WorldWideScience

Sample records for e-ebppevidence-based practice protocol

  1. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  2. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  3. Using Think Aloud Protocols to Assess E-Prescribing in Community Pharmacies

    Directory of Open Access Journals (Sweden)

    Olufunmilola K. Odukoya, BPharm, MS

    2012-01-01

    Full Text Available Introduction: Think aloud protocol has rarely been used as a method of data collection in community pharmacies.Purpose: The aim of the report is to describe how think aloud protocols were used to identify issues that arise when using e-prescribing technology in pharmacies. In this paper, we report on the benefits and challenges of using think aloud protocols in pharmacies to examine the use of e-prescribing systems.Methods: Sixteen pharmacists and pharmacy technicians were recruited from seven community pharmacies in Wisconsin. Data were collected using direct observation alongside think aloud protocol. Direct observations and think aloud protocols took place between January-February, 2011. Participants were asked to verbalize their thoughts as they process electronic prescriptions.Results: Participants identified weaknesses in e-prescribing that they had previously not conceived. This created heightened awareness for vigilance when processing e-prescriptions. The main challenge with using think aloud protocols was due to interruptions in the pharmacies. Also, a few participants found it challenging to remember to continue verbalizing their thought process during think aloud sessions.Conclusion: The use of think aloud protocols as method of data collection is a new way for understanding the issues related to technology use in community pharmacy practice. Think aloud protocol was beneficial in providing objective information on e-prescribing use not solely based on pharmacist’s or technician’s opinion of the technology. This method provided detailed information on a wide variety of real time challenges with e-prescribing technology use in community pharmacies. Using this data collection method can help identify potential patient safety issues when using e-prescribing and suggestions for redesign.

  4. SU-E-I-68: Practical Considerations On Implementation of the Image Gently Pediatric CT Protocols

    International Nuclear Information System (INIS)

    Zhang, J; Adams, C; Lumby, C; Dillon, J; Woods, E; Richer, E

    2014-01-01

    Purpose: One limitation associated with the Image Gently pediatric CT protocols is practical implementation of the recommended manual techniques. Inconsistency as a result of different practice is a possibility among technologist. An additional concern is the added risk of data error that would result in over or underexposure. The Automatic Exposure Control (AEC) features automatically reduce radiation for children. However, they do not work efficiently for the patients of very small size and relative large size. This study aims to implement the Image Gently pediatric CT protocols in the practical setting while maintaining the use of AEC features for pediatric patients of varying size. Methods: Anthropomorphological abdomen phantoms were scanned in a CT scanner using the Image Gently pediatric protocols, the AEC technique with a fixed adult baseline, and automatic protocols with various baselines. The baselines were adjusted corresponding to patient age, weight and posterioranterior thickness to match the Image Gently pediatric CT manual techniques. CTDIvol was recorded for each examination. Image noise was measured and recorded for image quality comparison. Clinical images were evaluated by pediatric radiologists. Results: By adjusting vendor default baselines used in the automatic techniques, radiation dose and image quality can match those of the Image Gently manual techniques. In practice, this can be achieved by dividing pediatric patients into three major groups for technologist reference: infant, small child, and large child. Further division can be done but will increase the number of CT protocols. For each group, AEC can efficiently adjust acquisition techniques for children. This implementation significantly overcomes the limitation of the Image Gently manual techniques. Conclusion: Considering the effectiveness in clinical practice, Image Gently Pediatric CT protocols can be implemented in accordance with AEC techniques, with adjusted baselines, to

  5. Practical Use of the Extended No Action Level (eNAL) Correction Protocol for Breast Cancer Patients With Implanted Surgical Clips

    International Nuclear Information System (INIS)

    Penninkhof, Joan; Quint, Sandra; Baaijens, Margreet; Heijmen, Ben; Dirkx, Maarten

    2012-01-01

    Purpose: To describe the practical use of the extended No Action Level (eNAL) setup correction protocol for breast cancer patients with surgical clips and evaluate its impact on the setup accuracy of both tumor bed and whole breast during simultaneously integrated boost treatments. Methods and Materials: For 80 patients, two orthogonal planar kilovoltage images and one megavoltage image (for the mediolateral beam) were acquired per fraction throughout the radiotherapy course. For setup correction, the eNAL protocol was applied, based on registration of surgical clips in the lumpectomy cavity. Differences with respect to application of a No Action Level (NAL) protocol or no protocol were quantified for tumor bed and whole breast. The correlation between clip migration during the fractionated treatment and either the method of surgery or the time elapsed from last surgery was investigated. Results: The distance of the clips to their center of mass (COM), averaged over all clips and patients, was reduced by 0.9 ± 1.2 mm (mean ± 1 SD). Clip migration was similar between the group of patients starting treatment within 100 days after surgery (median, 53 days) and the group starting afterward (median, 163 days) (p = 0.20). Clip migration after conventional breast surgery (closing the breast superficially) or after lumpectomy with partial breast reconstructive techniques (sutured cavity). was not significantly different either (p = 0.22). Application of eNAL on clips resulted in residual systematic errors for the clips’ COM of less than 1 mm in each direction, whereas the setup of the breast was within about 2 mm of accuracy. Conclusions: Surgical clips can be safely used for high-accuracy position verification and correction. Given compensation for time trends in the clips’ COM throughout the treatment course, eNAL resulted in better setup accuracies for both tumor bed and whole breast than NAL.

  6. E-Learning and Evidence Based Practice in Schools

    Science.gov (United States)

    Quong, Terrence

    2016-01-01

    JCTIC has used open source software to develop a unique school online environment that has made evidence based practice viable in their school. In this paper the proposition is made that eLearning enables evidence based practice which in turn leads to improved student outcomes. Much has been written about evidence based practice in schools, but…

  7. A critical analysis of a locally agreed protocol for clinical practice

    International Nuclear Information System (INIS)

    Owen, A.; Hogg, P.; Nightingale, J.

    2004-01-01

    Within the traditional scope of radiographic practice (including advanced practice) there is a need to demonstrate effective patient care and management. Such practice should be set within a context of appropriate evidence and should also reflect peer practice. In order to achieve such practice the use of protocols is encouraged. Effective protocols can maximise care and management by minimising inter- and intra-professional variation; they can also allow for detailed procedural records to be kept in case of legal claims. However, whilst literature exists to encourage the use of protocols there is little published material available to indicate how to create, manage and archive them. This article uses an analytical approach to propose a suitable method for protocol creation and archival, it also offers suggestions on the scope and content of a protocol. To achieve this an existing clinical protocol for radiographer reporting barium enemas is analysed to draw out the general issues. Proposals for protocol creation, management, and archival were identified. The clinical practice described or inferred in the protocol should be drawn from evidence, such evidence could include peer-reviewed material, national standards and peer practice. The protocol should include an explanation of how to proceed when the radiographers reach the limit of their ability. It should refer to the initial training required to undertake the clinical duties as well as the on-going continual professional updating required to maintain competence. Audit of practice should be indicated, including the preferred audit methodology, and associated with this should be a clear statement about standards and what to do if standards are not adequately met. Protocols should be archived, in a paper-based form, for lengthy periods in case of legal claims. On the archived protocol the date it was in clinical use should be included

  8. A protocol for analysing mathematics teacher educators' practices

    OpenAIRE

    Kuzle , Ana; Biehler , Rolf

    2015-01-01

    International audience; Studying practices in a teaching-learning environment, such as professional development programmes, is a complex and multi-faceted endeavour. While several frameworks exist to help researchers analyse teaching practices, none exist to analyse practices of those who organize professional development programmes, namely mathematics teacher educators. In this paper, based on theoretical as well as empirical results, we present a protocol for capturing different aspects of ...

  9. A novel porcine cell culture based protocol for the propagation of hepatitis E virus

    Directory of Open Access Journals (Sweden)

    Walter Chingwaru

    2016-08-01

    Full Text Available Objective: To present a comprehensive protocol for the processing of hepatitis E virus (HEV infected samples and propagation of the virus in primary cell cultures. Methods: Hepatitis E was extracted from porcine liver and faecal samples following standard protocols. The virus was then allowed to attach in the presence of trypsin to primary cells that included porcine and bovine intestinal epithelial cells and macrophages over a period of up to 3 h. The virus was propagated by rotational passaging through the cell cultures. Propagation was confirmed by immunoblotting. Results: We developed a comprehensive protocol to propagate HEV in porcine cell model that includes (i rotational culturing of the virus between porcine cell types, (ii pre-incubation of infected cells for 210 min, (iii use of a semi-complete cell culture medium supplemented with trypsin (0.33 µg/mL and (iv the use of simple immunoblot technique to detect the amplified virus based on the open reading frame 2/3. Conclusions: This protocol opens doors towards systematic analysis of the mechanisms that underlie the pathogenesis of HEV in vitro. Using our protocol, one can complete the propagation process within 6 to 9 d.

  10. The P-A-C-I-E-N-T-E Protocol: An instrument for breaking bad news adapted to the Brazilian medical reality

    Directory of Open Access Journals (Sweden)

    Carolina Rebello Pereira

    Full Text Available Summary Objective: There are plenty of published tools for breaking bad medical news; however, none of them is culturally appropriate to our reality or published in the Brazilian literature. This study proposes a genuinely Brazilian communication tool and evaluates its acceptance among doctors and nurses. Method: This was a prospective study. The data were collected after specific training of doctors and nurses on the bad news communication techniques based on the P-A-C-I-E-N-T-E ("patient," in Portuguese Protocol. This instrument is in accordance with the Brazilian reality and was based on the SPIKES communication tool. Results: The worst task to be performed during communication is "talking about death" followed by "discussing the end of curative treatment attempts" and "diagnosis" itself. Among the respondents, 48% reported they did not receive formal training for communicating. Also, 52% of respondents do not use any systematic approach in their daily practice when communicating with patients, but 97% considered the proposed P-A-C-I-E-N-T-E Protocol as a useful and appropriate communication tool. Conclusion: The P-A-C-I-E-N-T-E Protocol proved to be suitable to the Brazilian context.

  11. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  12. Colon cleansing protocol in children: research conditions vs. clinical practice.

    Science.gov (United States)

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  13. Practical private database queries based on a quantum-key-distribution protocol

    International Nuclear Information System (INIS)

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-01-01

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  14. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  15. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  16. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  17. Development of a waste management protocol based on assessment of knowledge and practice of healthcare personnel in surgical departments.

    Science.gov (United States)

    Mostafa, Gehan M A; Shazly, Mona M; Sherief, Wafaa I

    2009-01-01

    Good healthcare waste management in a hospital depends on a dedicated waste management team, good administration, careful planning, sound organization, underpinning legislation, adequate financing, and full participation by trained staff. Hence, waste management protocols must be convenient and sensible. To assess the knowledge and practice related to waste management among doctors, nurses, and housekeepers in the surgical departments at Al-Mansoura University Hospital, and to design and validate a waste management protocol for the health team in these settings. This cross-sectional study was carried out in the eight surgical departments at Al-Mansoura University Hospital. All health care personnel and their assistants were included: 38 doctors, 106 nurses, and 56 housekeepers. Two groups of jury were included for experts' opinions validation of the developed protocol, one from academia (30 members) and the other from service providers (30 members). Data were collected using a self-administered knowledge questionnaire for nurses and doctors, and an interview questionnaire for housekeepers. Observation checklists were used for assessment of performance. The researchers developed the first draft of the waste management protocol according to the results of the analysis of the data collected in the assessment phase. Then, the protocol was presented to the jury group for validation, and then was implemented. Only 27.4% of the nurses, 32.1% of the housekeepers, and 36.8% of the doctors had satisfactory knowledge. Concerning practice, 18.9% of the nurses, 7.1% of the housekeepers, and none of the doctors had adequate practice. Nurses' knowledge score had a statistically significant weak positive correlation with the attendance of training courses (r=0.23, pwaste management. The knowledge among nurses is positively affected by attendance of training programs. Based on the findings, a protocol for healthcare waste management was developed and validated. It is recommended to

  18. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    Science.gov (United States)

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  19. Compliance with AAPM Practice Guideline 1.a: CT Protocol Management and Review — from the perspective of a university hospital

    Science.gov (United States)

    Bour, Robert K.; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    The purpose of this paper is to describe our experience with the AAPM Medical Physics Practice Guideline 1.a: “CT Protocol Management and Review Practice Guideline”. Specifically, we will share how our institution's quality management system addresses the suggestions within the AAPM practice report. We feel this paper is needed as it was beyond the scope of the AAPM practice guideline to provide specific details on fulfilling individual guidelines. Our hope is that other institutions will be able to emulate some of our practices and that this article would encourage other types of centers (e.g., community hospitals) to share their methodology for approaching CT protocol optimization and quality control. Our institution had a functioning CT protocol optimization process, albeit informal, since we began using CT. Recently, we made our protocol development and validation process compliant with a number of the ISO 9001:2008 clauses and this required us to formalize the roles of the members of our CT protocol optimization team. We rely heavily on PACS‐based IT solutions for acquiring radiologist feedback on the performance of our CT protocols and the performance of our CT scanners in terms of dose (scanner output) and the function of the automatic tube current modulation. Specific details on our quality management system covering both quality control and ongoing optimization have been provided. The roles of each CT protocol team member have been defined, and the critical role that IT solutions provides for the management of files and the monitoring of CT protocols has been reviewed. In addition, the invaluable role management provides by being a champion for the project has been explained; lack of a project champion will mitigate the efforts of a CT protocol optimization team. Meeting the guidelines set forth in the AAPM practice guideline was not inherently difficult, but did, in our case, require the cooperation of radiologists, technologists, physicists, IT

