help clinics implement the guide, and a focus on reducing variation in practices across prescribers and clinics. The implementation strategy will be applied to improving opioid prescribing practices in primary care, which may help ultimately mitigate the increasing prevalence of opioid abuse and addiction. The pilot test will compare four intervention clinics to four control clinics in a matched-pairs design. A leading clinical guideline for opioid prescribing has been translated into a checklist-based implementation guide in a systematic process that involved experts who wrote the guideline in consultation with implementation experts and primary care physicians. Two physicians with expertise in family and addiction medicine are serving as the systems consultants. Each systems consultant will guide two intervention clinics, using two site visits and follow-up communication by phone and email, to implement the translated guideline. Mixed methods will be used to test the feasibility, acceptability, and preliminary effectiveness of the implementation strategy in an evaluation that meets standards for 'fully developed use' of the RE-AIM framework (Reach, Effectiveness, Adoption, Implementation, Maintenance). The clinic will be the primary unit of analysis. The systems consultation implementation strategy is intended to generalize to the adoption of other clinical guidelines. This pilot test is intended to prepare

  4. Cardiovascular disease medication health literacy among Indigenous peoples: design and protocol of an intervention trial in Indigenous primary care services.

    Science.gov (United States)

    Crengle, Sue; Smylie, Janet; Kelaher, Margaret; Lambert, Michelle; Reid, Susan; Luke, Joanne; Anderson, Ian; Harré Hindmarsh, Jennie; Harwood, Matire

    2014-07-12

    Cardiovascular diseases (CVD) are leading causes of mortality and morbidity among Indigenous people in New Zealand, Australia and Canada and are a major driver of the inequities in life expectancy between Indigenous and non-Indigenous people in these countries. Evidence-based pharmaceutical management of CVD can significantly reduce mortality and morbidity for persons diagnosed with CVD or for those at intermediate or high risk of CVD. Health literacy has been identified as a major barrier in the communication and implementation of appropriate pharmaceutical management plans for CVD. Addressing health literacy is particularly relevant in Indigenous populations where there are unique health and adult literacy challenges. This study will examine the effect of a customized, structured CVD medication programme, delivered by health professionals, on the health literacy of Indigenous people with, or at risk, of CVD. Primary outcomes are patient's knowledge about CVD medications; secondary outcomes examine changes in health literacy skills and practices. The study will employ a multi-site pre-post design with multiple measurement points to assess intervention efficacy. Participants will be recruited from four Indigenous primary care services in Australia, Canada and New Zealand. Three educational sessions will be delivered over four weeks. A tablet application will support the education sessions and produce a customized pill card for each participant. Participants will be provided with written information about CVD medications. Medication knowledge scores, and specific health literacy skills and practices will be assessed before and after the three sessions. Statistical analyses will identify significant changes in outcomes over each session, and from the pre-session one to post-session three time points. This study will make an important contribution to understanding the effect of a structured primary care-based intervention on CVD health literacy in Indigenous

  5. Problem-solving versus cognitive restructuring of medically ill seniors with depression (PROMISE-D trial: study protocol and design

    Directory of Open Access Journals (Sweden)

    Sharpe Louise

    2012-11-01

    Full Text Available Abstract Background With an ageing population in most Western countries, people are living longer but often with one or more chronic physical health problems. Older people in physically poor health are at greater risk of developing clinical depression. Cognitive Behavioural Therapy (CBT and Problem Solving Therapy (PST have both been found to be efficacious in treating late-life depression, however patients with “multi-morbidity” (i.e. more than one chronic condition are often excluded from these trials. The aim of this study is to compare the efficacy of CBT and PST in treating older adults who have one or more chronic physical health conditions and a diagnosable depressive disorder. This study will be the first to explicitly target the treatment of depression in older people in primary care settings presenting with a range of health problems using behavioural interventions. Methods/design The PROMISE-D study is a randomised controlled trial of two evidence-based treatments for late-life major or minor depression for patients who also have at least one co-morbid chronic health problem. Participants will be randomised to two active interventions (PST or CBT or enhanced treatment-as-usual (E-TAU. Primary outcomes will be depression diagnostic status and severity of depression (according to the Hamilton Depression Rating Scale and the Geriatric Depression Scale. Secondary outcomes will be anxiety severity, quality of life and health care utilisation. Assessments will be conducted by a researcher who remains blind to the patient’s treatment allocation and will be conducted pre and post-treatment and at six and 12 months follow-up. Health care utilisation will be assessed throughout a two year period following entry to the trial. Executive function, rumination and emotion regulation will also be measured to determine the impact of these factors on treatment response in two treatment groups. Discussion Multi-morbidity, the experience of two or

  6. Posttraumatic growth following a first episode of psychosis: a mixed methods research protocol using a convergent design.

    Science.gov (United States)

    Jordan, Gerald; Malla, Ashok; Iyer, Srividya N

    2016-07-25

    The suffering people experience following a first episode of psychosis is great, and has been well-investigated. Conversely, potential positive outcomes following a first episode of psychosis have been under-investigated. One such outcome that may result from a first episode of psychosis is posttraumatic growth, or a positive aftermath following the trauma of a first psychotic episode. While posttraumatic growth has been described following other physical and mental illnesses, posttraumatic growth has received very little attention following a first episode of psychosis. To address this research gap, we will conduct a mixed methods study aimed at answering two research questions: 1) How do people experience posttraumatic growth following a first episode of psychosis? 2) What predicts, or facilitates, posttraumatic growth following a first episode of psychosis? The research questions will be investigated using a mixed methods convergent design. All participants will be service-users being offered treatment for a first episode of psychosis at a specialized early intervention service for young people with psychosis, as well as their case managers.. A qualitative descriptive methodology will guide data-collection through semi-structured interviews with service-users. Service-users and case managers will complete questionnaires related to posttraumatic growth and its potential predictors using quantitative methods. These predictors include the impact a first episode of psychosis on service-users' lives, the coping strategies they use; the level of social support they enjoy; and their experiences of resilience and recovery. Qualitative data will be subject to thematic analysis, quantitative data will be subject to multiple regression analyses, and results from both methods will be combined to answer the research questions in a holistic way. Findings from this study are expected to show that in addition to suffering, people with a first episode of psychosis may experience

  7. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  8. Protocol for the process evaluation of a complex intervention designed to increase the use of research in health policy and program organisations (the SPIRIT study).

    Science.gov (United States)

    Haynes, Abby; Brennan, Sue; Carter, Stacy; O'Connor, Denise; Schneider, Carmen Huckel; Turner, Tari; Gallego, Gisselle

    2014-09-27

    Process evaluation is vital for understanding how interventions function in different settings, including if and why they have different effects or do not work at all. This is particularly important in trials of complex interventions in 'real world' organisational settings where causality is difficult to determine. Complexity presents challenges for process evaluation, and process evaluations that tackle complexity are rarely reported. This paper presents the detailed protocol for a process evaluation embedded in a randomised trial of a complex intervention known as SPIRIT (Supporting Policy In health with Research: an Intervention Trial). SPIRIT aims to build capacity for using research in health policy and program agencies. We describe the flexible and pragmatic methods used for capturing, managing and analysing data across three domains: (a) the intervention as it was implemented; (b) how people participated in and responded to the intervention; and (c) the contextual characteristics that mediated this relationship and may influence outcomes. Qualitative and quantitative data collection methods include purposively sampled semi-structured interviews at two time points, direct observation and coding of intervention activities, and participant feedback forms. We provide examples of the data collection and data management tools developed. This protocol provides a worked example of how to embed process evaluation in the design and evaluation of a complex intervention trial. It tackles complexity in the intervention and its implementation settings. To our knowledge, it is the only detailed example of the methods for a process evaluation of an intervention conducted as part of a randomised trial in policy organisations. We identify strengths and weaknesses, and discuss how the methods are functioning during early implementation. Using 'insider' consultation to develop methods is enabling us to optimise data collection while minimising discomfort and burden for

  9. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  10. Measuring the effect of formalization

    International Nuclear Information System (INIS)

    Stoelen, K.; Mohn, P.

    1998-01-01

    We present an ongoing research activity concerned with measuring the effect of an increased level of formalization in software development. We summarize the experiences from a first experimental development. Based on these experiences, we discuss a number of technical issues; in particular, problems connected to metrics based on fault reports. First of all, what is a fault? Secondly, how should the fault counting be integrated in the development process? Thirdly, any reasonable definition of fault depends on a notion of satisfaction. Hence, we must address the question: What does it mean for a specification or an implementation to satisfy a requirement imposed by a more high-level specification? (author)

  11. Formalization in Component Based Development

    DEFF Research Database (Denmark)

    Holmegaard, Jens Peter; Knudsen, John; Makowski, Piotr

    2006-01-01

    We present a unifying conceptual framework for components, component interfaces, contracts and composition of components by focusing on the collection of properties or qualities that they must share. A specific property, such as signature, functionality behaviour or timing is an aspect. Each aspect...... may be specified in a formal language convenient for its purpose and, in principle, unrelated to languages for other aspects. Each aspect forms its own semantic domain, although a semantic domain may be parameterized by values derived from other aspects. The proposed conceptual framework is introduced...