  20. The Architecture of WiFi-Based WSN for AMR System and E-HWMP Routing Protocol

    Directory of Open Access Journals (Sweden)

    Li LI

    2014-02-01

    Full Text Available With the development of SoC technology in recent years, the ultra-low power WiFi System on SoC Chip has emerged. As a result, WiFi-based Wireless Sensor Networks come into use, especially used in Automatic Meter Reading. While because the nodes of Wireless Sensor Networks have limited energy supply, smaller storage capability and slower calculation ability, the current WiFi technology cannot be directly applied to WiFi-based Wireless Sensor Networks. The protocols should be upgraded and the security algorithms should be improved to meet the new requests. Firstly, this article describes the network architecture of WiFi-based WSN for AMR system and discusses the reason for using this analogous Mesh architecture. Secondly, the new Hardware architecture of WiFi-based WSN node is designed to realize the AMR system and verify the research work. The node can collect the data of power meter by WiFi and can be powered by a Lithium Battery. Thirdly, on the basis of study work of WiFi original routing protocol HWMP, a new method on improving the energy saving ability of HWMP to adapt the new features of WiFi-based WSN is proposed. And the simulation work on the new routing protocol E-HWMP has been done with NS2 and the simulation results show that the life cycle of the network has been extended to some degree.

  1. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  2. Studying protocol-based pain management in the emergency department

    Directory of Open Access Journals (Sweden)

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  3. Study on Cloud Security Based on Trust Spanning Tree Protocol

    Science.gov (United States)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  4. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  5. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    International Nuclear Information System (INIS)

    2016-01-01

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  6. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  7. Quorum system and random based asynchronous rendezvous protocol for cognitive radio ad hoc networks

    Directory of Open Access Journals (Sweden)

    Sylwia Romaszko

    2013-12-01

    Full Text Available This paper proposes a rendezvous protocol for cognitive radio ad hoc networks, RAC2E-gQS, which utilizes (1 the asynchronous and randomness properties of the RAC2E protocol, and (2 channel mapping protocol, based on a grid Quorum System (gQS, and taking into account channel heterogeneity and asymmetric channel views. We show that the combination of the RAC2E protocol with the grid-quorum based channel mapping can yield a powerful RAC2E-gQS rendezvous protocol for asynchronous operation in a distributed environment assuring a rapid rendezvous between the cognitive radio nodes having available both symmetric and asymmetric channel views. We also propose an enhancement of the protocol, which uses a torus QS for a slot allocation, dealing with the worst case scenario, a large number of channels with opposite ranking lists.

  8. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  9. Security of a practical semi-device-independent quantum key distribution protocol against collective attacks

    International Nuclear Information System (INIS)

    Wang Yang; Bao Wan-Su; Li Hong-Wei; Zhou Chun; Li Yuan

    2014-01-01

    Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribution (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one-way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. (general)

  10. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  11. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  12. Recasting a traditional laboratory practical as a "Design-your-own protocol" to teach a universal research skill.

    Science.gov (United States)

    Whitworth, David E

    2016-07-08

    Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to develop generic practical skills. To provide an opportunity for students to develop the skills needed to create bespoke protocols for experimental benchwork, a traditional practical was repurposed. Students were given a list of available resources and an experimental goal, and directed to create a bench protocol to achieve the aim (measuring the iron in hemoglobin). In a series of teaching events students received feedback from staff, and peers prototyped the protocols, before protocols were finally implemented. Graduates highlighted this exercise as one of the most important of their degrees, primarily because of the clear relevance of the skills acquired to professional practice. The exercise exemplifies a range of pedagogic principles, but arguably its most important innovation is that it repurposed a pre-existing practical. This had the benefits of automatically providing scaffolding to direct the students' thought processes, while retaining the advantages of a "discovery learning" exercise, and allowing facile adoption of the approach across the sector. © 2016 by The International Union of Biochemistry and Molecular Biology, 44(4):377-380, 2016. © 2016 The International Union of Biochemistry and Molecular Biology.

  13. A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.

    Science.gov (United States)

    Yang, Wenlun; Fu, Minyue

    2017-11-01

    Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  14. Massive transfusion protocols: current best practice

    Directory of Open Access Journals (Sweden)

    Hsu YM

    2016-03-01

    Full Text Available Yen-Michael S Hsu,1 Thorsten Haas,2 Melissa M Cushing1 1Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, NY, USA; 2Department of Anesthesia, University Children's Hospital Zurich, Zurich, Switzerland Abstract: Massive transfusion protocols (MTPs are established to provide rapid blood replacement in a setting of severe hemorrhage. Early optimal blood transfusion is essential to sustain organ perfusion and oxygenation. There are many variables to consider when establishing an MTP, and studies have prospectively evaluated different scenarios and patient populations to establish the best practices to attain improved patient outcomes. The establishment and utilization of an optimal MTP is challenging given the ever-changing patient status during resuscitation efforts. Much of the MTP literature comes from the trauma population, due to the fact that massive hemorrhage is the leading cause of preventable trauma-related death. As we come to further understand the positive and negative clinical impacts of transfusion-related factors, massive transfusion practice can be further refined. This article will first discuss specific MTPs targeting different patient populations and current relevant international guidelines. Then, we will examine a wide selection of therapeutic products to support MTPs, including newly available products and the most suitable of the traditional products. Lastly, we will discuss the best design for an MTP, including ratio-based MTPs and MTPs based on the use of point-of-care coagulation diagnostic tools. Keywords: hemorrhage, MTP, antifibrinolytics, coagulopathy, trauma, ratio, logistics, guidelines, hemostatic

  15. SSL and TLS Theory and Practice

    CERN Document Server

    Oppliger, Rolf

    2009-01-01

    SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a solid understanding of their design. You find discussions on the advantages and disadvantages of using SSL/TLS protocols compared to other Internet security protocols. This authoritative resource shows how to properly employ SSL and TLS and configure security

  16. TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective

    International Nuclear Information System (INIS)

    MacDougall, R.

    2016-01-01

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  17. TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective

    Energy Technology Data Exchange (ETDEWEB)

    MacDougall, R. [Boston Children’s Hospital (United States)

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  18. From workshop to work practice: An exploration of context and facilitation in the development of evidence-based practice.

    Science.gov (United States)

    Ellis, Isabelle; Howard, Peter; Larson, Ann; Robertson, Jeanette

    2005-01-01

    This article examines the process of translating evidence into practice using a facilitation model developed by the Western Australian Centre for Evidence Based Nursing and Midwifery. Using the conceptual framework Promoting Action on Research Implementation in Health Services (PARIHS), the aims of the study were (1) to explore the relative and combined importance of context and facilitation in the successful implementation of a new evidence-based clinical practice protocol and (2) to examine the establishment of more lasting change to individuals and organizations that resulted in greater incorporation of the principles of evidence-based practice (EBP). A pre-workshop, semi-structured telephone survey with 16 nurse managers in six rural hospitals; a summative evaluation immediately post-workshop with 54 participants; and follow-up, semi-structured interviews with 23 workshop participants. The contexts in each of the participating hospitals were very different; of the six hospitals, only one had not implemented the new protocol. Five had reviewed their practices and brought them in line with the protocol developed at the workshop. The rate of adoption varied considerably from 2 weeks to months. The participants reported being better informed about EBP in general and were positive about their ability to improve their practice and search more efficiently for best practice information. Underlying motivations for protocol development should be included in the PARIHS framework. IMPLICATIONS FOR EDUCATION: Good facilitation appears to be more influential than context in overcoming the barriers to the uptake of EBP.

  19. A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielsen, Christoffer Rosenkilde

    2007-01-01

    Static analysis is successfully used for automatically validating security properties of classical cryptographic protocols. In this paper, we shall employ the same technique to a modern security protocol for wireless networks, namely the latest version of the Privacy and Key Management protocol...... for IEEE 802.16e, PKMv2. This protocol seems to have an exaggerated mixture of security features. Thus, we iteratively investigate which components are necessary for upholding the security properties and which can be omitted safely. This approach is based on the LySa process calculus and employs...

  20. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  1. WE-E-304-00: Implementing SBRT Protocols

    International Nuclear Information System (INIS)

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  2. WE-E-304-00: Implementing SBRT Protocols

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  3. Preservice Teachers' Teacher Efficacy Beliefs and Constructivist-Based Teaching Practice

    Science.gov (United States)

    Temiz, Tugba; Topcu, Mustafa Sami

    2013-01-01

    The purpose of this paper is to explore the relationship between preservice teachers' (PTs) teacher efficacy beliefs and their constructivist-based teaching practices. Data were gathered through the questionnaire (Teachers' Sense of Efficacy Scale) and the observation protocol (Reformed Teaching Observation Protocol) administered to the…

  4. An XML-based communication protocol for accelerator distributed controls

    International Nuclear Information System (INIS)

    Catani, L.

    2008-01-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding

  5. An XML-based communication protocol for accelerator distributed controls

    Energy Technology Data Exchange (ETDEWEB)

    Catani, L. [INFN-Roma Tor Vergata, Rome (Italy)], E-mail: luciano.catani@roma2.infn.it

    2008-03-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding.

  6. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    International Nuclear Information System (INIS)

    Van Atta, Angela J.; Baskin, Henry J.; Maves, Connie K.; Dansie, David M.; Rollins, Michael D.; Bolte, Robert G.; Mundorff, Michael B.; Andrews, Seth P.

    2015-01-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  7. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Van Atta, Angela J. [University of Utah School of Medicine, Salt Lake City, UT (United States); Baskin, Henry J.; Maves, Connie K.; Dansie, David M. [Primary Children' s Hospital, Department of Radiology, Salt Lake City, UT (United States); Rollins, Michael D. [University of Utah School of Medicine, Department of Surgery, Division of Pediatric Surgery, Salt Lake City, UT (United States); Bolte, Robert G. [University of Utah School of Medicine, Department of Pediatrics, Division of Pediatric Emergency Medicine, Salt Lake City, UT (United States); Mundorff, Michael B.; Andrews, Seth P. [Primary Children' s Hospital, Systems Improvement, Salt Lake City, UT (United States)

    2015-05-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  8. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  9. A theory-based implementation program for alcohol screening and brief intervention (ASBI) in general practices: Planned development and study protocol of a cluster randomised controlled trial.

    Science.gov (United States)

    Abidi, L; Oenema, A; Candel, M J J M; van de Mheen, D

    2016-11-01

    Previous studies have shown that alcohol screening and brief intervention (ASBI) in general practices can lead to significant reductions in alcohol consumption among patients, yet ASBI is rarely implemented into routine clinical practice. The aim of this paper is to describe the development and evaluation of an ASBI implementation program aimed at increasing ASBI delivery rates of general practitioners (GPs) and decreasing patients' alcohol consumption. This study protocol describes the step-wise development and evaluation of an ASBI implementation program. A four-step method is used to identify relevant determinants of change and intervention components based on the Behaviour Change Wheel and the Theoretical Domains Framework. The program will be evaluated in general practices in The Netherlands in a two-arm cluster randomised controlled trial which investigates the effect of the program on GPs' ASBI delivery behaviour as well as on patients' alcohol consumption. Effective theory- and practice-based strategies to implement ASBI in general practices are highly needed. Using a stepwise method we described the development of a program consisting of an e-learning module, a tailored feedback module and environmental support and materials. We hypothesize that this program will result in an increase of GPs' ASBI delivery behaviour. Secondly, we expect an overall decrease in percentage of patients with excessive or problematic alcohol use and a higher proportion of patients from GPs receiving the ASBI implementation program decreasing their alcohol consumption, compared to patients from GPs in the control group. NTR5539. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. PREMEDICATION PROTOCOLS IN DENTAL PRACTICE IN ALLERGIC PATIENTS.

    OpenAIRE

    Angelina Kisselova; Adriana Krasteva; Assya Krasteva

    2011-01-01

    The problem with choosing a suitable pre-medication protocols before local anesthesia in dentistry in allergic patients is always discussed, as in the dental practice different schemes are already proven (3,5). The propose of this communication is to share the experience on those pre-medication schemes in allergic patients during and outside pollen season.