  12. Asymmetric Formal Synthesis of Azadirachtin.

    Science.gov (United States)

    Mori, Naoki; Kitahara, Takeshi; Mori, Kenji; Watanabe, Hidenori

    2015-12-01

    An asymmetric formal synthesis of azadirachtin, a potent insect antifeedant, was accomplished in 30 steps to Ley's synthetic intermediate (longest linear sequence). The synthesis features: 1) rapid access to the optically active right-hand segment starting from the known 5-hydroxymethyl-2-cyclopentenone scaffold; 2) construction of the B and E rings by a key intramolecular tandem radical cyclization; 3) formation of the hemiacetal moiety in the C ring through the α-oxidation of the six-membered lactone followed by methanolysis. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. The formal de Rham complex

    Science.gov (United States)

    Zharinov, V. V.

    2013-02-01

    We propose a formal construction generalizing the classic de Rham complex to a wide class of models in mathematical physics and analysis. The presentation is divided into a sequence of definitions and elementary, easily verified statements; proofs are therefore given only in the key case. Linear operations are everywhere performed over a fixed number field {F} = {R},{C}. All linear spaces, algebras, and modules, although not stipulated explicitly, are by definition or by construction endowed with natural locally convex topologies, and their morphisms are continuous.

  14. An Ontology for a TripTych Formal Software Development

    DEFF Research Database (Denmark)

    Bjørner, Dines

    2003-01-01

    An ontology, ie., a formalised set of strongly interrelated definitions, is given for an approach to software development that spans domain engineering, requirements engineering and software design - and which is otherwise based on a judicious use of both informal and formal, mathematics-based te......An ontology, ie., a formalised set of strongly interrelated definitions, is given for an approach to software development that spans domain engineering, requirements engineering and software design - and which is otherwise based on a judicious use of both informal and formal, mathematics...

  15. Modern Logical Frameworks Design

    DEFF Research Database (Denmark)

    Murawska, Agata Anna

    2017-01-01

    lack support for reasoning about, or programming with, the mechanised systems. Our main motivation is to eventually make it possible to model and reason about complex concurrent systems and protocols. No matter the application, be it the development of a logic for multiparty session types...... or a cryptographic protocol used in a voting system, we need the ability to model and reason about both the building blocks of these systems and the intricate connections between them. To this end, this dissertation is an investigation into LF-based formalisms that might help address the aforementioned issues. We...... design and provide the meta-theory of two new frameworks, HyLF and Lincx. The former aims to extend the expressiveness of LF to include proof irrelevance and some user-defined behaviours, using ideas from hybrid logics. The latter is a showcase for an easier to implement framework, while also allowing...

  16. Revealing dynamics and consequences of fit and misfit between formal and informal networks in multi-institutional product development collaborations

    NARCIS (Netherlands)

    Kratzer, J.; Gemuenden, Hans G.; Lettl, Christopher

    The study presents a longitudinal examination about dynamics and consequences of fit and misfit between formally ascribed design interfaces and informal communication networks in two large multi-institutional product development collaborations in space industry. Findings: (1) formally ascribed

  17. Psychologist in non-formal education

    OpenAIRE

    Pavićević Miljana S.

    2011-01-01

    Learning is not limited to school time. It starts at birth and continues throughout the entire life. Equally important as formal education there are also non-formal and informal education. Any kind of learning outside the traditional school can be called informal. However, it is not easy to define non-formal education because it is being described differently, for example as an education movement, process, system… Projects and programs implemented under the name of non-formal education are of...

  18. A survey of formal languages for contracts

    DEFF Research Database (Denmark)

    Hvitved, Tom

    2010-01-01

    In this short paper we present the current status on formal languages and models for contracts. By a formal model is meant an unambiguous and rigorous representation of contracts, in order to enable their automatic validation, execution, and analysis — activates that are collectively referred...... to as contract lifecycle management (CLM). We present a set of formalism requirements, which represent features that any ideal contract model should support, based on which we present a comparative survey of existing contract formalisms....

  19. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  20. On BAN logics for industrial security protocols

    NARCIS (Netherlands)

    Agray, N.; Hoek, van der W.; Vink, de E.P.; Dunin-Keplicz, B.; Nawarecki, E.

    2002-01-01

    This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism

  1. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  2. Formal Proofs for Nonlinear Optimization

    Directory of Open Access Journals (Sweden)

    Victor Magron

    2015-01-01

    Full Text Available We present a formally verified global optimization framework. Given a semialgebraic or transcendental function f and a compact semialgebraic domain K, we use the nonlinear maxplus template approximation algorithm to provide a certified lower bound of f over K.This method allows to bound in a modular way some of the constituents of f by suprema of quadratic forms with a well chosen curvature. Thus, we reduce the initial goal to a hierarchy of semialgebraic optimization problems, solved by sums of squares relaxations. Our implementation tool interleaves  semialgebraic approximations with sums of squares witnesses to form certificates. It is interfaced with Coq and thus benefits from the trusted arithmetic available inside the proof assistant. This feature is used to produce, from the certificates, both valid underestimators and lower bounds for each approximated constituent.The application range for such a tool is widespread; for instance Hales' proof of Kepler's conjecture yields thousands of multivariate transcendental inequalities. We illustrate the performance of our formal framework on some of these inequalities as well as on examples from the global optimization literature.

  3. 'Be active, eat right', evaluation of an overweight prevention protocol among 5-year-old children: design of a cluster randomised controlled trial

    NARCIS (Netherlands)

    Veldhuis, L.; Struijk, M.K.; Kroeze, W.; Oenema, A.; Renders, C.M.; Bunschoten, A.M.W.; Hira Sing, R.A.; Raat, H.

    2009-01-01

    Background. The prevalence of overweight and obesity in children has at least doubled in the past 25 years with a major impact on health. In 2005 a prevention protocol was developed applicable within Youth Health Care. This study aims to assess the effects of this protocol on prevalence of

  4. 'Be active, eat right', evaluation of an overweight prevention protocol among 5-year-old children : Design of a cluster randomised controlled trial

    NARCIS (Netherlands)

    L. Veldhuis (Lydian); M.K. Struijk (Mirjam); W. Kroeze (Willemieke); A. Oenema (Anke); C.M. Renders (Carry); A.M.W. Bulk-Bunschoten (Anneke); R.A. Hirasing (Remy); H. Raat (Hein)

    2009-01-01

    textabstractBACKGROUND: The prevalence of overweight and obesity in children has at least doubled in the past 25 years with a major impact on health. In 2005 a prevention protocol was developed applicable within Youth Health Care. This study aims to assess the effects of this protocol on prevalence

  5. Formal Symplectic Groupoid of a Deformation Quantization

    Science.gov (United States)

    Karabegov, Alexander V.

    2005-08-01

    We give a self-contained algebraic description of a formal symplectic groupoid over a Poisson manifold M. To each natural star product on M we then associate a canonical formal symplectic groupoid over M. Finally, we construct a unique formal symplectic groupoid ‘with separation of variables’ over an arbitrary Kähler-Poisson manifold.

  6. Formalizing the concept phase of product development

    NARCIS (Netherlands)

    Schuts, M.; Hooman, J.

    2015-01-01

    We discuss the use of formal techniques to improve the concept phase of product realisation. As an industrial application, a new concept of interventional X-ray systems has been formalized, using model checking techniques and the simulation of formal models. cop. Springer International Publishing

  7. Formal Testing of Correspondence Carrying Software

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.; Maharaj, S.

    2008-01-01

    Nowadays formal software development is characterised by use of multitude formal specification languages. Test case generation from formal specifications depends in general on a specific language, and, moreover, there are competing methods for each language. There is a need for a generic approach to

  8. Lifelong Learning to Empowerment: Beyond Formal Education

    Science.gov (United States)

    Carr, Alexis; Balasubramanian, K.; Atieno, Rosemary; Onyango, James

    2018-01-01

    This paper discusses the relevance of lifelong learning vis-à-vis the Sustainable Development Goals (SDGs) and stresses the need for an approach blending formal education, non-formal and informal learning. The role of Open and Distance Learning (ODL) in moving beyond formal education and the importance of integrating pedagogy, andragogy and…

  9. Development and validation of simple RP-HPLC-PDA analytical protocol for zileuton assisted with Design of Experiments for robustness determination

    Directory of Open Access Journals (Sweden)

    Saurabh B. Ganorkar

    2017-02-01

    Full Text Available A simple, rapid, sensitive, robust, stability-indicating RP-HPLC-PDA analytical protocol was developed and validated for the analysis of zileuton racemate in bulk and in tablet formulation. Development of method and resolution of degradation products from forced; hydrolytic (acidic, basic, neutral, oxidative, photolytic (acidic, basic, neutral, solid state and thermal (dry heat degradation was achieved on a LC – GC Qualisil BDS C18 column (250 mm × 4.6 mm × 5 μm by isocratic mode at ambient temperature, employing a mobile phase methanol and (0.2%, v/v orthophosphoric acid in ratio of (80:20, v/v at a flow rate of 1.0 mL min−1 and detection at 260 nm. ‘Design of Experiments’ (DOE employing ‘Central Composite Design’ (CCD and ‘Response Surface Methodology’ (RSM were applied as an advancement to traditional ‘One Variable at Time’ (OVAT approach to evaluate the effects of variations in selected factors (methanol content, flow rate, concentration of orthophosphoric acid as graphical interpretation for robustness and statistical interpretation was achieved with Multiple Linear Regression (MLR and ANOVA. The method succeeded over the validation parameters: linearity, precision, accuracy, limit of detection and limit of quantitation, and robustness. The method was applied effectively for analysis of in-house zileuton tablets.

  10. Design of a mutual authentication based on NTRUsign with a perturbation and inherent multipoint control protocol frames in an Ethernet-based passive optical network

    Science.gov (United States)

    Yin, Aihan; Ding, Yisheng

    2014-11-01

    Identity-related security issues inherently present in passive optical networks (PON) still exist in the current (1G) and next-generation (10G) Ethernet-based passive optical network (EPON) systems. We propose a mutual authentication scheme that integrates an NTRUsign digital signature algorithm with inherent multipoint control protocol (MPCP) frames over an EPON system between the optical line terminal (OLT) and optical network unit (ONU). Here, a primitive NTRUsign algorithm is significantly modified through the use of a new perturbation so that it can be effectively used for simultaneously completing signature and authentication functions on the OLT and the ONU sides. Also, in order to transmit their individual sensitive messages, which include public key, signature, and random value and so forth, to each other, we redefine three unique frames according to MPCP format frame. These generated messages can be added into the frames and delivered to each other, allowing the OLT and the ONU to go ahead with a mutual identity authentication process to verify their legal identities. Our simulation results show that this proposed scheme performs very well in resisting security attacks and has low influence on the registration efficiency to to-be-registered ONUs. A performance comparison with traditional authentication algorithms is also presented. To the best of our knowledge, no detailed design of mutual authentication in EPON can be found in the literature up to now.

  11. Automatic verification of a lip-synchronisation protocol using Uppaal

    NARCIS (Netherlands)

    Bowman, H.; Faconti, G.; Katoen, J.-P.; Latella, D.; Massink, M.

    1998-01-01

    We present the formal specification and verification of a lip-synchronisation protocol using the real-time model checker Uppaal. A number of specifications of this protocol can be found in the literature, but this is the first automatic verification. We take a published specification of the

  12. A Dialogue Game Protocol for Agent Purchase Negotiations

    NARCIS (Netherlands)

    McBurney, P.; Eijk, R.M. van; Parsons, S.; Amgoud, L.

    2003-01-01

    We propose a dialogue game protocol for purchase negotiation dialogues which identifies appropriate speech acts, defines constraints on their utterances, and specifies the different sub-tasks agents need to perform in order to engage in dialogues according to this protocol. Our formalism combines

  13. Mechanical verification of concurrency control and recovery protocols

    NARCIS (Netherlands)

    Chkliaev, D.

    2001-01-01

    The thesis concerns the formal specification and mechanized verification of concurrency control and recovery protocols for distributed databases. Such protocols are needed for many modern application such as banking and are often used in safety-critical applications. Therefore it is very important

  14. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    Science.gov (United States)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  15. Design of a randomized trial to evaluate the influence of mobile phone reminders on adherence to first line antiretroviral treatment in South India - the HIVIND study protocol

    Directory of Open Access Journals (Sweden)

    Kumarasamy Nagalingeswaran

    2010-03-01

    Full Text Available Abstract Background Poor adherence to antiretroviral treatment has been a public health challenge associated with the treatment of HIV. Although different adherence-supporting interventions have been reported, their long term feasibility in low income settings remains uncertain. Thus, there is a need to explore sustainable contextual adherence aids in such settings, and to test these using rigorous scientific designs. The current ubiquity of mobile phones in many resource-constrained settings, make it a contextually appropriate and relatively low cost means of supporting adherence. In India, mobile phones have wide usage and acceptability and are potentially feasible tools for enhancing adherence to medications. This paper presents the study protocol for a trial, to evaluate the influence of mobile phone reminders on adherence to first-line antiretroviral treatment in South India. Methods/Design 600 treatment naïve patients eligible for first-line treatment as per the national antiretroviral treatment guidelines will be recruited into the trial at two clinics in South India. Patients will be randomized into control and intervention arms. The control arm will receive the standard of care; the intervention arm will receive the standard of care plus mobile phone reminders. Each reminder will take the form of an automated call and a picture message. Reminders will be delivered once a week, at a time chosen by the patient. Patients will be followed up for 24 months or till the primary outcome i.e. virological failure, is reached, whichever is earlier. Self-reported adherence is a secondary outcome. Analysis is by intention-to-treat. A cost-effectiveness study of the intervention will also be carried out. Discussion Stepping up telecommunications technology in resource-limited healthcare settings is a priority of the World Health Organization. The trial will evaluate if the use of mobile phone reminders can influence adherence to first

  16. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  17. A Formal Calculus for Categories

    DEFF Research Database (Denmark)

    Cáccamo, Mario José

    This dissertation studies the logic underlying category theory. In particular we present a formal calculus for reasoning about universal properties. The aim is to systematise judgements about functoriality and naturality central to categorical reasoning. The calculus is based on a language which...... extends the typed lambda calculus with new binders to represent universal constructions. The types of the languages are interpreted as locally small categories and the expressions represent functors. The logic supports a syntactic treatment of universality and duality. Contravariance requires a definition...... of universality generous enough to deal with functors of mixed variance. Ends generalise limits to cover these kinds of functors and moreover provide the basis for a very convenient algebraic manipulation of expressions. The equational theory of the lambda calculus is extended with new rules for the definitions...

  18. Formal analysis of physical theories

    International Nuclear Information System (INIS)

    Dalla Chiara, M.L.; Toraldo di Francia, G.

    1979-01-01

    The rules of inference that are made use of in formalization are considered. It is maintained that a physical law represents the universal assertion of a probability, and not the assessment of the probability of a universal assertion. The precision of the apparatus used to collect the experimental evidence is introduced as an essential part of the theoretical structure of physics. This approach allows the author to define the concept of truth in a satisfactory way, abandoning the unacceptable notion of approximate truth. It is shown that a considerable amount of light can be shed on a number of much debated problems arising in the logic of quantum mechanics. It is stressed that the deductive structure of quantum theory seems to be essentially founded on a kind of mixture of different logics. Two different concepts of truth are distinguished within quantum theory, an empirical truth and quantum-logical truth. (Auth.)

  19. A Visual Formalism for Interacting Systems

    Directory of Open Access Journals (Sweden)

    Paul C. Jorgensen

    2015-04-01

    Full Text Available Interacting systems are increasingly common. Many examples pervade our everyday lives: automobiles, aircraft, defense systems, telephone switching systems, financial systems, national governments, and so on. Closer to computer science, embedded systems and Systems of Systems are further examples of interacting systems. Common to all of these is that some "whole" is made up of constituent parts, and these parts interact with each other. By design, these interactions are intentional, but it is the unintended interactions that are problematic. The Systems of Systems literature uses the terms "constituent systems" and "constituents" to refer to systems that interact with each other. That practice is followed here. This paper presents a visual formalism, Swim Lane Event-Driven Petri Nets, that is proposed as a basis for Model-Based Testing (MBT of interacting systems. In the absence of available tools, this model can only support the offline form of Model-Based Testing.

  20. Enriching project organizations with formal change agents

    DEFF Research Database (Denmark)

    Eskerod, Pernille; Justesen, Just Bendix; Sjøgaard, Gisela

    2017-01-01

    Purpose: Project success requires effective and efficient cooperation between the project organization and the permanent organization in which the project takes place. The purpose of this paper is to discuss potentials and pitfalls from enriching project organizations by appointing peers as formal...... and middle and top management support are major determinants of success within change projects. To select change agents that the employees respect and can identify with, combined with top management prioritization, is important in order for the project organization to benefit from the additional role...... change agents. Design/methodology/approach: The paper is based on a literature review and a multiple-case study in which six organizations participated in an action-oriented research project. The aim for the organizations was to obtain a better health status among the employees by accomplishing...

  1. Building ontologies with basic formal ontology

    CERN Document Server

    Arp, Robert; Spear, Andrew D.

    2015-01-01

    In the era of "big data," science is increasingly information driven, and the potential for computers to store, manage, and integrate massive amounts of data has given rise to such new disciplinary fields as biomedical informatics. Applied ontology offers a strategy for the organization of scientific information in computer-tractable form, drawing on concepts not only from computer and information science but also from linguistics, logic, and philosophy. This book provides an introduction to the field of applied ontology that is of particular relevance to biomedicine, covering theoretical components of ontologies, best practices for ontology design, and examples of biomedical ontologies in use. After defining an ontology as a representation of the types of entities in a given domain, the book distinguishes between different kinds of ontologies and taxonomies, and shows how applied ontology draws on more traditional ideas from metaphysics. It presents the core features of the Basic Formal Ontology (BFO), now u...

  2. A Comparison of Participation Patterns in Selected Formal, Non-Formal, and Informal Online Learning Environments

    Science.gov (United States)

    Schwier, Richard A.; Seaton, J. X.

    2013-01-01

    Does learner participation vary depending on the learning context? Are there characteristic features of participation evident in formal, non-formal, and informal online learning environments? Six online learning environments were chosen as epitomes of formal, non-formal, and informal learning contexts and compared. Transcripts of online…

  3. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  4. Simulation and Formal Analysis of Visual Attention in Cognitive Systems

    NARCIS (Netherlands)

    Bosse, T.; Maanen, P.P. van; Treur, J.

    2007-01-01

    In this paper a simulation model for visual attention is discussed and formally analysed. The model is part of the design of a cognitive system which comprises an agent that supports a naval officer in its task to compile a tactical picture of the situation in the field. A case study is described in

  5. Learning Conditions for Non-Formal and Informal Workplace Learning

    Science.gov (United States)

    Kyndt, Eva; Dochy, Filip; Nijs, Hanne

    2009-01-01

    Purpose: The purpose of this research paper is to investigate the presence of learning conditions for non-formal and informal workplace learning in relation to the characteristics of the employee and the organisation he or she works for. Design/methodology/approach: The questionnaire developed by Clauwaert and Van Bree on learning conditions was…

  6. Prayer and Adolescence: Can Formal Instruction Make a Difference?

    Science.gov (United States)

    Sigel, Deena

    2016-01-01

    This design experiment in prayer education for Jewish students was motivated by a current educational concern: educating for spirituality and religious practice. Educators are tasked with formally nurturing spirituality (Wright 2001). It is known that attitude to religious observance may change during adolescence (Hyde 1963), thus attitude to…

  7. A formal modeling approach for supply chain event management

    NARCIS (Netherlands)

    Liu, R.; Kumar, Akhil; Aalst, van der W.M.P.