  11. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    Science.gov (United States)

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  12. Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol

    International Nuclear Information System (INIS)

    Chen, I-C; Hwang Tzonelih; Li C-M

    2008-01-01

    On the basis of the modified four-coherent-state post-selection quantum key distribution protocol (Namiki and Hirano 2006 Preprint quant-ph/0608144v1), two 1-out-of-2 quantum oblivious transfer (QOT 2 1 ) protocols are proposed. The first proposed protocol (called the receiver-based QOT 2 1 protocol) requires the coherent states to be prepared by the receiver, whereas the second protocol (called the sender-based QOT 2 1 protocol) allows the coherent states to be generated by the sender. The main advantages of the proposed protocols are that (i) no quantum bit commitment schemes and the assumption of quantum memory are needed; (ii) less communication cost between participants is required, i.e. the receiver-based QOT 2 1 protocol requires only one quantum communication and one classical communication and the sender-based QOT 2 1 protocol requires only one quantum communication between participants during protocol execution; and (iii) the utilization of quantum states is very efficient, wherein the receiver-based and the sender-based QOT 2 1 protocols use only two coherent pulses and one coherent pulse respectively for sending the sender's two messages

  13. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  14. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2012-02-01

    Full Text Available A wireless medical sensor network (WMSN can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1 a two-factor (i.e., password and smartcard professional authentication; (2 mutual authentication between the professional and the medical sensor; (3 symmetric encryption/decryption for providing message confidentiality; (4 establishment of a secure session key at the end of authentication; and (5 professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost. Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  15. How to write a surgical clinical research protocol: literature review and practical guide.

    Science.gov (United States)

    Rosenthal, Rachel; Schäfer, Juliane; Briel, Matthias; Bucher, Heiner C; Oertli, Daniel; Dell-Kuster, Salome

    2014-02-01

    The study protocol is the core document of every clinical research project. Clinical research in studies involving surgical interventions presents some specific challenges, which need to be accounted for and described in the study protocol. The aim of this review is to provide a practical guide for developing a clinical study protocol for surgical interventions with a focus on methodologic issues. On the basis of an in-depth literature search of methodologic literature and on some cardinal published surgical trials and observational studies, the authors provides a 10-step guide for developing a clinical study protocol in surgery. This practical guide outlines key methodologic issues important when planning an ethically and scientifically sound research project involving surgical interventions, with the ultimate goal of providing high-level evidence relevant for health care decision making in surgery. Copyright © 2014 Elsevier Inc. All rights reserved.

  16. Low Cost ZigBee Protocol Based Laboratory Platforms

    Directory of Open Access Journals (Sweden)

    Alvaro Romero-Acero

    2013-11-01

    Full Text Available This paper presents a low cost wireless communication platform, based on the ZigBee protocol. It is designed with the purpose to strengthen the use of information technology in the classroom. Guides laboratory practices are focused on developing undergraduate engineering students to the area of telecommunications. The platform structure is composed of: Labs custom designed, web tools embedded wireless communication system for data acquisition in real time, and the Human Machine Interface (HMI, which records analog data and digital. 

  17. Shortened protocol in practical [11C]SA4503-PET studies for sigma1 receptor quantification

    International Nuclear Information System (INIS)

    Sakata, Muneyuki; Kimura, Yuichi; Ishikawa, Masatomo; Oda, Keiichi; Ishii, Kenji; Ishiwata, Kiichi; Naganawa, Mika; Hashimoto, Kenji; Chihara, Kunihiro

    2008-01-01

    In practical positron emission tomography (PET) diagnosis, a shortened protocol is preferred for patients with brain disorders. In this study, the applicability of a shortened protocol as an alternative to the 90-min PET scan with [ 11 C]SA4503 for quantitative sigma 1 receptor measurement was investigated. Tissue time-activity curves of 288 regions of interest in the brain from 32 [ 11 C]SA4503-PET scans of 16 healthy subjects prior to and following administration of a selective serotonin reuptake inhibitor (fluvoxamine or paroxetine) were applied to two algorithms of quantitative analysis; binding potential (BP) was derived from compartmental analysis based on nonlinear estimation, and total distribution volume (tDV) was derived from Logan plot analysis. As a result, although both BP and tDV tended to be underestimated by the shortened method, the estimates from the shortened protocol had good linear relationships with those of the full-length protocol. In conclusion, if approximately 10% differences in the estimated results are acceptable for a specific purpose, then a 60-min measurement protocol is capable of providing reliable results. (author)

  18. Improving implementation of evidence-based practice in mental health service delivery: protocol for a cluster randomised quasi-experimental investigation of staff-focused values interventions.

    Science.gov (United States)

    Williams, Virginia; Oades, Lindsay G; Deane, Frank P; Crowe, Trevor P; Ciarrochi, Joseph; Andresen, Retta

    2013-07-02

    There is growing acceptance that optimal service provision for individuals with severe and recurrent mental illness requires a complementary focus on medical recovery (i.e., symptom management and general functioning) and personal recovery (i.e., having a 'life worth living'). Despite significant research attention and policy-level support, the translation of this vision of healthcare into changed workplace practice continues to elude. Over the past decade, evidence-based training interventions that seek to enhance the knowledge, attitudes, and skills of staff working in the mental health field have been implemented as a primary redress strategy. However, a large body of multi-disciplinary research indicates disappointing rates of training transfer. There is an absence of empirical research that investigates the importance of worker-motivation in the uptake of desired workplace change initiatives. 'Autonomy' is acknowledged as important to human effectiveness and as a correlate of workplace variables like productivity, and wellbeing. To our knowledge, there have been no studies that investigate purposeful and structured use of values-based interventions to facilitate increased autonomy as a means of promoting enhanced implementation of workplace change. This study involves 200 mental health workers across 22 worksites within five community-managed organisations in three Australian states. It involves cluster-randomisation of participants within organisation, by work site, to the experimental (values) condition, or the control (implementation). Both conditions receive two days of training focusing on an evidence-based framework of mental health service delivery. The experimental group receives a third day of values-focused intervention and 12 months of values-focused coaching. Well-validated self-report measures are used to explore variables related to values concordance, autonomy, and self-reported implementation success. Audits of work files and staff work samples

  19. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  20. Protocol for audit of current Filipino practice in rehabilitation of stroke inpatients.

    Science.gov (United States)

    Gonzalez-Suarez, Consuelo B; Dizon, Janine Margarita R; Grimmer, Karen; Estrada, Myrna S; Liao, Lauren Anne S; Malleta, Anne-Rochelle D; Tan, Ma Elena R; Marfil, Vero; Versales, Cristina S; Suarez, Jimah L; So, Kleon C; Uyehara, Edgardo D

    2015-01-01

    Stroke is one of the leading medical conditions in the Philippines. Over 500,000 Filipinos suffer from stroke annually. Provision of evidence-based medical and rehabilitation management for stroke patients has been a challenge due to existing environmental, social, and local health system issues. Thus, existing western guidelines on stroke rehabilitation were contextualized to draft recommendations relevant to the local Philippine setting. Prior to fully implementing the guidelines, an audit of current practice needs to be undertaken, thus the purpose of this audit protocol. A clinical audit of current practices in stroke rehabilitation in the Philippines will be undertaken. A consensus list of data items to be captured was identified by the audit team during a 2-day meeting in 2012. These items, including patient demographics, type of stroke, time to referral for rehabilitation management, length of hospital stay, and other relevant descriptors of stroke management were included as part of the audit. Hospitals in the Philippines will be recruited to take part in the audit activity. Recruitment will be via the registry of the Philippine Academy of Rehabilitation Medicine, where 90% of physiatrists (medical doctors specialized in rehabilitation medicine) are active members and are affiliated with various hospitals in the Philippines. Data collectors will be identified and trained in the audit process. A pilot audit will be conducted to test the feasibility of the audit protocol, and refinements to the protocol will be undertaken as necessary. The comprehensive audit process will take place for a period of 3 months. Data will be encoded using MS Excel(®). Data will be reported as means and percentages as appropriate. Subgroup analysis will be undertaken to look into differences and variability of stroke patient descriptors and rehabilitation activities. This audit study is an ambitious project, but given the "need" to conduct the audit to identify "gaps" in current

  1. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  2. A Generic Communication Protocol for Remote Laboratories: an Implementation on e-lab

    Energy Technology Data Exchange (ETDEWEB)

    Henriques, Rafael B.; Fernandes, H.; Duarte, Andre S.; Pereira, Tiago; Fortunato, Joao [Instituto de Plasmas e Fusao Nuclear, Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Pereira, Jose [Linkare TI - Tecnologias de Informacao Lda, Lisboa (Portugal); Dias, Francisco [Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal)

    2015-07-01

    The remote laboratories at IST (Instituto Superior Tecnico), e-lab, serve as a valuable tool for education and training based on remote control technologies. Due to the high number and increase of remotely operated experiments a generic protocol was developed to perform the communication between the software driver and the respective experimental setup in an easier and more unified way. The training in these fields of students and personnel can take advantage of such infrastructure with the purpose of deploying new experiments in a faster way. More than 10 experiments using the generic protocol are available on-line in a 24 x 7 way. (authors)

  3. The comparison of microdose flare-up and multiple dose antagonist protocols based on hCG day estradiol (E2), progesterone (P) and P/E2 ratio among poor responder patients in ICSI-ET cycles.

    Science.gov (United States)

    Cicek, M N; Kahyaoglu, I; Kahyaoglu, S

    2015-02-01

    Elevated progesterone levels surpassing exact treshold values impede endometrial receptivity and decrease clinical pregnancy rates in different responder patients during assisted reproductive techniques. A progesterone (P): estradiol (E2) ratio of > 1 on the day of hCG administration has also been suggested to be a manifestation of low ovarian reserve. The clinical significance of P/E2 ratio on the day of hCG administration was investigated among poor responder patients. Based on the ESHRE Bologna consensus criteria related to poor ovarian response diagnosis, 48 poor responder patients were treated with the microdose flare-up regimen and 34 patients were treated with the multiple-dose GnRH antagonist protocol. All patients were destined to perform a ICSI-ET procedure at the end of the stimulation protocols. Progesterone levels and P/E2 ratios have been detected during controlled ovarian hyperstimulation. In the microdose flare-up group; the duration of stimulation, total gonadotropin dose used and hCG day E2 levels were significantly higher than the multiple dose antagonist group. However, the mean hCG day P/E2 rate in the microdose flare-up group was less than that in the multiple-dose antagonist group. The clinical pregnancy rates were non significantly higher in the multiple dose antagonist protocol group than in microdose flare-up group. Impaired endometrial receptivity caused by elevated P levels results with lower pregnancy rates. Regardless of the selected stimulation protocol, poor responder patients are not prone to exhibit high P and E2 secretion. Increased P/E2 ratio of > 1 on hCG day has limited value to predict cycle outcomes in poor responder patients because of ovarian follicle depletion.

  4. Protocol for audit of current Filipino practice in rehabilitation of stroke inpatients

    Directory of Open Access Journals (Sweden)

    Gonzalez-Suarez CB

    2015-03-01

    Full Text Available Consuelo B Gonzalez-Suarez,1–3 Janine Margarita R Dizon,2,3 Karen Grimmer,3 Myrna S Estrada,4 Lauren Anne S Liao,1 Anne-Rochelle D Malleta,5 Ma Elena R Tan,6 Vero Marfil,6 Cristina S Versales,1 Jimah L Suarez,5 Kleon C So,1 Edgardo D Uyehara6 1University of Santo Tomas Hospital, University of Santo Tomas, 2University of Santo Tomas, Manila, Philippines; 3International Centre for Allied Health Evidence, University of South Australia, City East Campus, North Terrace, Adelaide, SA, Australia; 4De La Salle University Hospital, Cavite, Dasmariñas, 5Philippine Orthopedic Center, 6Veterans’ Memorial Medical Center, Quezon City, Philippines Background: Stroke is one of the leading medical conditions in the Philippines. Over 500,000 Filipinos suffer from stroke annually. Provision of evidence-based medical and rehabilitation management for stroke patients has been a challenge due to existing environmental, social, and local health system issues. Thus, existing western guidelines on stroke rehabilitation were contextualized to draft recommendations relevant to the local Philippine setting. Prior to fully implementing the guidelines, an audit of current practice needs to be undertaken, thus the purpose of this audit protocol.Methods: A clinical audit of current practices in stroke rehabilitation in the Philippines will be undertaken. A consensus list of data items to be captured was identified by the audit team during a 2-day meeting in 2012. These items, including patient demographics, type of stroke, time to referral for rehabilitation management, length of hospital stay, and other relevant descriptors of stroke management were included as part of the audit. Hospitals in the Philippines will be recruited to take part in the audit activity. Recruitment will be via the registry of the Philippine Academy of Rehabilitation Medicine, where 90% of physiatrists (medical doctors specialized in rehabilitation medicine are active members and are affiliated

  5. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  6. Integration of evidence-based practice in bedside teaching paediatrics supported by e-learning.