    2007-01-01

    As supply chains become more dynamic, there is a need for a sense-and-respond capability to react to events in a real-time manner. In this paper, we propose Petri nets extended with time and color (to represent case data) as a formalism for managing events. We designed seven basic patterns to

  8. Formal validation of supervisory energy management systems for microgrids

    DEFF Research Database (Denmark)

    Sugumar, Gayathri; Selvamuthukumaran, R.; Dragicevic, T.

    2017-01-01

    techniques are available in the literature to monitor and control the energy flows among distributed RES in MGs, formal verification of those techniques was not proposed yet. The emphasis of this paper is to design and validate energy management system for a MG which consists of a solar photovoltaic (PV...

  9. A formal analysis of ISO/IEEE P11073-20601 standard of medical device communication

    NARCIS (Netherlands)

    Goga, Nicolae; Costache, Stefania; Moldoveanu, Florica

    2009-01-01

    This article presents the formal work done for the ISO/IEEE P11073-20601 Draft Standard for Health informatics - Personal health device communication - Application profile Optimized exchange protocol. ISO/IEEE 11073 family defines standards for device communication between agents (e.g. blood

  10. A Machine-Checked Formalization of the Generic Model and the Random Oracle Model

    NARCIS (Netherlands)

    Barthe, Gilles; Cederquist, J.G.; Tarento, Sabrina; Basin, David; Rusinowitch, Michaël

    Most approaches to the formal analyses of cryptographic protocols make the perfect cryptography assumption, i.e. the hypothese that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to rely on a weaker hypothesis on

  11. Design of a multicentre randomized controlled trial to assess the safety and efficacy of dose titration by specialized nurses in patients with heart failure. ETIFIC study protocol.

    Science.gov (United States)

    Oyanguren, Juana; García-Garrido, LLuisa; Nebot Margalef, Magdalena; Lekuona, Iñaki; Comin-Colet, Josep; Manito, Nicolás; Roure, Julia; Ruiz Rodriguez, Pilar; Enjuanes, Cristina; Latorre, Pedro; Torcal Laguna, Jesús; García-Gutiérrez, Susana

    2017-11-01

    Heart failure (HF) is associated with many hospital admissions and relatively high mortality, rates decreasing with administration of beta-blockers (BBs), angiotensin-converting-enzyme inhibitors, angiotensin II receptor blockers, and mineralocorticoid receptor antagonists. The effect is dose dependent, suboptimal doses being common in clinical practice. The 2012 European guidelines recommend close monitoring and dose titration by HF nurses. Our main aim is to compare BB doses achieved by patients after 4 months in intervention (HF nurse-managed) and control (cardiologist-managed) groups. Secondary aims include comparing doses of the other aforementioned drugs achieved after 4 months, adverse events, and outcomes at 6 months in the two groups. We have designed a multicentre (20 hospitals) non-inferiority randomized controlled trial, including patients with new-onset HF, left ventricular ejection fraction ≤40%, and New York Heart Association class II-III, with no contraindications to BBs. We will also conduct qualitative analysis to explore potential barriers to and facilitators of dose titration by HF nurses. In the intervention group, HF nurses will implement titration as prescribed by cardiologists, following a protocol. In controls, cardiologists will both prescribe and titrate doses. The study variables are doses of each of the drugs after 4 months relative to the target dose (%), New York Heart Association class, left ventricular ejection fraction, N-terminal pro B-type natriuretic peptide levels, 6 min walk distance, comorbidities, renal function, readmissions, mortality, quality of life, and psychosocial characteristics. The trial seeks to assess whether titration by HF nurses of drugs recommended in practice guidelines is safe and not inferior to direct management by cardiologists. The results could have an impact on clinical practice. © 2017 The Authors. ESC Heart Failure published by John Wiley & Sons Ltd on behalf of the European Society of

  12. Efficacy of Internet-Based Guided Treatment for Genito-Pelvic Pain/Penetration Disorder: Rationale, Treatment Protocol, and Design of a Randomized Controlled Trial

    Directory of Open Access Journals (Sweden)

    Anna-Carlotta Zarski

    2018-01-01

    Full Text Available IntroductionGenito-pelvic pain/penetration disorder (GPPPD not only adversely affects women’s sexuality and sexual satisfaction but is also associated with a wide range of psychosocial consequences such as reduced quality of life and well-being, mental health comorbidities, and relationship distress. Evidence for effective treatment options is scarce.AimThis article describes the rationale, treatment protocol, and study design for a randomized controlled trial examining the efficacy of an Internet-based guided intervention for GPPPD.MethodTwo hundred women who meet the criteria for GPPPD and have not been able to experience sexual intercourse for at least the last 6 months will be recruited and randomly assigned either to the intervention group (IG or a 6-month waitlist control group. Assessments take place at baseline (T1, peritreatment after completion of Session 5 in IG (T2, after completion of Session 8 or 12 weeks after randomization (T3, and after 6 months (T4. Data will be analyzed on an intention-to-treat and a completer basis.Main outcome measuresThe primary outcome will be sexual intercourse involving the insertion of the partner’s penis at posttreatment. Secondary outcomes include, e.g., improved non-intercourse penetration, sexual functioning, dyadic stress coping, reduced fear of sexuality and negative penetration-related cognitions. Fear of sexuality, penetration-related cognitions, and exercise intensity will be assessed as mediators of intercourse in the IG. Sexual dysfunctions of partners will be measured at baseline (T1 and investigated as a potential moderator of the primary treatment outcome.DiscussionGiven the burden associated with GPPPD and the need for specialized treatment, there is a surprising lack of evidence-based treatment options. This study aims to assess whether Internet-based interventions could contribute to closing this treatment gap.Clinical Trial RegistrationGerman Register of Clinical Studies (DRKS

  13. Efficacy and safety of renal denervation for Chinese patients with resistant hypertension using a microirrigated catheter: study design and protocol for a prospective multicentre randomised controlled trial.

    Science.gov (United States)

    Liu, Zongjun; Shen, Li; Huang, Weijian; Zhao, Xianxian; Fang, Weiyi; Wang, Changqian; Yin, Zhaofang; Wang, Jianan; Fu, Guosheng; Liu, Xuebo; Jiang, Jianjun; Zhang, Zhihui; Li, Jingbo; Lu, Yingmin; Ge, Junbo

    2017-09-01

    Available data show that approximately 8%-18% of patients with primary hypertension will develop resistant hypertension. In recent years, catheter-based renal denervation (RDN) has emerged as a potential treatment option for resistant hypertension. A number of observational studies and randomised controlled trials among non-Chinese patients have demonstrated its potential safety and efficacy. This is a multicentre, randomised, open-label, parallel-group, active controlled trial that will investigate the efficacy and safety of a 5F saline-irrigated radiofrequency ablation (RFA) used for RDN in the treatment of Chinese patients with resistant hypertension. A total of 254 patients who have failed pharmacological therapy will be enrolled. Eligible subjects will be randomised in a 1:1 ratio to undergo RDN using the RFA plus antihypertensive medication or to receive treatment with antihypertensive medication alone. The primary outcome measure is the change in 24 hours average ambulatory systolic blood pressure from baseline to 3 months, comparing the RDN-plus-medication group with the medication-alone group. Important secondary endpoints include the change in office blood pressure from baseline to 6 months after randomisation. Safety endpoints such as changes in renal function will also be evaluated. The full analysis set, according to the intent-to-treat principle, will be established as the primary analysis population. All participants will provide informed consent; the study protocol has been approved by the Independent Ethics Committee for each site. This study is designed to investigate the efficacy and safety of RDN using a 5F saline microirrigated RFA. Findings will be shared with participating hospitals, policymakers and the academic community to promote the clinical management of resistant hypertension in China. ClinicalTrials.gov ID: NCT02900729; pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017

  14. Effectiveness of Virtual Reality Exercises in STroke Rehabilitation (EVREST): rationale, design, and protocol of a pilot randomized clinical trial assessing the Wii gaming system.

    Science.gov (United States)

    Saposnik, G; Mamdani, M; Bayley, M; Thorpe, K E; Hall, J; Cohen, L G; Teasell, R

    2010-02-01

    Evidence suggests that increasing intensity of rehabilitation results in better motor recovery. Limited evidence is available on the effectiveness of an interactive virtual reality gaming system for stroke rehabilitation. EVREST was designed to evaluate feasibility, safety and efficacy of using the Nintendo Wii gaming virtual reality (VRWii) technology to improve arm recovery in stroke patients. Pilot randomized study comparing, VRWii versus recreational therapy (RT) in patients receiving standard rehabilitation within six months of stroke with a motor deficit of > or =3 on the Chedoke-McMaster Scale (arm). In this study we expect to randomize 20 patients. All participants (age 18-85) will receive customary rehabilitative treatment consistent of a standardized protocol (eight sessions, 60 min each, over a two-week period). The primary feasibility outcome is the total time receiving the intervention. The primary safety outcome is the proportion of patients experiencing intervention-related adverse events during the study period. Efficacy, a secondary outcome measure, will be measured by the Wolf Motor Function Test, Box and Block Test, and Stroke Impact Scale at the four-week follow-up visit. From November, 2008 to September, 2009 21 patients were randomized to VRWii or RT. Mean age, 61 (range 41-83) years. Mean time from stroke onset 25 (range 10-56) days. EVREST is the first randomized parallel controlled trial assessing the feasibility, safety, and efficacy of virtual reality using Wii gaming technology in stroke rehabilitation. The results of this study will serve as the basis for a larger multicentre trial. ClinicalTrials.gov registration# NTC692523.