    Science.gov (United States)

    Potomkova, Jarmila; Mihal, Vladimir; Zapletalova, Jirina; Subova, Dana

    2010-03-01

    Bedside teaching with evidence-based practice elements, supported by e-learning activities, can play an important role in modern medical education. Teachers have to incorporate evidence from the medical literature to increase student motivation and interactivity. An integral part of the medical curricula at Palacky University Olomouc (Czech Republic) are real paediatric scenarios supplemented with a review of current literature to enhance evidence-based bedside teaching & learning. Searching for evidence is taught through librarian-guided interactive hands-on sessions and/or web-based tutorials followed by clinical case presentations and feedback. Innovated EBM paediatric clerkship demonstrated students' preferences towards web-based interactive bedside teaching & learning. In two academic years (2007/2008, 2008/2009), learning-focused feedback from 106 and 131 students, resp. was obtained about their attitudes towards evidence-based bedside teaching. The assessment included among others the overall level of instruction, quality of practical evidence-based training, teacher willingness and impact of instruction on increased interest in the specialty. There was some criticism about excessive workload. A parallel survey was carried out on the perceived values of different forms of information skills training (i.e. demonstration, online tutorials, and librarian-guided interactive search sessions) and post-training self-reported level of search skills. The new teaching/learning paediatric portfolio is a challenge for further activities, including effective knowledge translation, continuing medical & professional development of teachers, and didactic, clinically integrated teaching approaches.

  7. MO-A-218-01: CT Protocol Review - Practical Tips for Imaging Physicists.

    Science.gov (United States)

    Pizzutiello, R

    2012-06-01

    In the 1980's and 90's, when every mammography department had a wet film processor and a sundial to keep the schedule, medical physicists performing mammography surveys were primarily focused on measuring machine performance and image quality. As our professional experience matured, medical physicists began to learn that they were uniquely qualified to help to recommend technique factors that would balance dose and image quality. Technique charts using different kVp, target-filter combinations and AEC modes gradually became common and patients benefitted from our input. With the revolutionary change in CT Scanner technology and utilization, medical physicists have begun to contribute their expertise to developing and improving CT protocols. This presentation will present practical challenges and offer some directions for the practicing medical physicist who desires to participate in this critical and emerging aspect of imaging physics practice: CT Protocol Review. © 2012 American Association of Physicists in Medicine.

  8. Web-based audiovisual phonetic table program application as e-learning of pronunciation practice in undergraduate degree program

    Directory of Open Access Journals (Sweden)

    Retnomurti Ayu Bandu

    2018-01-01

    Full Text Available Verbal-based learning such as English pronunciation practice requires the existence of an effective e-learning because if it is directly given without any learning media, inaccuracies in pronunciation, spelling, repetition will usually occur in the spoken language. Therefore, this study aims to develop e-learning to be used in the Pronunciation Practice class, Indraprasta PGRI University. This research belongs to Research and Development are: requires an analysis, develops syllabus and teaching materials, creates and develops e-learning, tries and revises the media. Consequently, there is a need to develop module in the classroom into a versatile technology web-based module in the form of Phonetic Table Program. The result is carried out in pronunciation practice classes to find more details on some parts that may still not be detected by the researchers. Thus, the use of technology has become a necessity to assist students in achieving the learning objectives. Therefore, the process of communication in learning will attract more students’ interest and provide facilities to understand the sound system of English as it is equipped with buttons to practice presented by nonnative speakers. Non-native speakers’ selection are based on the consideration that they quickly adapt helping other students who are less fluent in English.

  9. E-dietician in general practice

    DEFF Research Database (Denmark)

    Brandt, Carl J.; Arendal, Cecilia; Glintborg, Dorte

    2010-01-01

    Obesity is according to WHO one of the greatest health challenges of our time. The aim of the pilot project was to investigate the weight loss efficacy and the cost of individual dietetic internet-based consultations in a Danish medical centre in combination with an internet community. A total...... of 46 obese patients in general practice were offered participation in a cohort study during May 15th to December 1st 2008. Patients from three different health centers were included. 32 patients gave informed consent to participate and were given access to weekly e-mail consultations with a dietician...... weight loss treatments in general practice. The utilization of e-mail consultations can furthermore result in a saving in expenses and premises if the e-mail correspondences are held outside of the health centre....

  10. Language pathway tracking: comparing nTMS-based DTI fiber tracking with a cubic ROIs-based protocol.

    Science.gov (United States)

    Negwer, Chiara; Sollmann, Nico; Ille, Sebastian; Hauck, Theresa; Maurer, Stefanie; Kirschke, Jan S; Ringel, Florian; Meyer, Bernhard; Krieg, Sandro M

    2017-03-01

    OBJECTIVE Diffusion tensor imaging (DTI) fiber tracking (FT) has been widely used in glioma surgery in recent years. It can provide helpful information about subcortical structures, especially in patients with eloquent space-occupying lesions. This study compared the newly developed navigated transcranial magnetic stimulation (nTMS)-based DTI FT of language pathways with the most reproducible protocol for language pathway tractography, using cubic regions of interest (ROIs) for the arcuate fascicle. METHODS Thirty-seven patients with left-sided perisylvian lesions underwent language mapping by repetitive nTMS. DTI FT was performed using the cubic ROIs-based protocol and the authors' nTMS-based DTI FT approach. The same minimal fiber length and fractional anisotropy were chosen (50 mm and 0.2, respectively). Both protocols were performed with standard clinical tractography software. RESULTS Both methods visualized language-related fiber tracts (i.e., corticonuclear tract, arcuate fascicle, uncinate fascicle, superior longitudinal fascicle, inferior longitudinal fascicle, arcuate fibers, commissural fibers, corticothalamic fibers, and frontooccipital fascicle) in all 37 patients. Using the cubic ROIs-based protocol, 39.9% of these language-related fiber tracts were detected in the examined patients, as opposed to 76.0% when performing nTMS-based DTI FT. For specifically tracking the arcuate fascicle, however, the cubic ROIs-based approach showed better results (97.3% vs 75.7% with nTMS-based DTI FT). CONCLUSIONS The cubic ROIs-based protocol was designed for arcuate fascicle tractography, and this study shows that it is still useful for this intention. However, superior results were obtained using the nTMS-based DTI FT for visualization of other language-related fiber tracts.

  11. A Machine-to-Machine protocol benchmark for eHealth applications - Use case: Respiratory rehabilitation.

    Science.gov (United States)

    Talaminos-Barroso, Alejandro; Estudillo-Valderrama, Miguel A; Roa, Laura M; Reina-Tosina, Javier; Ortega-Ruiz, Francisco

    2016-06-01

    M2M (Machine-to-Machine) communications represent one of the main pillars of the new paradigm of the Internet of Things (IoT), and is making possible new opportunities for the eHealth business. Nevertheless, the large number of M2M protocols currently available hinders the election of a suitable solution that satisfies the requirements that can demand eHealth applications. In the first place, to develop a tool that provides a benchmarking analysis in order to objectively select among the most relevant M2M protocols for eHealth solutions. In the second place, to validate the tool with a particular use case: the respiratory rehabilitation. A software tool, called Distributed Computing Framework (DFC), has been designed and developed to execute the benchmarking tests and facilitate the deployment in environments with a large number of machines, with independence of the protocol and performance metrics selected. DDS, MQTT, CoAP, JMS, AMQP and XMPP protocols were evaluated considering different specific performance metrics, including CPU usage, memory usage, bandwidth consumption, latency and jitter. The results obtained allowed to validate a case of use: respiratory rehabilitation of chronic obstructive pulmonary disease (COPD) patients in two scenarios with different types of requirement: Home-Based and Ambulatory. The results of the benchmark comparison can guide eHealth developers in the choice of M2M technologies. In this regard, the framework presented is a simple and powerful tool for the deployment of benchmark tests under specific environments and conditions. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  12. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  13. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  14. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  15. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  16. Recognising Workplace Learning: The Emerging Practices of e-RPL and e-PR

    Science.gov (United States)

    Cameron, Roslyn

    2012-01-01

    Purpose: The use of e-portfolios in recognition of prior learning (RPL) processes in workplace and professional practice contexts has attracted little attention in the literature due to its emergent nature. This study seeks to explore the growing incidence of e-portfolio-based RPL (e-RPL) and professional recognition (e-PR) processes in Australia…

  17. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  18. Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations

    Energy Technology Data Exchange (ETDEWEB)

    Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

    1996-12-31

    In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

  19. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  20. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  1. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  2. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  3. Where Words Fail, Music Speaks: A Mixed Method Study of an Evidence-Based Music Protocol.

    Science.gov (United States)

    Daniels, Ruby A; Torres, David; Reeser, Cathy

    2016-01-01

    Despite numerous studies documenting the benefits of music, hospice social workers are often unfamiliar with evidence-based music practices that may improve end of life care. This mixed method study tested an intervention to teach hospice social workers and chaplains (N = 10) an evidence-based music protocol. Participants used the evidence-based practice (EBP) for 30 days, recording 226 journal entries that described observations of 84 patients and their families. There was a significant increase in EBP knowledge (35%). Prompting behavioral and emotional responses, music was described frequently as a catalyst that facilitated deeper dialogue between patients, families, social workers, and chaplains.

  4. Just-in-Time Evidence-Based E-mail “Reminders” in Home Health Care: Impact on Nurse Practices

    Science.gov (United States)

    Murtaugh, Christopher M; Pezzin, Liliana E; McDonald, Margaret V; Feldman, Penny H; Peng, Timothy R

    2005-01-01

    Objective To test the effectiveness of two interventions designed to improve the adoption of evidence-based practices by home health nurses caring for heart failure (HF) patients. Data Sources/Study Setting Information on nurse practices was abstracted from the clinical records of patients admitted between June 2000 and November 2001 to the care of 354 study nurses at a large, urban, nonprofit home care agency. Study Design The study employed a randomized design with nurses assigned to usual care or one of two intervention groups upon identification of an eligible patient. The basic intervention was a one-time e-mail reminder highlighting six HF-specific clinical recommendations. The augmented intervention consisted of the initial e-mail reminder supplemented by provider prompts, patient education material, and clinical nurse specialist outreach. Data Collection At each home health visit provided by a study nurse to an eligible HF patient during the 45-day follow-up period, a structured chart abstraction tool was used to collect information on whether the nurse provided the care practices highlighted in the e-mail reminder. Principal Findings Both the basic and the augmented interventions greatly increased the practice of evidence-based care, according to patient records, in the areas of patient assessment and instructions about HF disease management. While not all results were statistically significant at conventional levels, intervention effects were positive in virtually all cases and effect magnitudes frequently were large. Conclusions The results of this randomized trial strongly support the efficacy of just-in-time evidence-based reminders as a means of changing clinical practice among home health nurses who are geographically dispersed and spend much of their time in the field. PMID:15960694

  5. Research of Video Steganalysis Algorithm Based on H265 Protocol

    Directory of Open Access Journals (Sweden)

    Wu Kaicheng

    2015-01-01

    This paper researches LSB matching VSA based on H265 protocol with the research background of 26 original Video sequences, it firstly extracts classification features out from training samples as input of SVM, and trains in SVM to obtain high-quality category classification model, and then tests whether there is suspicious information in the video sample. The experimental results show that VSA algorithm based on LSB matching can be more practical to obtain all frame embedded secret information and carrier and video of local frame embedded. In addition, VSA adopts the method of frame by frame with a strong robustness in resisting attack in the corresponding time domain.

  6. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  7. Home-based bimanual training based on motor learning principles in children with unilateral cerebral palsy and their parents (the COAD-study): rationale and protocols.

    Science.gov (United States)

    Schnackers, Marlous; Beckers, Laura; Janssen-Potten, Yvonne; Aarts, Pauline; Rameckers, Eugène; van der Burg, Jan; de Groot, Imelda; Smeets, Rob; Geurts, Sander; Steenbergen, Bert

    2018-04-18

    Home-based training is considered an important intervention in rehabilitation of children with unilateral cerebral palsy. Despite consensus on the value of home-based upper limb training, no evidence-based best practice exists. Promoting compliance of children to adhere to an intensive program while keeping parental stress levels low is an important challenge when designing home-based training programs. Incorporating implicit motor learning principles emerges to be a promising method to resolve this challenge. Here we describe two protocols for home-based bimanual training programs, one based on implicit motor learning principles and one based on explicit motor learning principles, for children with unilateral spastic cerebral palsy aged 2 through 7 years. Children receive goal-oriented, task-specific bimanual training in their home environment from their parents for 3.5 h/week for 12 weeks according to an individualized program. Parents will be intensively coached by a multidisciplinary team, consisting of a pediatric therapist and remedial educationalist. Both programs consist of a preparation phase (goal setting, introductory meetings with coaching professionals, design of individualized program, instruction of parents, home visit) and home-based training phase (training, video-recordings, registrations, and telecoaching and home visits by the coaching team). The programs contrast with respect to the teaching strategy, i.e. how the parents support their child during training. In both programs parents provide their child with instructions and feedback that focus on the activity (i.e. task-oriented) or the result of the activity (i.e. result-oriented). However, in the explicit program parents are in addition instructed to give exact instructions and feedback on the motor performance of the bimanual activities, whereas in the implicit program the use of both hands and the appropriate motor performance of the activity are elicited via manipulation of the

  8. The Classroom Observation Protocol for Undergraduate STEM (COPUS): A New Instrument to Characterize University STEM Classroom Practices

    OpenAIRE

    Smith, Michelle K.; Jones, Francis H. M.; Gilbert, Sarah L.; Wieman, Carl E.