  15. The clinical efficacy of reminiscence therapy in patients with mild-to-moderate Alzheimer disease: Study protocol for a randomized parallel-design controlled trial.

    Science.gov (United States)

    Li, Mo; Lyu, Ji-Hui; Zhang, Yi; Gao, Mao-Long; Li, Wen-Jie; Ma, Xin

    2017-12-01

    Alzheimer disease (AD) is one of the most common diseases among the older adults. Currently, various nonpharmacological interventions are used for the treatment of AD. Such as reminiscence therapy is being widely used in Western countries. However, it is often used as an empirical application in China; the evidence-based efficacy of reminiscence therapy in AD patients remains to be determined. Therefore, the aim of this research is to assess the effectives of reminiscence therapy for Chinese elderly. This is a randomized parallel-design controlled trial. Mild and moderate AD patients who are in the Beijing Geriatric Hospital, China will be randomized into control and intervention groups (n = 45 for each group). For the intervention group, along with conventional drug therapy, participants will be exposed to a reminiscence therapy of 35 to 45 minutes, 2 times/wk for 12 consecutive weeks. Patients in the control group will undergo conventional drug therapy only. The primary outcome measure will be the differences in Alzheimer disease Assessment Scale-Cognitive Section Score. The secondary outcome measures will be the differences in the Cornell scale for depression in dementia, Neuropsychiatric Inventory score, and Barthel Index scores at baseline, at 4 and 12 weeks of treatment, and 12 weeks after treatment. The protocols have been approved by the ethics committee of Beijing Geriatric Hospital of China (approval no. 2015-010). Findings will be disseminated through presentation at scientific conferences and in academic journals. Chinese Clinical Trial Registry identifier ChiCTR-INR-16009505. Copyright © 2017 The Authors. Published by Wolters Kluwer Health, Inc. All rights reserved.

  16. Preemptive Genotyping for Personalized Medicine: Design of the Right Drug, Right Dose, Right Time – Using Genomic Data to Individualize Treatment Protocol

    Science.gov (United States)

    Bielinski, Suzette J.; Olson, Janet E.; Pathak, Jyotishman; Weinshilboum, Richard M.; Wang, Liewei; Lyke, Kelly J.; Ryu, Euijung; Targonski, Paul V.; Van Norstrand, Michael D.; Hathcock, Matthew A.; Takahashi, Paul Y.; McCormick, Jennifer B.; Johnson, Kiley J.; Maschke, Karen J.; Rohrer Vitek, Carolyn R.; Ellingson, Marissa S.; Wieben, Eric D.; Farrugia, Gianrico; Morrisette, Jody A.; Kruckeberg, Keri J.; Bruflat, Jamie K.; Peterson, Lisa M.; Blommel, Joseph H.; Skierka, Jennifer M.; Ferber, Matthew J.; Black, John L.; Baudhuin, Linnea M.; Klee, Eric W.; Ross, Jason L.; Veldhuizen, Tamra L.; Schultz, Cloann G.; Caraballo, Pedro J.; Freimuth, Robert R.; Chute, Christopher G.; Kullo, Iftikhar J.

    2014-01-01

    Objective To report the design and implementation of the Right Drug, Right Dose, Right Time: Using Genomic Data to Individualize Treatment Protocol that was developed to test the concept that prescribers can deliver genome guided therapy at the point-of-care by using preemptive pharmacogenomics (PGx) data and clinical decision support (CDS) integrated in the electronic medical record (EMR). Patients and Methods We used a multivariable prediction model to identify patients with a high risk of initiating statin therapy within 3 years. The model was used to target a study cohort most likely to benefit from preemptive PGx testing among Mayo Clinic Biobank participants with a recruitment goal of 1000 patients. Cox proportional hazards model was utilized using the variables selected through the Lasso shrinkage method. An operational CDS model was adapted to implement PGx rules within the EMR. Results The prediction model included age, sex, race, and 6 chronic diseases categorized by the Clinical Classifications Software for ICD-9 codes (dyslipidemia, diabetes, peripheral atherosclerosis, disease of the blood-forming organs, coronary atherosclerosis and other heart diseases, and hypertension). Of the 2000 Biobank participants invited, 50% provided blood samples, 13% refused, 28% did not respond, and 9% consented but did not provide a blood sample within the recruitment window (October 4, 2012 – March 20, 2013). Preemptive PGx testing included CYP2D6 genotyping and targeted sequencing of 84 PGx genes. Synchronous real-time CDS is integrated in the EMR and flags potential patient-specific drug-gene interactions and provides therapeutic guidance. Conclusion These interventions will improve understanding and implementation of genomic data in clinical practice. PMID:24388019

  17. Efficacy of Internet-Based Guided Treatment for Genito-Pelvic Pain/Penetration Disorder: Rationale, Treatment Protocol, and Design of a Randomized Controlled Trial.

    Science.gov (United States)

    Zarski, Anna-Carlotta; Berking, Matthias; Ebert, David Daniel

    2017-01-01

    Genito-pelvic pain/penetration disorder (GPPPD) not only adversely affects women's sexuality and sexual satisfaction but is also associated with a wide range of psychosocial consequences such as reduced quality of life and well-being, mental health comorbidities, and relationship distress. Evidence for effective treatment options is scarce. This article describes the rationale, treatment protocol, and study design for a randomized controlled trial examining the efficacy of an Internet-based guided intervention for GPPPD. Two hundred women who meet the criteria for GPPPD and have not been able to experience sexual intercourse for at least the last 6 months will be recruited and randomly assigned either to the intervention group (IG) or a 6-month waitlist control group. Assessments take place at baseline (T1), peritreatment after completion of Session 5 in IG (T2), after completion of Session 8 or 12 weeks after randomization (T3), and after 6 months (T4). Data will be analyzed on an intention-to-treat and a completer basis. The primary outcome will be sexual intercourse involving the insertion of the partner's penis at posttreatment. Secondary outcomes include, e.g., improved non-intercourse penetration, sexual functioning, dyadic stress coping, reduced fear of sexuality and negative penetration-related cognitions. Fear of sexuality, penetration-related cognitions, and exercise intensity will be assessed as mediators of intercourse in the IG. Sexual dysfunctions of partners will be measured at baseline (T1) and investigated as a potential moderator of the primary treatment outcome. Given the burden associated with GPPPD and the need for specialized treatment, there is a surprising lack of evidence-based treatment options. This study aims to assess whether Internet-based interventions could contribute to closing this treatment gap. German Register of Clinical Studies (DRKS): DRKS00010228.

  18. Design of a randomized trial to evaluate the influence of mobile phone reminders on adherence to first line antiretroviral treatment in South India--the HIVIND study protocol.

    Science.gov (United States)

    De Costa, Ayesha; Shet, Anita; Kumarasamy, Nagalingeswaran; Ashorn, Per; Eriksson, Bo; Bogg, Lennart; Diwan, Vinod K

    2010-03-26

    Poor adherence to antiretroviral treatment has been a public health challenge associated with the treatment of HIV. Although different adherence-supporting interventions have been reported, their long term feasibility in low income settings remains uncertain. Thus, there is a need to explore sustainable contextual adherence aids in such settings, and to test these using rigorous scientific designs. The current ubiquity of mobile phones in many resource-constrained settings, make it a contextually appropriate and relatively low cost means of supporting adherence. In India, mobile phones have wide usage and acceptability and are potentially feasible tools for enhancing adherence to medications. This paper presents the study protocol for a trial, to evaluate the influence of mobile phone reminders on adherence to first-line antiretroviral treatment in South India. 600 treatment naïve patients eligible for first-line treatment as per the national antiretroviral treatment guidelines will be recruited into the trial at two clinics in South India. Patients will be randomized into control and intervention arms. The control arm will receive the standard of care; the intervention arm will receive the standard of care plus mobile phone reminders. Each reminder will take the form of an automated call and a picture message. Reminders will be delivered once a week, at a time chosen by the patient. Patients will be followed up for 24 months or till the primary outcome i.e. virological failure, is reached, whichever is earlier. Self-reported adherence is a secondary outcome. Analysis is by intention-to-treat. A cost-effectiveness study of the intervention will also be carried out. Stepping up telecommunications technology in resource-limited healthcare settings is a priority of the World Health Organization. The trial will evaluate if the use of mobile phone reminders can influence adherence to first-line antiretrovirals in an Indian context.

  19. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  20. Applications of the Decoherence Formalism

    Science.gov (United States)

    Brun, Todd Andrew

    In this work the decoherence formalism of quantum mechanics is explored and applied to a number of interesting problems in quantum physics. The boundary between quantum and classical physics is examined, and demonstration made that quantum histories corresponding to classical equations of motion become more probable for a broad class of models, including linear and nonlinear models of Brownian motion. The link between noise, dissipation, and decoherence is studied. This work is then applied to systems which classically exhibit dissipative chaotic dynamics. A theory is explicated for treating these systems, and the ideas are applied to a particular model of the forced, damped Duffing oscillator, which is chaotic for certain parameter values. Differences between classical and quantum chaos are examined, particularly differences arising in the structure of fractal strange attractors, and the conceptual difficulties in framing standard notions of chaos in a quantum system. A brief discussion of previous work on quantum chaos is included, and the differences between Hamiltonian and dissipative chaos pointed out; a somewhat different interpretation of quantum chaos from the standard one is suggested. A class of histories for quantum systems, in phase space rather than configuration space, is studied. Different ways of representing projections in phase space are discussed, and expressions for the probability of phase space histories are derived; conditions for such histories to decohere are also estimated in the semiclassical limit.

  1. Quantum formalism for classical statistics

    Science.gov (United States)

    Wetterich, C.

    2018-06-01

    In static classical statistical systems the problem of information transport from a boundary to the bulk finds a simple description in terms of wave functions or density matrices. While the transfer matrix formalism is a type of Heisenberg picture for this problem, we develop here the associated Schrödinger picture that keeps track of the local probabilistic information. The transport of the probabilistic information between neighboring hypersurfaces obeys a linear evolution equation, and therefore the superposition principle for the possible solutions. Operators are associated to local observables, with rules for the computation of expectation values similar to quantum mechanics. We discuss how non-commutativity naturally arises in this setting. Also other features characteristic of quantum mechanics, such as complex structure, change of basis or symmetry transformations, can be found in classical statistics once formulated in terms of wave functions or density matrices. We construct for every quantum system an equivalent classical statistical system, such that time in quantum mechanics corresponds to the location of hypersurfaces in the classical probabilistic ensemble. For suitable choices of local observables in the classical statistical system one can, in principle, compute all expectation values and correlations of observables in the quantum system from the local probabilistic information of the associated classical statistical system. Realizing a static memory material as a quantum simulator for a given quantum system is not a matter of principle, but rather of practical simplicity.

  2. A new approach for formal behavioral modeling of protection services in antivirus systems

    OpenAIRE

    Norouzi, Monire; Parsa, Saeed; Mahjur, Ali

    2014-01-01

    Formal method techniques provides a suitable platform for the software development in software systems. Formal methods and formal verification is necessary to prove the correctness and improve performance of software systems in various levels of design and implementation, too. Security Discussion is an important issue in computer systems. Since the antivirus applications have very important role in computer systems security, verifying these applications is very essential and necessary. In thi...

  3. 'Be active, eat right', evaluation of an overweight prevention protocol among 5-year-old children: design of a cluster randomised controlled trial.

    Science.gov (United States)

    Veldhuis, Lydian; Struijk, Mirjam K; Kroeze, Willemieke; Oenema, Anke; Renders, Carry M; Bulk-Bunschoten, Anneke Mw; Hirasing, Remy A; Raat, Hein

    2009-06-08

    The prevalence of overweight and obesity in children has at least doubled in the past 25 years with a major impact on health. In 2005 a prevention protocol was developed applicable within Youth Health Care. This study aims to assess the effects of this protocol on prevalence of overweight and health behaviour among children. A cluster randomised controlled trial is conducted among 5-year-old children included by 44 Youth Health Care teams randomised within 9 Municipal Health Services. The teams are randomly allocated to the intervention or control group. The teams measure the weight and height of all children. When a child in the intervention group is detected with overweight according to the international age and gender specific cut-off points of BMI, the prevention protocol is applied. According to this protocol parents of overweight children are invited for up to three counselling sessions during which they receive personal advice about a healthy lifestyle, and are motivated for and assisted in behavioural change.The primary outcome measures are Body Mass Index and waist circumference of the children. Parents will complete questionnaires to assess secondary outcome measures: levels of overweight inducing/reducing behaviours (i.e. being physically active, having breakfast, drinking sweet beverages and watching television/playing computer games), parenting styles, parenting practices, and attitudes of parents regarding these behaviours, health-related quality of life of the children, and possible negative side effects of the prevention protocol. Data will be collected at baseline (when the children are aged 5 years), and after 12 and 24 months of follow-up. Additionally, a process and a cost-effectiveness evaluation will be conducted. In this study called 'Be active, eat right' we evaluate an overweight prevention protocol for use in the setting of Youth Health Care. It is hypothesized that the use of this protocol will result in a healthier lifestyle of the

  4. What Determines Firms’ Decisions to Formalize?

    OpenAIRE

    Neil McCulloch; Günther G. Schulze; Janina Voss

    2010-01-01

    In this paper we analyze the decision of small and micro firms to formalize, i.e. to obtain business and other licenses in rural Indonesia. We use the rural investment climate survey (RICS) that consists of non-farm rural enterprises, most of them microenterprises, and analyze the effect of formalization on tax payments, corruption, access to credit and revenue, taking into account the endogeneity of the formalization decision to such benefits and costs. We show, contrary to most of the liter...

  5. NON-FORMAL EDUCATION, OVEREDUCATION AND WAGES

    OpenAIRE

    SANDRA NIETO; RAÚL RAMOS

    2013-01-01

    Why do overeducated workers participate in non-formal education activities? Do not they suffer from an excess of education? Using microdata from the Spanish sample of the 2007 Adult Education Survey, we have found that overeducated workers participate more than the rest in non-formal education and that they earn higher wages than overeducated workers who did not participate. This result can be interpreted as evidence that non-formal education allows overeducated workers to acquire new abiliti...

  6. Fundamentals of the Pure Spinor Formalism

    CERN Document Server

    Hoogeveen, Joost

    2010-01-01

    This thesis presents recent developments within the pure spinor formalism, which has simplified amplitude computations in perturbative string theory, especially when spacetime fermions are involved. Firstly the worldsheet action of both the minimal and the non-minimal pure spinor formalism is derived from first principles, i.e. from an action with two dimensional diffeomorphism and Weyl invariance. Secondly the decoupling of unphysical states in the minimal pure spinor formalism is proved

  7. A Formal Methods Approach to the Analysis of Mode Confusion

    Science.gov (United States)

    Butler, Ricky W.; Miller, Steven P.; Potts, James N.; Carreno, Victor A.

    2004-01-01

    The goal of the new NASA Aviation Safety Program (AvSP) is to reduce the civil aviation fatal accident rate by 80% in ten years and 90% in twenty years. This program is being driven by the accident data with a focus on the most recent history. Pilot error is the most commonly cited cause for fatal accidents (up to 70%) and obviously must be given major consideration in this program. While the greatest source of pilot error is the loss of situation awareness , mode confusion is increasingly becoming a major contributor as well. The January 30, 1995 issue of Aviation Week lists 184 incidents and accidents involving mode awareness including the Bangalore A320 crash 2/14/90, the Strasbourg A320 crash 1/20/92, the Mulhouse-Habsheim A320 crash 6/26/88, and the Toulouse A330 crash 6/30/94. These incidents and accidents reveal that pilots sometimes become confused about what the cockpit automation is doing. Consequently, human factors research is an obvious investment area. However, even a cursory look at the accident data reveals that the mode confusion problem is much deeper than just training deficiencies and a lack of human-oriented design. This is readily acknowledged by human factors experts. It seems that further progress in human factors must come through a deeper scrutiny of the internals of the automation. It is in this arena that formal methods can contribute. Formal methods refers to the use of techniques from logic and discrete mathematics in the specification, design, and verification of computer systems, both hardware and software. The fundamental goal of formal methods is to capture requirements, designs and implementations in a mathematically based model that can be analyzed in a rigorous manner. Research in formal methods is aimed at automating this analysis as much as possible. By capturing the internal behavior of a flight deck in a rigorous and detailed formal model, the dark corners of a design can be analyzed. This paper will explore how formal

  8. A Mathematical Formalization Proposal for Business Growth

    Directory of Open Access Journals (Sweden)

    Gheorghe BAILESTEANU

    2013-01-01

    Full Text Available Economic sciences have known a spectacular evolution in the last century; beginning to use axiomatic methods, applying mathematical instruments as a decision-making tool. The quest to formalization needs to be addressed from various different angles, reducing entry and operating formal costs, increasing the incentives for firms to operate formally, reducing obstacles to their growth, and searching for inexpensive approaches through which to enforce compliancy with government regulations. This paper proposes a formalized approach to business growth, based on mathematics and logics, taking into consideration the particularities of the economic sector.

  9. Formal language constrained path problems

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C.; Jacob, R.; Marathe, M.

    1997-07-08

    In many path finding problems arising in practice, certain patterns of edge/vertex labels in the labeled graph being traversed are allowed/preferred, while others are disallowed. Motivated by such applications as intermodal transportation planning, the authors investigate the complexity of finding feasible paths in a labeled network, where the mode choice for each traveler is specified by a formal language. The main contributions of this paper include the following: (1) the authors show that the problem of finding a shortest path between a source and destination for a traveler whose mode choice is specified as a context free language is solvable efficiently in polynomial time, when the mode choice is specified as a regular language they provide algorithms with improved space and time bounds; (2) in contrast, they show that the problem of finding simple paths between a source and a given destination is NP-hard, even when restricted to very simple regular expressions and/or very simple graphs; (3) for the class of treewidth bounded graphs, they show that (i) the problem of finding a regular language constrained simple path between source and a destination is solvable in polynomial time and (ii) the extension to finding context free language constrained simple paths is NP-complete. Several extensions of these results are presented in the context of finding shortest paths with additional constraints. These results significantly extend the results in [MW95]. As a corollary of the results, they obtain a polynomial time algorithm for the BEST k-SIMILAR PATH problem studied in [SJB97]. The previous best algorithm was given by [SJB97] and takes exponential time in the worst case.

  10. Milrinone and homeostasis to treat cerebral vasospasm associated with subarachnoid hemorrhage: the Montreal Neurological Hospital protocol.