    2013-01-01

    Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or C...

  9. An evidence based protocol for peer review of radiographer musculoskeletal plain film reporting

    International Nuclear Information System (INIS)

    Stephenson, Paul; Hannah, April; Jones, Helen; Edwards, Rosemary; Harrington, Kate; Baker, Sally-Anne; Fitzgerald, Nicole; Belfield, Jane

    2012-01-01

    Aims: Medical image interpretation by non-medically trained staff continues to court controversy. This article aims to show that any potential risks associated with radiographer reporting can be monitored and mitigated if a robust peer review system is introduced. A search of the evidence base illustrates a paucity of guidance on how reporting radiographers should be audited or how a peer review process should be implemented. A practical framework for designing a reporting radiographer peer review process is provided. Methods: Following a literature review, key issues faced when designing a peer review protocol were identified. The following questions are answered: How frequent should peer review take place? How many reports should be reviewed? How are reports selected for review? Who should peer review the radiographer reports? How should radiographer's reporting performance be measured? What standard of reporting is acceptable? Results: Details are provided of the process that has been used for over three years at a busy inner-city teaching hospital for auditing musculoskeletal plain film radiographer reporting. The peer review method presented is not intended to produce robust statistical data; it is a practical method of locally assessing the reporting competency. As such, our protocol should be viewed as part of a larger programme for continuing professional development. Conclusion: It is hoped that this practical protocol will encourage radiology departments to engage in a programme of peer review for reporting radiographers.

  10. Developing the skills required for evidence-based practice.

    Science.gov (United States)

    French, B

    1998-01-01

    The current health care environment requires practitioners with the skills to find and apply the best currently available evidence for effective health care, to contribute to the development of evidence-based practice protocols, and to evaluate the impact of utilizing validated research findings in practice. Current approaches to teaching research are based mainly on gaining skills by participation in the research process. Emphasis on the requirement for rigour in the process of creating new knowledge is assumed to lead to skill in the process of using research information created by others. This article reflects upon the requirements for evidence-based practice, and the degree to which current approaches to teaching research prepare practitioners who are able to find, evaluate and best use currently available research information. The potential for using the principles of systematic review as a teaching and learning strategy for research is explored, and some of the possible strengths and weakness of this approach are highlighted.

  11. Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce

    Directory of Open Access Journals (Sweden)

    Ren-Junn Hwang

    2015-04-01

    Full Text Available Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin of the document or the identities of transaction participants. Security and performance analyses indicate that the proposed protocol not only provides strong fairness, non-repudiation of origin, non-repudiation of receipt, and message confidentiality, but also enhances forward secrecy, transaction privacy, and authorized exchange. The proposed protocol is more efficient than other works.

  12. e-Learning competency for practice nurses: an evaluation report.

    Science.gov (United States)

    Heartfield, Marie; Morello, Andrea; Harris, Melanie; Lawn, Sharon; Pols, Vincenza; Stapleton, Carolyn; Battersby, Malcolm

    2013-01-01

    Practice nurses in Australia are now funded to facilitate chronic condition management, including self-management support. Chronic disease management requires an established rapport, support and proactivity between general practitioners, patients and the practice nurses. To achieve this, training in shared decision making is needed. e-Learning supports delivery and achievement of such policy outcomes, service improvements and skill development. However, e-learning effectiveness for health care professionals' is determined by several organisational, economic, pedagogical and individual factors, with positive e-learning experience linked closely to various supports. This paper reinforces previous studies showing nurses' expanding role across general practice teams and reports on some of the challenges of e-learning. Merely providing practice nurses with necessary information via web-based learning systems does not ensure successful learning or progress toward improving health outcomes for patients.

  13. The Utility of Home-Practice in Mindfulness-Based Group Interventions: A Systematic Review.

    Science.gov (United States)

    Lloyd, Annette; White, Ross; Eames, Catrin; Crane, Rebecca

    2018-01-01

    A growing body of research supports the efficacy of mindfulness-based interventions (MBIs). MBIs consider home-practice as essential to increasing the therapeutic effects of the treatment. To date however, the synthesis of the research conducted on the role of home-practice in controlled MBI studies has been a neglected area. This review aimed to conduct a narrative synthesis of published controlled studies, evaluating mindfulness-based group interventions, which have specifically measured home-practice. Empirical research literature published until June 2016 was searched using five databases. The search strategy focused on mindfulness-based stress reduction (MBSR), mindfulness-based cognitive therapy (MBCT), and home-practice. Included studies met the following criteria: controlled trials, participants 18 years and above, evaluations of MBSR or MBCT, utilised standardised quantitative outcome measures and monitored home-practice using a self-reported measure. Fourteen studies met the criteria and were included in the review. Across all studies, there was heterogeneity in the guidance and resources provided to participants and the approaches used for monitoring home-practice. In addition, the guidance on the length of home-practice was variable across studies, which indicates that research studies and teachers are not adhering to the published protocols. Finally, only seven studies examined the relationship between home-practice and clinical outcomes, of which four found that home-practice predicted improvements on clinical outcome measures. Future research should adopt a standardised approach for monitoring home-practice across MBIs. Additionally, studies should assess whether the amount of home-practice recommended to participants is in line with MBSR/MBCT manualised protocols. Finally, research should utilise experimental methodologies to explicitly explore the relationship between home-practice and clinical outcomes.

  14. Maintenance of Certification Part 4 Credit and recruitment for practice-based research.

    Science.gov (United States)

    Gorzkowski, Julie A; Klein, Jonathan D; Harris, Donna L; Kaseeska, Kristen R; Whitmore Shaefer, Regina M; Bocian, Alison B; Davis, James B; Gotlieb, Edward M; Wasserman, Richard C

    2014-10-01

    Competing priorities in pediatric practice have created challenges for practice-based research. To increase recruitment success, researchers must design studies that provide added value to participants. This study evaluates recruitment of pediatricians into a study, before and after the development and addition of a quality improvement (QI) curriculum approved for American Board of Pediatrics Maintenance of Certification (MOC) Part 4 Credit as an enrollment incentive. Researchers implemented multiple outreach methods to enroll pediatric practices over 28 months. Field note review revealed that many physicians declined enrollment, stating that they prioritized MOC Part 4 projects over research studies. A QI curriculum meeting standards for MOC Part 4 Credit was developed and added to the study protocol as an enrollment incentive. Enrollment rates and characteristics of practitioners enrolled pre- and post-MOC were compared. Pre-MOC enrollment contributed 48% of practices in 22 months; post-MOC enrollment contributed 49% of practices in 6 months. An average of 3.5 practices enrolled per month pre-MOC, compared with 13.1 per month post-MOC (P recruitment success and increased enrollment of pediatricians working in underserved areas. Including QI initiatives meeting MOC Part 4 criteria in practice-based research protocols may enhance participation and aid in recruiting diverse practice and patient populations. Copyright © 2014 by the American Academy of Pediatrics.

  15. eNAL: An Extension of the NAL Setup Correction Protocol for Effective Use of Weekly Follow-up Measurements

    International Nuclear Information System (INIS)

    Boer, Hans C.J. de; Heijmen, Ben J.M.

    2007-01-01

    Purpose: The no action level (NAL) protocol reduces systematic displacements relative to the planning CT scan by using the mean displacement of the first few treatment fractions as a setup correction in all subsequent fractions. This approach may become nonoptimal in case of time trends or transitions in the systematic displacement of a patient. Here, the extended NAL (eNAL) protocol is introduced to cope with this problem. Methods and Materials: The initial setup correction of eNAL is the same as in NAL. However, in eNAL, additional weekly follow-up measurements are performed. The setup correction is updated after each follow-up measurement based on linear regression of the available measured displacements to track and correct systematic time-dependent changes. We investigated the performance of eNAL with Monte Carlo simulations for populations without systematic displacement changes over time, with large gradual changes (time trends), and with large sudden changes (transitions). Weekly follow-up measurements were simulated for 35 treatment fractions. We compared the outcome of eNAL with NAL and optimized shrinking action level (SAL) protocol with weekly measurements. Results: Without time-dependent changes, eNAL, SAL, and NAL performed comparably, but SAL required the largest imaging workload. For time trends and transitions, eNAL performed superiorly to the other protocols and reduced systematic displacements to the same magnitude as in case of no time-dependent changes (SD ∼1 mm). Conclusion: Extended NAL can reduce systematic displacements to a minor level irrespective of the precise nature of the systematic time-dependent changes that may occur in a population

  16. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, M. G.; Kabir, M. Hasnat; Rahim, M. Sajjadur; Ullah, Sk. Enayet

    2012-01-01

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol ...

  17. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    International Nuclear Information System (INIS)

    Xiao, Y.

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  18. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Y. [Thomas Jefferson University, Philadelphia, PA (United States)

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  19. The Operation of the Joint Protocol: Theoretical and Practical Implications Revisited

    International Nuclear Information System (INIS)

    Horbach, N.

    2008-01-01

    Convention and the 1963 Vienna Convention), is even more urgent in respect of its operation under the revised nuclear liability treaties. Any interpretation making the operation of the Joint Protocol ineffective, distorted or even obsolete as to its main object and purpose, would warrant critical analysis as to its benefits it in practice would provide for its Contracting Parties, considering to join any of the revised treaties. This paper aims to provide an analysis of the legal complications involved in respect of the operation of the Joint Protocol, especially in its interrelation with the revised nuclear liability treaties.(author)

  20. A Standardized Shift Handover Protocol: Improving Nurses’ Safe Practice in Intensive Care Units

    Directory of Open Access Journals (Sweden)

    Javad Malekzadeh

    2013-08-01

    Full Text Available Introduction: For maintaining the continuity of care and improving the quality of care, effective inter-shift information communication is necessary. Any handover error can endanger patient safety. Despite the importance of shift handover, there is no standard handover protocol in our healthcare settings. Methods In this one-group pretest-posttest quasi-experimental study conducted in spring and summer of 2011, we recruited a convenience sample of 56 ICU nurses. The Nurses’ Safe Practice Evaluation Checklist was used for data collection. The Content Validity Index and the inter-rater correlation coefficient of the checklist was 0.92 and 89, respectively. We employed the SPSS 11.5 software and the Mc Nemar and paired-samples t test for data analysis. Results: Study findings revealed that nurses’ mean score on the Safe Practice Evaluation Checklist increased significantly from 11.6 (2.7 to 17.0 (1.8 (P < 0.001. Conclusion: using a standard handover protocol for communicating patient’s needs and information improves nurses’ safe practice in the area of basic nursing care.

  1. Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce

    OpenAIRE

    Ren-Junn Hwang; Chih-Hua Lai

    2015-01-01

    Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin o...

  2. Evaluating Evidence-Based Practice Knowledge and Beliefs Through the e-Learning EBP Academy.

    Science.gov (United States)

    Green, Angela; Jeffs, Debra A; Boateng, Beatrice A; Lowe, Gary R; Walden, Marlene

    2017-07-01

    This research examined evidence-based practice (EBP) knowledge and beliefs before and after a 3-month e-learning program was implemented to build EBP capacity at a large children's hospital. Ten clinicians completed the development, implementation, and evaluation of the e-learning education, comprising phase one. Revision and participation by 41 clinicians followed in phase two. Participants in both phases completed the EBP Beliefs and Implementation Scales preintervention, postintervention, and 6 months after postintervention. EBP beliefs and implementation increased immediately and 6 months after postintervention, with statistically significant increases in both phases. Participants in both phases applied knowledge by completing mentor-supported EBP projects. Although EBP beliefs and implementation scores increased and e-learning provided flexibility for clinician participation, challenges arose, resulting in lower-than-expected completion. Subsequent revisions resulted in hybrid education, integrating classroom and e-learning with project mentoring. This funded e-learning research contributes knowledge to the growing specialty of professional development. J Contin Educ Nurs. 2017;48(7):304-311. Copyright 2017, SLACK Incorporated.

  3. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  4. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  5. E-mentoring in public health nursing practice.

    Science.gov (United States)

    Miller, Louise C; Devaney, Susan W; Kelly, Glenda L; Kuehn, Alice F

    2008-09-01

    Attrition in the public health nursing work force combined with a lack of faculty to teach public health prompted development of a "long-distance" learning project. Practicing associate degree nurses enrolled in an online course in population-based practice worked with experienced public health nurse "e-mentors." Student-mentor pairs worked through course assignments, shared public health nursing experiences, and problem-solved real-time public health issues. Nursing faculty served as coordinators for student learning and mentor support. Over 3 years, 38 student-mentor pairs participated in the project. Students reported they valued the expertise and guidance of their mentors. Likewise, mentors gained confidence in their practice and abilities to mentor. Issues related to distance learning and e-mentoring centered around use of technology and adequate time to communicate with one another. E-mentoring is a viable strategy to connect nurses to a learning, sharing environment while crossing the barriers of distance, agency isolation, and busy schedules.

  6. Double-loop Learning: A Coaching Protocol for Enhancing Principal Instructional Leadership

    Directory of Open Access Journals (Sweden)

    Gary W. Houchens

    2012-10-01

    Full Text Available Executive coaching has become increasingly commonplace in both the corporate and non-profit sectors as a means of improving professional effectiveness but there is a dearth of empirically-based protocols geared specifically toward the growth needs of school principals. This qualitative case study explores the implementation of a principal coaching protocol using a theories of practice framework based on concepts originally articulated by Argyris and Schön (1974 and further explicated by the authors in previous publications. This study examined the extent to which a coaching protocol based on theories of practice enhanced principals’ self-perceived capacity for reflection and effective instructional leadership. Findings suggest that principals valued the structure, feedback, and reflective dimensions of the protocol and found their confidence level about an important instructional leadership problem – how to support and assist struggling teachers improve their teaching practice – was greatly enhanced. Implications for further iterations of the coaching protocol, as well as future directions of research on principal professional growth, are discussed.

  7. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  8. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol.

    Science.gov (United States)

    Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-06-27

    Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.

  9. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    Science.gov (United States)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  10. Neuroimaging in dementia and Alzheimer's disease: Current protocols and practice in the Republic of Ireland

    International Nuclear Information System (INIS)

    Kelly, I.; Butler, M.-L.; Ciblis, A.; McNulty, J.P.

    2016-01-01

    Introduction: Neuroimaging plays an essential supportive role in the diagnosis of dementia, assisting in establishing the dementia subtype(s). This has significant value in both treatment and care decisions and has important implications for prognosis. This study aims to explore the development and nature of neuroimaging protocols currently used in the assessment of dementia and Alzheimer's disease (AD). Methods: An online questionnaire was designed and distributed to lead radiography personnel working in computed tomography (CT), magnetic resonance imaging (MRI) and positron emission tomography (PET) departments (n = 94) in both hospital-based and out-patient imaging centres in the Republic of Ireland. Results: Response rates for each modality ranged from 42 to 44%. CT, MRI, and PET were used to specifically diagnose dementia or AD by 43%, 40% and 50% of responding centres respectively. Of these, dementia-specific neuroimaging protocols were utilised in 33%, 50% and 100% of CT, MRI and PET centres respectively, with the remainder using either standard or other non-specific protocols. Both radiologists and clinical specialist radiographers participated in the development of the majority of protocols. The Royal College of Radiologists (RCR) guidelines were most commonly referenced as informing protocol development, however, none of the MRI respondents were able to identify any guidelines used to inform MR protocol development. Conclusion: Currently there is no consensus in Ireland on optimal dementia/AD neuroimaging protocols, particularly for PET and MRI. Similarly the use of validated and published guidelines to inform protocols is not universal. - Highlights: • We examined the nature of neuroimaging protocols for dementia and Alzheimer's disease in Ireland. • Dementia or Alzheimer's disease-specific protocols were used by between 33 and 100% of centres depending on modality. • Stated dementia-specific protocols were identical for CT whereas

  11. A practice-based trial of blood pressure control in African Americans (TLC-Clinic: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Schoenthaler Antoinette

    2011-12-01

    Full Text Available Abstract Background Poorly controlled hypertension (HTN remains one of the most significant public health problems in the United States, in terms of morbidity, mortality, and economic burden. Despite compelling evidence supporting the beneficial effects of therapeutic lifestyle changes (TLC for blood pressure (BP reduction, the effectiveness of these approaches in primary care practices remains untested, especially among African Americans, who share a disproportionately greater burden of HTN-related outcomes. Methods/Design This randomized controlled trial tests the effectiveness of a practice-based comprehensive therapeutic lifestyle intervention, delivered through group-based counseling and motivational interviewing (MINT-TLC versus Usual Care (UC in 200 low-income, African Americans with uncontrolled hypertension. MINT-TLC is designed to help patients make appropriate lifestyle changes and develop skills to maintain these changes long-term. Patients in the MINT-TLC group attend 10 weekly group classes focused on healthy lifestyle changes (intensive phase; followed by 3 monthly individual motivational interviewing (MINT sessions (maintenance phase. The intervention is delivered by trained research personnel with appropriate treatment fidelity procedures. Patients in the UC condition receive a single individual counseling session on healthy lifestyle changes and print versions of the intervention materials. The primary outcome is within-patient change in both systolic and diastolic BP from baseline to 6 months. In addition to BP control at 6 months, other secondary outcomes include changes in the following lifestyle behaviors from baseline to 6 months: a physical activity, b weight loss, c number of daily servings of fruits and vegetables and d 24-hour urinary sodium excretion. Discussion This vanguard trial will provide information on how to refine MINT-TLC and integrate it into a standard treatment protocol for hypertensive African Americans

  12. Advanced flooding-based routing protocols for underwater sensor networks

    OpenAIRE

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a flooding-based protocol with the goal to improve the performance and the energy efficiency. The first idea considers the node position information in order to reduce the number of relays that may apply flood...

  13. Effect of various practical warm-up protocols on acute lower-body power.

    Science.gov (United States)

    Buttifant, David; Hrysomallis, Con

    2015-03-01

    The purpose of this study was to compare the acute effect of box squats with barbell (BBSquat), box squats with elastic resistance bands (BandSquat), and static stretches (SStretch) on external power during a 20-kg weighted jump squat. Twelve male athletes performed each of the 3 warm-up protocols on separate occasions in a randomized order. Weighted jump squat power was assessed using a linear position transducer attached to the bar of a Smith machine. Jump power was measured pre-warm-up and 5 and 10 minutes post-warm-up protocol. The BBSquat protocol involved 3 sets of 3RM, BandSquat involved 3 sets of 3 repetitions using highest resistance elastic bands, and the SStretch protocol comprises two 30-second stretches for muscles of the lower limbs. Jump power significantly increased from pre-warm-up to 5 and 10 minutes post-warm-up for both the BandSquat and BBSquat protocols. There was no statistical difference in power values between BandSquat and BBSquat. Power output significantly decreased from pre-warm-up to 5 and 10 minutes post-warm-up for the SStretch protocol. The BandSquat was just as effective as BBSquat in augmenting acute jump power. The SStretch was detrimental to jump performance. A practical warm-up using relatively inexpensive and portable equipment such as elastic resistance bands was just as effective as a warm-up protocol that requires more substantial and less transportable equipment such as a squat rack and associated free weights. The BandSquat warm-up may be considered more accessible for athletes at various competition levels.

  14. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  15. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  16. Systematic implementation of evidence-based practice in a clinical nursing setting: a participatory action research project.

    Science.gov (United States)

    Friesen-Storms, Jolanda H H M; Moser, Albine; van der Loo, Sandra; Beurskens, Anna J H M; Bours, Gerrie J J W

    2015-01-01

    To describe the process of implementing evidence-based practice in a clinical nursing setting. Evidence-based practice has become a major issue in nursing, it is insufficiently integrated into daily practice and its implementation is complex. Participatory action research. The main participants were nurses working in a lung unit of a rural hospital. A multi-method process of data collection was used during the observing, reflecting, planning and acting phases. Data were continuously gathered during a 24-month period from 2010 to 2012, and analysed using an interpretive constant comparative approach. Patients were consulted to incorporate their perspective. A best-practice mode of working was prevalent on the ward. The main barriers to the implementation of evidence-based practice were that nurses had little knowledge of evidence-based practice and a rather negative attitude towards it, and that their English reading proficiency was poor. The main facilitators were that nurses wanted to deliver high-quality care and were enthusiastic and open to innovation. Implementation strategies included a tailored interactive outreach training and the development and implementation of an evidence-based discharge protocol. The academic model of evidence-based practice was adapted. Nurses worked according to the evidence-based practice discharge protocol but barely recorded their activities. Nurses favourably evaluated the participatory action research process. Action research provides an opportunity to empower nurses and to tailor evidence-based practice to the practice context. Applying and implementing evidence-based practice is difficult for front-line nurses with limited evidence-based practice competencies. Adaptation of the academic model of evidence-based practice to a more pragmatic approach seems necessary to introduce evidence-based practice into clinical practice. The use of scientific evidence can be facilitated by using pre-appraised evidence. For clinical practice

  17. A standard protocol for describing individual-based and agent-based models

    Science.gov (United States)

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  18. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  19. Standard Operational Protocols in professional nursing practice: use, weaknesses and potentialities.

    Science.gov (United States)

    Sales, Camila Balsero; Bernardes, Andrea; Gabriel, Carmen Silvia; Brito, Maria de Fátima Paiva; Moura, André Almeida de; Zanetti, Ariane Cristina Barboza

    2018-01-01

    to evaluate the use of Standard Operational Protocols (SOPs) in the professional practice of the nursing team based on the theoretical framework of Donabedian, as well as to identify the weaknesses and potentialities from its implementation. Evaluative research, with quantitative approach performed with nursing professionals working in the Health Units of a city of São Paulo, composed of two stages: document analysis and subsequent application of a questionnaire to nursing professionals. A total of 247 nursing professionals participated and reported changes in the way the interventions were performed. The main weaknesses were the small number of professionals, inadequate physical structure and lack of materials. Among the potentialities were: the standardization of materials and concern of the manager and professional related to patient safety. The reassessment of SOPs is necessary, as well as the adoption of a strategy of permanent education of professionals aiming at improving the quality of care provided.

  20. Systems consultation: protocol for a novel implementation strategy designed to promote evidence-based practice in primary care

    OpenAIRE

    Quanbeck, Andrew; Brown, Randall T; E Zgierska, Aleksandra; A Johnson, Roberta; Robinson, James M; Jacobson, Nora

    2016-01-01

    Background Adoption of evidence-based practices takes place at a glacial place in healthcare. This research will pilot test an innovative implementation strategy ? systems consultation ?intended to speed the adoption of evidence-based practice in primary care. The strategy is based on tenets of systems engineering and has been extensively tested in addiction treatment. Three innovations have been included in the strategy ? translation of a clinical practice guideline into a checklist-based im...

  1. Practical reconstruction protocol for quantitative 90Y bremsstrahlung SPECT/CT

    International Nuclear Information System (INIS)

    Siman, W.; Mikell, J. K.; Kappadath, S. C.

    2016-01-01

    Purpose: To develop a practical background compensation (BC) technique to improve quantitative 90 Y-bremsstrahlung single-photon emission computed tomography (SPECT)/computed tomography (CT) using a commercially available imaging system. Methods: All images were acquired using medium-energy collimation in six energy windows (EWs), ranging from 70 to 410 keV. The EWs were determined based on the signal-to-background ratio in planar images of an acrylic phantom of different thicknesses (2–16 cm) positioned below a 90 Y source and set at different distances (15–35 cm) from a gamma camera. The authors adapted the widely used EW-based scatter-correction technique by modeling the BC as scaled images. The BC EW was determined empirically in SPECT/CT studies using an IEC phantom based on the sphere activity recovery and residual activity in the cold lung insert. The scaling factor was calculated from 20 clinical planar 90 Y images. Reconstruction parameters were optimized in the same SPECT images for improved image quantification and contrast. A count-to-activity calibration factor was calculated from 30 clinical 90 Y images. Results: The authors found that the most appropriate imaging EW range was 90–125 keV. BC was modeled as 0.53× images in the EW of 310–410 keV. The background-compensated clinical images had higher image contrast than uncompensated images. The maximum deviation of their SPECT calibration in clinical studies was lowest (<10%) for SPECT with attenuation correction (AC) and SPECT with AC + BC. Using the proposed SPECT-with-AC + BC reconstruction protocol, the authors found that the recovery coefficient of a 37-mm sphere (in a 10-mm volume of interest) increased from 39% to 90% and that the residual activity in the lung insert decreased from 44% to 14% over that of SPECT images with AC alone. Conclusions: The proposed EW-based BC model was developed for 90 Y bremsstrahlung imaging. SPECT with AC + BC gave improved lesion detectability and activity

  2.  e-Learning in Virtual Communities of Practice - And Beyond?

    DEFF Research Database (Denmark)

    Petersen, Karen Bjerg

    2007-01-01

    The work of Lave and Wenger on learning in 'communities of practice' has evoked a considerable response in e-learning environments through-out the world including Denmark in the last few decades. Within the development of web-based second language learning, the ideas of learning in communities...... interaction and case studies of e-learning language platforms within the area of teaching Danish as a second language for adult foreigners. The concepts of communities of practice are also discussed and developed....... individual process. The aim of this paper is to investigate aspects of the Danish development of e-learning platforms and, especially students' and teachers' very differing perceptions of e-learning and the concepts behind it. The analysis is based on student and teacher interviews, research on language...