    Science.gov (United States)

    Lannes, Marcelo; Teitelbaum, Jeanne; del Pilar Cortés, Maria; Cardoso, Mauro; Angle, Mark

    2012-06-01

    For the treatment of cerebral vasospasm, current therapies have focused on increasing blood flow through blood pressure augmentation, hypervolemia, the use of intra-arterial vasodilators, and angioplasty of proximal cerebral vessels. Through a large case series, we present our experience of treating cerebral vasospasm with a protocol based on maintenance of homeostasis (correction of electrolyte and glucose disturbances, prevention and treatment of hyperthermia, replacement of fluid losses), and the use of intravenous milrinone to improve microcirculation (the Montreal Neurological Hospital protocol). Our objective is to describe the use milrinone in our practice and the neurological outcomes associated with this approach. Large case series based on the review of all patients diagnosed with delayed ischemic neurologic deficits after aneurysmal subarachnoid hemorrhage between April 1999 and April 2006. 88 patients were followed for a mean time of 44.6 months. An intravenous milrinone infusion was used for a mean of 9.8 days without any significant side effects. No medical complications associated with this protocol were observed. There were five deaths; of the surviving patients, 48.9 % were able to go back to their previous baseline and 75 % had a good functional outcome (modified Rankin scale ≤ 2). A protocol using intravenous milrinone, and the maintenance of homeostasis is simple to use and requires less intensive monitoring and resources than the standard triple H therapy. Despite the obvious limitations of this study's design, we believe that it would be now appropriate to proceed with formal prospective studies of this protocol.

  11. Improving access to medicines for non-communicable diseases in rural India: a mixed methods study protocol using quasi-experimental design.

    Science.gov (United States)

    Prashanth, N S; Elias, Maya Annie; Pati, Manoj Kumar; Aivalli, Praveenkumar; Munegowda, C M; Bhanuprakash, Srinath; Sadhana, S M; Criel, Bart; Bigdeli, Maryam; Devadasan, Narayanan

    2016-08-22

    India has the distinction of financing its healthcare mainly through out-of-pocket expenses by individual families contributing to catastrophic health expenditure and impoverishment. Nearly 70 % of the expenditure is on medicines purchased at private pharmacies. Patients with chronic ailments are especially affected, as they often need lifelong medicines. Over the past years in India, there have been several efforts to improve drug availability at government primary health centres. In this study, we aim to understand health system factors that affect utilisation and access to generic medicines for people with non-communicable diseases. This study aims to understand if (and how) a package of interventions targeting primary health centres and community participation platforms affect utilisation and access to generic medicines for people with non-communicable diseases in the current district context in India. This study will employ a quasi-experimental design and a qualitative theory-driven approach. PHCs will be randomly assigned to one of three arms of the intervention. In one arm, PHCs will receive inputs to optimise service delivery for non-communicable diseases, while the second arm will receive an additional package of interventions to strengthen community participation platforms for improving non-communicable disease care. The third arm will be the control. We will conduct household and facility surveys, before and after the intervention and will estimate the effect of the intervention by difference-in-difference analysis. Sample size for measuring effects was calculated based on obtaining at least 30 households for each primary health centre spread across three distance-based clusters. Primary outcomes include availability and utilisation of medicines at primary health centres and out-of-pocket expenditure for medicines by non-communicable disease households. Focus group discussions with patients and in-depth interviews with health workers will also be

  12. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  13. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  14. A brief overview of NASA Langley's research program in formal methods

    Science.gov (United States)

    1992-01-01

    An overview of NASA Langley's research program in formal methods is presented. The major goal of this work is to bring formal methods technology to a sufficiently mature level for use by the United States aerospace industry. Towards this goal, work is underway to design and formally verify a fault-tolerant computing platform suitable for advanced flight control applications. Also, several direct technology transfer efforts have been initiated that apply formal methods to critical subsystems of real aerospace computer systems. The research team consists of six NASA civil servants and contractors from Boeing Military Aircraft Company, Computational Logic Inc., Odyssey Research Associates, SRI International, University of California at Davis, and Vigyan Inc.

  15. Formal Engineering Hybrid Systems: Semantic Underpinnings

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    In this work we investigate some issues in applying formal methods to hybrid system development and develop a categorical framework. We study the themes of stochastic reasoning, heterogeneous formal specification and retrenchment. Hybrid systems raise a rich pallets of aspects that need to be

  16. Methodological imperfection and formalizations in scientific activity

    International Nuclear Information System (INIS)

    Svetlichny, G.

    1987-01-01

    Any mathematical formalization of scientific activity allows for imperfections in the methodology that is formalized. These can be of three types, dirty, rotten, and dammed. Restricting mathematical attention to those methods that cannot be construed to be imperfect drastically reduces the class of objects that must be analyzed, and related all other objects to these more regular ones. Examples are drawn from empirical logic

  17. DNA expressions - A formal notation for DNA

    NARCIS (Netherlands)

    Vliet, Rudy van

    2015-01-01

    We describe a formal notation for DNA molecules that may contain nicks and gaps. The resulting DNA expressions denote formal DNA molecules. Different DNA expressions may denote the same molecule. Such DNA expressions are called equivalent. We examine which DNA expressions are minimal, which

  18. 37 CFR 251.41 - Formal hearings.

    Science.gov (United States)

    2010-07-01

    ... ARBITRATION ROYALTY PANEL RULES AND PROCEDURES COPYRIGHT ARBITRATION ROYALTY PANEL RULES OF PROCEDURE Procedures of Copyright Arbitration Royalty Panels § 251.41 Formal hearings. (a) The formal hearings that will be conducted under the rules of this subpart are rate adjustment hearings and royalty fee...

  19. Restorative Practices as Formal and Informal Education

    Science.gov (United States)

    Carter, Candice C.

    2013-01-01

    This article reviews restorative practices (RP) as education in formal and informal contexts of learning that are fertile sites for cultivating peace. Formal practices involve instruction about response to conflict, while informal learning occurs beyond academic lessons. The research incorporated content analysis and a critical examination of the…

  20. Multiverse in the Third Quantized Formalism

    International Nuclear Information System (INIS)

    Faizal Mir

    2014-01-01

    In this paper we will analyze the third quantization of gravity in path integral formalism. We will use the time-dependent version of Wheeler—DeWitt equation to analyze the multiverse in this formalism. We will propose a mechanism for baryogenesis to occur in the multiverse, without violating the baryon number conservation. (general)

  1. Formal balancing of chemical reaction networks

    NARCIS (Netherlands)

    van der Schaft, Abraham; Rao, S.; Jayawardhana, B.

    2016-01-01

    In this paper we recall and extend the main results of Van der Schaft, Rao, Jayawardhana (2015) concerning the use of Kirchhoff’s Matrix Tree theorem in the explicit characterization of complex-balanced reaction networks and the notion of formal balancing. The notion of formal balancing corresponds

  2. The simplest formal argument for fitness optimization

    Indian Academy of Sciences (India)

    The Formal Darwinism Project aims to provide a formal argument linking population genetics to fitness optimization, which of necessity includes defining fitness. This bridges the gulf between those biologists who assume that natural selection leads to something close to fitness optimization and those biologists who believe ...

  3. Opinion dynamics model based on quantum formalism

    Energy Technology Data Exchange (ETDEWEB)

    Artawan, I. Nengah, E-mail: nengahartawan@gmail.com [Theoretical Physics Division, Department of Physics, Udayana University (Indonesia); Trisnawati, N. L. P., E-mail: nlptrisnawati@gmail.com [Biophysics, Department of Physics, Udayana University (Indonesia)

    2016-03-11

    Opinion dynamics model based on quantum formalism is proposed. The core of the quantum formalism is on the half spin dynamics system. In this research the implicit time evolution operators are derived. The analogy between the model with Deffuant dan Sznajd models is discussed.

  4. A computational formalization for partial evaluation

    DEFF Research Database (Denmark)

    Hatcliff, John; Danvy, Olivier

    1997-01-01

    We formalize a partial evaluator for Eugenio Moggi's computational metalanguage. This formalization gives an evaluation-order independent view of binding-time analysis and program specialization, including a proper treatment of call unfolding. It also enables us to express the essence of `control...

  5. Rapid Prototyping of Formally Modelled Distributed Systems

    OpenAIRE

    Buchs, Didier; Buffo, Mathieu; Titsworth, Frances M.

    1999-01-01

    This paper presents various kinds of prototypes, used in the prototyping of formally modelled distributed systems. It presents the notions of prototyping techniques and prototype evolution, and shows how to relate them to the software life-cycle. It is illustrated through the use of the formal modelling language for distributed systems CO-OPN/2.

  6. On Fitting a Formal Method into Practice

    DEFF Research Database (Denmark)

    Gmehlich, Rainer; Grau, Katrin; Hallerstede, Stefan

    2011-01-01

    . The interaction between the two proved to be crucial for the success of the case study. The heart of the problem was tracing informal requirements from Problem Frames descriptions to formal Event-B models. To a large degree, this issue dictated the approach that had to be used for formal modelling. A dedicated...

  7. A Conceptual Formalization of Crosscutting in AOSD

    NARCIS (Netherlands)

    van den Berg, Klaas; Conejero, J.M.