  3. Practice-based Research Network Research Good Practices (PRGPs): Summary of Recommendations.

    Science.gov (United States)

    Dolor, Rowena J; Campbell-Voytal, Kimberly; Daly, Jeanette; Nagykaldi, Zsolt J; O'Beirne, Maeve; Sterling, Pamela; Fagnan, Lyle J; Levy, Barcey; Michaels, LeAnn; Louks, Hannah A; Smith, Paul; Aspy, Cheryl B; Patterson, V Beth; Kano, Miria; Sussman, Andrew L; Williams, Robert; Neale, Anne Victoria

    2015-12-01

    Practice-based research networks (PBRNs) conduct research in community settings, which poses quality control challenges to the integrity of research, such as study implementation and data collection. A foundation for improving research processes within PBRNs is needed to ensure research integrity. Network directors and coordinators from seven U.S.-based PBRNs worked with a professional team facilitator during semiannual in-person meetings and monthly conference calls to produce content for a compendium of recommended research practices specific to the context of PBRNs. Participants were assigned to contribute content congruent with their expertise. Feedback on the draft document was obtained from attendees at the preconference workshop at the annual PBRN meeting in 2013. A revised document was circulated to additional PBRN peers prior to finalization. The PBRN Research Good Practices (PRGPs) document is organized into four chapters: (1) Building PBRN Infrastructure; (2) Study Development and Implementation; (3) Data Management, and (4) Dissemination Policies. Each chapter contains an introduction, detailed procedures for each section, and example resources with information links. The PRGPs is a PBRN-specific resource to facilitate PBRN management and staff training, to promote adherence to study protocols, and to increase validity and generalizability of study findings. © 2015 Wiley Periodicals, Inc.

  4. Effectiveness of a virtual intervention for primary healthcare professionals aimed at improving attitudes towards the empowerment of patients with chronic diseases: study protocol for a cluster randomized controlled trial (e-MPODERA project).

    Science.gov (United States)

    González-González, Ana Isabel; Orrego, Carola; Perestelo-Perez, Lilisbeth; Bermejo-Caja, Carlos Jesús; Mora, Nuria; Koatz, Débora; Ballester, Marta; Del Pino, Tasmania; Pérez-Ramos, Jeannet; Toledo-Chavarri, Ana; Robles, Noemí; Pérez-Rivas, Francisco Javier; Ramírez-Puerta, Ana Belén; Canellas-Criado, Yolanda; Del Rey-Granado, Yolanda; Muñoz-Balsa, Marcos José; Becerril-Rojas, Beatriz; Rodríguez-Morales, David; Sánchez-Perruca, Luis; Vázquez, José Ramón; Aguirre, Armando

    2017-10-30

    Communities of practice are based on the idea that learning involves a group of people exchanging experiences and knowledge. The e-MPODERA project aims to assess the effectiveness of a virtual community of practice aimed at improving primary healthcare professional attitudes to the empowerment of patients with chronic diseases. This paper describes the protocol for a cluster randomized controlled trial. We will randomly assign 18 primary-care practices per participating region of Spain (Catalonia, Madrid and Canary Islands) to a virtual community of practice or to usual training. The primary-care practice will be the randomization unit and the primary healthcare professional will be the unit of analysis. We will need a sample of 270 primary healthcare professionals (general practitioners and nurses) and 1382 patients. We will perform randomization after professionals and patients are selected. We will ask the intervention group to participate for 12 months in a virtual community of practice based on a web 2.0 platform. We will measure the primary outcome using the Patient-Provider Orientation Scale questionnaire administered at baseline and after 12 months. Secondary outcomes will be the sociodemographic characteristics of health professionals, sociodemographic and clinical characteristics of patients, the Patient Activation Measure questionnaire for patient activation and outcomes regarding use of the virtual community of practice. We will calculate a linear mixed-effects regression to estimate the effect of participating in the virtual community of practice. This cluster randomized controlled trial will show whether a virtual intervention for primary healthcare professionals improves attitudes to the empowerment of patients with chronic diseases. ClicalTrials.gov, NCT02757781 . Registered on 25 April 2016. Protocol Version. PI15.01 22 January 2016.

  5. Portable abdomen radiography. Moving to thickness-based protocols

    International Nuclear Information System (INIS)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A.

    2018-01-01

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  6. Portable abdomen radiography. Moving to thickness-based protocols

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A. [University of Chicago Medical Center, Department of Radiology, Chicago, IL (United States)

    2018-02-15

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  7. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  8. A VXI-GPIB protocol converter based on DSP

    International Nuclear Information System (INIS)

    Hu Yuanfeng; Yu Xiaoqi; Lu Jingping

    2006-01-01

    A VXI-GPIB protocol converter based on DSP is introduced. The word-serial protocol with the message-based interface is implemented by EPLD and DSP. The GPIB functions are implemented by programming to the GPIB control chip. The transfer from VXI messages to GPIB functions is implemented by DSP. As an example of application, the control functions for oscilloscopes have been implemented in a VXI-GPIB heterogeneous system using such modules. (authors)

  9. Evidence-based care of older people with suspected cognitive impairment in general practice: protocol for the IRIS cluster randomised trial.

    Science.gov (United States)

    McKenzie, Joanne E; French, Simon D; O'Connor, Denise A; Mortimer, Duncan S; Browning, Colette J; Russell, Grant M; Grimshaw, Jeremy M; Eccles, Martin P; Francis, Jill J; Michie, Susan; Murphy, Kerry; Kossenas, Fiona; Green, Sally E

    2013-08-19

    Dementia is a common and complex condition. Evidence-based guidelines for the management of people with dementia in general practice exist; however, detection, diagnosis and disclosure of dementia have been identified as potential evidence-practice gaps. Interventions to implement guidelines into practice have had varying success. The use of theory in designing implementation interventions has been limited, but is advocated because of its potential to yield more effective interventions and aid understanding of factors modifying the magnitude of intervention effects across trials. This protocol describes methods of a randomised trial that tests a theory-informed implementation intervention that, if effective, may provide benefits for patients with dementia and their carers. This trial aims to estimate the effectiveness of a theory-informed intervention to increase GPs' (in Victoria, Australia) adherence to a clinical guideline for the detection, diagnosis, and management of dementia in general practice, compared with providing GPs with a printed copy of the guideline. Primary objectives include testing if the intervention is effective in increasing the percentage of patients with suspected cognitive impairment who receive care consistent with two key guideline recommendations: receipt of a i) formal cognitive assessment, and ii) depression assessment using a validated scale (primary outcomes for the trial). The design is a parallel cluster randomised trial, with clusters being general practices. We aim to recruit 60 practices per group. Practices will be randomised to the intervention and control groups using restricted randomisation. Patients meeting the inclusion criteria, and GPs' detection and diagnosis behaviours directed toward these patients, will be identified and measured via an electronic search of the medical records nine months after the start of the intervention. Practitioners in the control group will receive a printed copy of the guideline. In

  10. The best of both worlds: Building on the COPUS and RTOP observation protocols to easily and reliably measure various levels of reformed instructional practice.

    Science.gov (United States)

    Lund, Travis J; Pilarz, Matthew; Velasco, Jonathan B; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne

    2015-01-01

    Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. © 2015 T. J. Lund et al. CBE—Life Sciences Education © 2015 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  11. Exploring multi-level system factors facilitating educator training and implementation of evidence-based practices (EBP): a study protocol.

    Science.gov (United States)

    Stahmer, Aubyn C; Suhrheinrich, Jessica; Schetter, Patricia L; McGee Hassrick, Elizabeth

    2018-01-08

    This study examines how system-wide (i.e., region, district, and school) mechanisms such as leadership support, training requirements, structure, collaboration, and education affect the use of evidence-based practices (EBPs) in schools and how this affects the outcomes for students with autism spectrum disorder (ASD). Despite growing evidence for the positive effects of EBPs for ASD, these practices are not consistently or effectively used in schools. Although special education programs are mandated to use EBPs, there are very few evidence-based methods for selecting, implementing, and sustaining EBPs. Research focuses primarily on teacher training, without attention to contextual factors (e.g., implementation climate, attitudes toward EBPs, resource allocation, and social networks) that may impact outcomes. Using an implementation science framework, this project will prospectively examine relations between system-wide factors and teachers' use of EBPs and student education outcomes. Survey data will be collected from approximately 85 regional special education directors, 170 regional program specialists, 265 district special education directors, 265 behavior specialists, 925 school principals, 3538 special education teachers, and 2700 paraprofessionals. Administrative data for the students with ASD served by participating teachers will be examined. A total of 79 regional-, district-, and school-level personnel will also participate in social network interviews. Mixed methods, including surveys, administrative data, and observational checklists, will be used to gather in-depth information about system-wide malleable factors that relate to positive teacher implementation of EBPs and student outcomes. Multi-level modeling will be used to assess system-wide malleable factors related to EBP implementation which will be linked to the trainer, teacher, and student outcomes and examined based on moderators (e.g., district size, Special Education Local Plan Area structure

  12. Implementation of two-party protocols in the noisy-storage model

    International Nuclear Information System (INIS)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-01-01

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  13. The effectiveness of internet-based e-learning on clinician behavior and patient outcomes: a systematic review protocol.

    Science.gov (United States)

    Sinclair, Peter; Kable, Ashley; Levett-Jones, Tracy

    2015-01-01

    The objective of this systematic review is to identify, appraise and synthesize the best available evidence for the effectiveness of internet-based e-learning programs on health care professional behavior and patient outcomes. Technological innovation has not only impacted social change in recent years but has been the prime driver of educational transformation.The newest consumers of post-secondary education, the so-called 'digital natives', have come to expect education to be delivered in a way that offers increased usability and convenience. Health care professionals (HCPs) in the clinical setting, particularly those in rural and remote communities, are no different. Today's health workforce has a professional responsibility to maintain competency in practice through achieving a minimum number of hours of continuing professional development. Consequently, HCPs seeking professional development opportunities are reliant on sourcing these independently according to individual learning needs. However, difficulties exist in some health professionals' access to ongoing professional development opportunities, particularly those with limited access face-to-face educationdue to geographical isolation or for those not enrolled in a formal program of study.These issues challenge traditional methods of teaching delivery; electronic learning (e-learning) is at the nexus of overcoming these challenges.The term e-learning originated in the mid-1990s as the internet began to gather momentum.Electronic learning can be broadly defined as any type of educational media that is delivered in an electronic form.Terms such as computer-assisted learning, online learning, web-based learning and e-learning are often used synonymously but all reflect knowledge transfer via an electronic device. This broad definition allows for a gamut of multimedia to be used for the purpose of constructing and assessing knowledge. Multimedia typically used in e-learning range from the now archaic Compact

  14. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  15. Agents Based e-Commerce and Securing Exchanged Information

    Science.gov (United States)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  16. LEACH-A: An Adaptive Method for Improving LEACH Protocol

    Directory of Open Access Journals (Sweden)

    Jianli ZHAO

    2014-01-01

    Full Text Available Energy has become one of the most important constraints on wireless sensor networks. Hence, many researchers in this field focus on how to design a routing protocol to prolong the lifetime of the network. The classical hierarchical protocols such as LEACH and LEACH-C have better performance in saving the energy consumption. However, the choosing strategy only based on the largest residue energy or shortest distance will still consume more energy. In this paper an adaptive routing protocol named “LEACH-A” which has an energy threshold E0 is proposed. If there are cluster nodes whose residual energy are greater than E0, the node of largest residual energy is selected to communicated with the base station; When all the cluster nodes energy are less than E0, the node nearest to the base station is select to communication with the base station. Simulations show that our improved protocol LEACH-A performs better than the LEACH and the LEACH-C.

  17. Standard Operational Protocols in professional nursing practice: use, weaknesses and potentialities

    Directory of Open Access Journals (Sweden)

    Camila Balsero Sales

    Full Text Available ABSTRACT Objective: to evaluate the use of Standard Operational Protocols (SOPs in the professional practice of the nursing team based on the theoretical framework of Donabedian, as well as to identify the weaknesses and potentialities from its implementation. Method: Evaluative research, with quantitative approach performed with nursing professionals working in the Health Units of a city of São Paulo, composed of two stages: document analysis and subsequent application of a questionnaire to nursing professionals. Results: A total of 247 nursing professionals participated and reported changes in the way the interventions were performed. The main weaknesses were the small number of professionals, inadequate physical structure and lack of materials. Among the potentialities were: the standardization of materials and concern of the manager and professional related to patient safety. Conclusion: The reassessment of SOPs is necessary, as well as the adoption of a strategy of permanent education of professionals aiming at improving the quality of care provided.