    2005-01-01

    We propose a formalization of crosscutting based on a conceptual framework for AOSD. Crosscutting is clearly distinguished from the related concepts scattering and tangling. The definitions of these concepts are formalized and visualized with matrices and matrix operations. This allows more precise

  8. The content and role of formal contracts in high-tech alliances

    NARCIS (Netherlands)

    de Jong, Gjalt; Woolthuis, Rosalinde Ja Klein

    2009-01-01

    In this study we investigate the governance structure of innovation processes in high-tech alliances, focusing on the content and role of formal contracts. The design of a formal agreement is one of the most important strategic decisions for alliance partners. Drawing upon transaction cost arguments

  9. 42 CFR 411.380 - When CMS issues a formal advisory opinion.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false When CMS issues a formal advisory opinion. 411.380... Relationships Between Physicians and Entities Furnishing Designated Health Services § 411.380 When CMS issues a formal advisory opinion. (a) CMS considers an advisory opinion to be issued once it has received payment...

  10. Making Explicit the Formalism Underlying Evaluation in Music Information Retrieval Research

    DEFF Research Database (Denmark)

    Sturm, Bob L.

    2014-01-01

    We make explicit the formalism underlying evaluation in music information retrieval research. We define a ``system,'' what it means to ``analyze'' one, and make clear the aims, parts, design, execution, interpretation, assumptions and limitations of its ``evaluation.'' We apply this formalism...... to discuss the MIREX automatic mood classification task....

  11. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  12. Industrial Practice in Formal Methods : A Review

    DEFF Research Database (Denmark)

    Bicarregui, Juan C.; Fitzgerald, John; Larsen, Peter Gorm

    2009-01-01

    We examine the the industrial application of formal methods using data gathered in a review of 62 projects taking place over the last 25 years. The review suggests that formal methods are being applied in a wide range of application domains, with increasingly strong tool support. Significant chal...... challenges remain in providing usable tools that can be integrated into established development processes; in education and training; in taking formal methods from first use to second use, and in gathering and evidence to support informed selection of methods and tools.......We examine the the industrial application of formal methods using data gathered in a review of 62 projects taking place over the last 25 years. The review suggests that formal methods are being applied in a wide range of application domains, with increasingly strong tool support. Significant...

  13. SME´s semi-formality rate in Costa Rica: a clusters approach

    Directory of Open Access Journals (Sweden)

    Lizette Brenes Bonilla

    2016-02-01

    Full Text Available The MSME Observatory has been studying MSMEs in Costa Rica. Its findings show that for every formal enterprise, there are 2.4 semi-formal ones. The latter refers to those enterprises that have already started the formalization process with the corresponding municipality but that still do not have all the formalization requirements.Owing to the importance of the semi-formal sector in the economic activity of Costa Rica, this study analyzed this business park and the role of municipal management concerning MSMEs, calculated the correlation among semi-formality, competitiveness, and development, and finally, proposed a cluster design to deal with the state of affairs. It should be noted that this type of analysis has never been undertaken in the country.

  14. SBME : Exploring boundaries between formal, non-formal, and informal learning

    OpenAIRE

    Shahoumian, Armineh; Parchoma, Gale; Saunders, Murray; Hanson, Jacky; Dickinson, Mike; Pimblett, Mark

    2013-01-01

    In medical education learning extends beyond university settings into practice. Non-formal and informal learning support learners’ efforts to meet externally set and learner-identified objectives. In SBME research, boundaries between formal, non-formal, and informal learning have not been widely explored. Whether SBME fits within or challenges these categories can make a contribution. Formal learning is described in relation to educational settings, planning, assessment, and accreditation. In...

  15. Ovarian dynamics in response to two modified intravaginal progesterone releasing device and oestradiol benzoate based ovulation synchronisation protocols designed for use in Brahman heifers.

    Science.gov (United States)

    Edwards, S A A; Atkinson, P C; Satake, N; Boe-Hansen, G; McGowan, M R

    2014-07-01

    The objective was to investigate the ovarian response of Brahman heifers to two modified ovulation synchronisation protocols developed to increase the proportion of normal synchronous ovulations. Experiment 1 characterised the growth of the ovulatory follicle in heifers (n=19) treated with an intravaginal progesterone releasing device (IPRD) and oestradiol benzoate (ODB), to determine the optimal time to induce ovulation. Using the findings from Experiment 1, Experiment 2 investigated the effect of reducing the duration of IPRD insertion and increasing the interval from IPRD removal to ODB treatment (modified protocol 1 - OPO-6; n=20), and omitting ODB treatment at the time of IPRD insertion (modified protocol 2 - PO-6; n=20). An IPRD (0.78 g progesterone) was inserted at Day 0 (OPO-8) or Day 2 (OPO-6 and PO-6) and all heifers also received 1 mg ODB i.m. Day 8: IPRD removed + 500 μg cloprostenol i.m. At 24 h (OPO-8) and 36 h (OPO-6 and PO-6) post IPRD removal: 1 mg ODB i.m. Fixed-time AI (FTAI) occurred at 54 h for OPO-8 and 72 h for OPO-6 and PO-6, post IPRD removal. After IPRD treatment all OPO-6 and OPO-8 heifers initiated a new follicular wave whereas 25% of PO-6 heifers failed. Diameter of the dominant follicle was larger at FTAI in the PO-6 (11.34 ± 0.50 mm) compared to the OPO-8 protocol (9.74 ± 0.51 mm; P<0.05), but similar to the OPO-6 protocol (10.52 ± 0.51 mm). Proportion of ovulations occurring 12 h prior and 24 h post FTAI was similar for the PO-6 (80%) and OPO-6 (75%) protocols but numerically lower in the OPO-8 heifers (60%). The apparent improvement in ovarian response in heifers treated with the modified protocols needs to be confirmed in larger field studies. Copyright © 2014 Elsevier B.V. All rights reserved.

  16. Improving Learner Outcomes in Lifelong Education: Formal Pedagogies in Non-Formal Learning Contexts?

    Science.gov (United States)

    Zepke, Nick; Leach, Linda

    2006-01-01

    This article explores how far research findings about successful pedagogies in formal post-school education might be used in non-formal learning contexts--settings where learning may not lead to formal qualifications. It does this by examining a learner outcomes model adapted from a synthesis of research into retention. The article first…

  17. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  18. Functional Automata - Formal Languages for Computer Science Students

    Directory of Open Access Journals (Sweden)

    Marco T. Morazán

    2014-12-01

    Full Text Available An introductory formal languages course exposes advanced undergraduate and early graduate students to automata theory, grammars, constructive proofs, computability, and decidability. Programming students find these topics to be challenging or, in many cases, overwhelming and on the fringe of Computer Science. The existence of this perception is not completely absurd since students are asked to design and prove correct machines and grammars without being able to experiment nor get immediate feedback, which is essential in a learning context. This article puts forth the thesis that the theory of computation ought to be taught using tools for actually building computations. It describes the implementation and the classroom use of a library, FSM, designed to provide students with the opportunity to experiment and test their designs using state machines, grammars, and regular expressions. Students are able to perform random testing before proceeding with a formal proof of correctness. That is, students can test their designs much like they do in a programming course. In addition, the library easily allows students to implement the algorithms they develop as part of the constructive proofs they write. Providing students with this ability ought to be a new trend in the formal languages classroom.

  19. Colloquium: Mechanical formalisms for tissue dynamics.

    Science.gov (United States)

    Tlili, Sham; Gay, Cyprien; Graner, François; Marcq, Philippe; Molino, François; Saramito, Pierre

    2015-05-01

    The understanding of morphogenesis in living organisms has been renewed by tremendous progress in experimental techniques that provide access to cell scale, quantitative information both on the shapes of cells within tissues and on the genes being expressed. This information suggests that our understanding of the respective contributions of gene expression and mechanics, and of their crucial entanglement, will soon leap forward. Biomechanics increasingly benefits from models, which assist the design and interpretation of experiments, point out the main ingredients and assumptions, and ultimately lead to predictions. The newly accessible local information thus calls for a reflection on how to select suitable classes of mechanical models. We review both mechanical ingredients suggested by the current knowledge of tissue behaviour, and modelling methods that can help generate a rheological diagram or a constitutive equation. We distinguish cell scale ("intra-cell") and tissue scale ("inter-cell") contributions. We recall the mathematical framework developed for continuum materials and explain how to transform a constitutive equation into a set of partial differential equations amenable to numerical resolution. We show that when plastic behaviour is relevant, the dissipation function formalism appears appropriate to generate constitutive equations; its variational nature facilitates numerical implementation, and we discuss adaptations needed in the case of large deformations. The present article gathers theoretical methods that can readily enhance the significance of the data to be extracted from recent or future high throughput biomechanical experiments.

  20. Application of Bondarenko formalism to fusion reactors

    International Nuclear Information System (INIS)

    Soran, P.D.; Dudziak, D.J.

    1975-01-01

    The Bondarenko formalism used to account for resonance self-shielding effects (temperature and composition) in a Reference Theta-Pinch Reactor is reviewed. A material of interest in the RTPR blanket is 93 Nb, which exhibits a large number of capture resonance in the energy region below 800 keV. Although Nb constitutes a small volume fraction of the blanket, its presence significantly affects the nucleonic properties of the RTPR blanket. The effects of self-shielding in 93 Nb on blanket parameters such as breeding ratio, total afterheat, radioactivity, magnet-coil heating and total energy depositions have been studied. Resonance self-shielding of 93 Nb, as compared to unshielded cross sections, will increase tritium breeding by approximately 7 percent in the RTPR blanket and will decrease blanket radioactivity, total recoverable energy, and magnet-coil heating. Temperature effects change these parameters by less than 2 percent. The method is not restricted to the RTPR, as a single set of Bondarenko f-factors is suitable for application to a variety of fusion reactor designs