  18. Back to Practice, a Decade of Research in E-Government

    Science.gov (United States)

    Assar, Saïd; Boughzala, Imed; Boydens, Isabelle

    E-government is a multidisciplinary field of research based initially on empirical insights from practice. Efforts to theoretically found the field have opened perspectives from multiple research domains. The goal of this chapter is to review evolution of the e-government field from an institutional and an academic point of view. Our position is that e-government is an emergent multidisciplinary field of research in which focus on practice is a prominent characteristic. Each chapter of the book is then briefly presented and is positioned according to a vision of the e-government domain of research.

  19. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  20. Quality of Mobile Phone and Tablet Mobile Apps for Speech Sound Disorders: Protocol for an Evidence-Based Appraisal.

    Science.gov (United States)

    Furlong, Lisa M; Morris, Meg E; Erickson, Shane; Serry, Tanya A

    2016-11-29

    Although mobile apps are readily available for speech sound disorders (SSD), their validity has not been systematically evaluated. This evidence-based appraisal will critically review and synthesize current evidence on available therapy apps for use by children with SSD. The main aims are to (1) identify the types of apps currently available for Android and iOS mobile phones and tablets, and (2) to critique their design features and content using a structured quality appraisal tool. This protocol paper presents and justifies the methods used for a systematic review of mobile apps that provide intervention for use by children with SSD. The primary outcomes of interest are (1) engagement, (2) functionality, (3) aesthetics, (4) information quality, (5) subjective quality, and (6) perceived impact. Quality will be assessed by 2 certified practicing speech-language pathologists using a structured quality appraisal tool. Two app stores will be searched from the 2 largest operating platforms, Android and iOS. Systematic methods of knowledge synthesis shall include searching the app stores using a defined procedure, data extraction, and quality analysis. This search strategy shall enable us to determine how many SSD apps are available for Android and for iOS compatible mobile phones and tablets. It shall also identify the regions of the world responsible for the apps' development, the content and the quality of offerings. Recommendations will be made for speech-language pathologists seeking to use mobile apps in their clinical practice. This protocol provides a structured process for locating apps and appraising the quality, as the basis for evaluating their use in speech pathology for children in English-speaking nations. ©Lisa M Furlong, Meg E Morris, Shane Erickson, Tanya A Serry. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 29.11.2016.

  1. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  2. The use of participant-observation protocol in an industrial engineering research.

    Science.gov (United States)

    Silveira e Silva, Renato da; Sznelwar, Laerte Idal; D'Afonseca e Silva, Victor

    2012-01-01

    Based on literature, this article aims to present the "participant-observation' research protocol, and its practical application in the industrial engineering field, more specifically within the area of design development, and in the case shown by this article, of interiors' design. The main target is to identify the concept of the method, i.e., from its characteristics to structure a general sense about the subject, so that the protocol can be used in different areas of knowledge, especially those ones which are committed with the scientific research involving the expertise from researchers, and subjective feelings and opinions of the users of an engineering product, and how this knowledge can be benefic for product design, contributing since the earliest stage of design.

  3. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  4. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  5. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  6. Secure E-Commerce Protocol

    OpenAIRE

    Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin

    2011-01-01

    E-commerce has presented a new way of doing business all over the world using internet.Organizations have changed their way of doing business from a traditional approach to embrace ecommerceprocesses. As individuals and businesses increase information sharing, a concernregarding the exchange of money securely and conveniently over the internet increases. Therefore,security is a necessity in an e-commerce transaction. The purpose of this paper is to present atoken based Secure E-commerce Proto...

  7. Protocolos de Montreal e Kyoto: pontos em comum e diferenças fundamentais Montreal and Kyoto Protocols: common points and essential differences

    Directory of Open Access Journals (Sweden)

    Darly Henriques da Silva

    2009-12-01

    Full Text Available Os Protocolos de Montreal e Kyoto, tratados internacionais de defesa do meio ambiente e da vida, controlam gases que provocam o buraco na camada de ozônio e o efeito estufa, respectivamente, resultantes de atividades industriais e uso da terra. O artigo enfatiza pontos comuns e diferenças entre eles, fornecendo atualização dos protocolos.Montreal and Kyoto Protocols, international treaties, aim at safeguarding the environment and life by controlling the use of gases which deplete the ozone layer and cause the greenhouse effect, respectively, due to industrial and land use activities. The article highlights common points and differences and provides an update discussion about the protocols.

  8. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  9. Practical reconstruction protocol for quantitative {sup 90}Y bremsstrahlung SPECT/CT

    Energy Technology Data Exchange (ETDEWEB)

    Siman, W.; Mikell, J. K.; Kappadath, S. C., E-mail: skappadath@mdanderson.org [Department of Imaging Physics, The University of Texas MD Anderson Cancer Center, Houston, Texas 77030 and The University of Texas Graduate School of Biomedical Sciences at Houston, Houston, Texas 77030 (United States)

    2016-09-15

    Purpose: To develop a practical background compensation (BC) technique to improve quantitative {sup 90}Y-bremsstrahlung single-photon emission computed tomography (SPECT)/computed tomography (CT) using a commercially available imaging system. Methods: All images were acquired using medium-energy collimation in six energy windows (EWs), ranging from 70 to 410 keV. The EWs were determined based on the signal-to-background ratio in planar images of an acrylic phantom of different thicknesses (2–16 cm) positioned below a {sup 90}Y source and set at different distances (15–35 cm) from a gamma camera. The authors adapted the widely used EW-based scatter-correction technique by modeling the BC as scaled images. The BC EW was determined empirically in SPECT/CT studies using an IEC phantom based on the sphere activity recovery and residual activity in the cold lung insert. The scaling factor was calculated from 20 clinical planar {sup 90}Y images. Reconstruction parameters were optimized in the same SPECT images for improved image quantification and contrast. A count-to-activity calibration factor was calculated from 30 clinical {sup 90}Y images. Results: The authors found that the most appropriate imaging EW range was 90–125 keV. BC was modeled as 0.53× images in the EW of 310–410 keV. The background-compensated clinical images had higher image contrast than uncompensated images. The maximum deviation of their SPECT calibration in clinical studies was lowest (<10%) for SPECT with attenuation correction (AC) and SPECT with AC + BC. Using the proposed SPECT-with-AC + BC reconstruction protocol, the authors found that the recovery coefficient of a 37-mm sphere (in a 10-mm volume of interest) increased from 39% to 90% and that the residual activity in the lung insert decreased from 44% to 14% over that of SPECT images with AC alone. Conclusions: The proposed EW-based BC model was developed for {sup 90}Y bremsstrahlung imaging. SPECT with AC + BC gave improved lesion

  10. Use of Intervention Mapping to Enhance Health Care Professional Practice: A Systematic Review.

    Science.gov (United States)

    Durks, Desire; Fernandez-Llimos, Fernando; Hossain, Lutfun N; Franco-Trigo, Lucia; Benrimoj, Shalom I; Sabater-Hernández, Daniel

    2017-08-01

    Intervention Mapping is a planning protocol for developing behavior change interventions, the first three steps of which are intended to establish the foundations and rationales of such interventions. This systematic review aimed to identify programs that used Intervention Mapping to plan changes in health care professional practice. Specifically, it provides an analysis of the information provided by the programs in the first three steps of the protocol to determine their foundations and rationales of change. A literature search was undertaken in PubMed, Scopus, SciELO, and DOAJ using "Intervention Mapping" as keyword. Key information was gathered, including theories used, determinants of practice, research methodologies, theory-based methods, and practical applications. Seventeen programs aimed at changing a range of health care practices were included. The social cognitive theory and the theory of planned behavior were the most frequently used frameworks in driving change within health care practices. Programs used a large variety of research methodologies to identify determinants of practice. Specific theory-based methods (e.g., modelling and active learning) and practical applications (e.g., health care professional training and facilitation) were reported to inform the development of practice change interventions and programs. In practice, Intervention Mapping delineates a three-step systematic, theory- and evidence-driven process for establishing the theoretical foundations and rationales underpinning change in health care professional practice. The use of Intervention Mapping can provide health care planners with useful guidelines for the theoretical development of practice change interventions and programs.

  11. RT-based memory detection : Item saliency effects in the single-probe and the multiple-probe protocol

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.; Theocharidou, K.

    RT-based memory detection may provide an efficient means to assess recognition of concealed information. There is, however, considerable heterogeneity in detection rates, and we explored two potential moderators: item saliency and test protocol. Participants tried to conceal low salient (e.g.,

  12. Developing a theory-based instrument to assess the impact of continuing professional development activities on clinical practice: a study protocol

    Directory of Open Access Journals (Sweden)

    Rousseau Michel

    2011-03-01

    Full Text Available Abstract Background Continuing professional development (CPD is one of the principal means by which health professionals (i.e. primary care physicians and specialists maintain, improve, and broaden the knowledge and skills required for optimal patient care and safety. However, the lack of a widely accepted instrument to assess the impact of CPD activities on clinical practice thwarts researchers' comparisons of the effectiveness of CPD activities. Using an integrated model for the study of healthcare professionals' behaviour, our objective is to develop a theory-based, valid, reliable global instrument to assess the impact of accredited CPD activities on clinical practice. Methods Phase 1: We will analyze the instruments identified in a systematic review of factors influencing health professionals' behaviours using criteria that reflect the literature on measurement development and CPD decision makers' priorities. The outcome of this phase will be an inventory of instruments based on social cognitive theories. Phase 2: Working from this inventory, the most relevant instruments and their related items for assessing the concepts listed in the integrated model will be selected. Through an e-Delphi process, we will verify whether these instruments are acceptable, what aspects need revision, and whether important items are missing and should be added. The outcome of this phase will be a new global instrument integrating the most relevant tools to fit our integrated model of healthcare professionals' behaviour. Phase 3: Two data collections are planned: (1 a test-retest of the new instrument, including item analysis, to assess its reliability and (2 a study using the instrument before and after CPD activities with a randomly selected control group to explore the instrument's mere-measurement effect. Phase 4: We will conduct individual interviews and focus groups with key stakeholders to identify anticipated barriers and enablers for implementing the

  13. E-cigarette use in pregnancy: a human rights-based approach to policy and practice.

    Science.gov (United States)

    van der Eijk, Yvette; Petersen, Anne Berit; Bialous, Stella A

    2017-11-01

    The health risks associated with e-cigarette use in pregnancy are mostly unknown. Guidelines by the World Health Organization and national health agencies warn women against using e-cigarettes in pregnancy; however, in the UK, a recent multiagency guideline takes a different approach by not discouraging e-cigarette use in pregnancy. Furthermore, e-Voke ™ , an e-cigarette, has been approved for use in pregnancy in the UK. We analyze United Nations human rights treaties to examine how they might inform best practice recommendations for e-cigarette use in pregnancy. These treaties oblige Parties to adopt policies that protect children's and women's right to health, appropriate pregnancy services, and health education. We argue that clinical practice guidelines related to use of e-cigarettes in pregnancy should consider both evidence and human rights principles, and ensure that healthcare providers and patients are given clear, accurate messages about the known and potential risks associated with e-cigarette use in pregnancy. © 2017 Nordic Federation of Societies of Obstetrics and Gynecology, Acta Obstetricia et Gynecologica Scandinavica.

  14. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  15. Developing a yeast-based assay protocol to monitor total ...

    African Journals Online (AJOL)

    A yeast-based assay protocol developed for detecting oestrogenic activity in activated sludge (AS) supernatant is described. The protocol used Saccharomyces cerevisiae construct RMY/ER-ERE with human oestrogen receptor (ERα) and lacZ reporter genes, and was developed by modifying existing assays for use with AS ...

  16. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    DEFF Research Database (Denmark)

    Bacco, Davide; Christensen, Jesper Bjerge; Usuga Castaneda, Mario A.

    2016-01-01

    10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak......Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last...... coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable....

  17. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    Science.gov (United States)

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  18. PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

    Directory of Open Access Journals (Sweden)

    S. Prasanna

    2014-03-01

    Full Text Available Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

  19. Redesigning a large school-based clinical trial in response to changes in community practice.

    Science.gov (United States)

    Gerald, Lynn B; Gerald, Joe K; McClure, Leslie A; Harrington, Kathy; Erwin, Sue; Bailey, William C

    2011-06-01

    Asthma exacerbations are seasonal with the greatest risk in elementary-age students occurring shortly after returning to school following summer break. Recent research suggests that this seasonality in children is primarily related to viral respiratory tract infections. Regular hand washing is the most effective method to prevent the spread of viral respiratory infections; unfortunately, achieving hand washing recommendations in schools is difficult. Therefore, we designed a study to evaluate the effect of hand sanitizer use in elementary schools on exacerbations among children with asthma. To describe the process of redesigning the trial in response to changes in the safety profile of the hand sanitizer as well as changes in hand hygiene practice in the schools. The original trial was a randomized, longitudinal, subject-blinded, placebo-controlled, community-based crossover trial. The primary aim was to evaluate the incremental effectiveness of hand sanitizer use in addition to usual hand hygiene practices to decrease asthma exacerbations in elementary-age children. Three events occurred that required major modifications to the original study protocol: (1) safety concerns arose regarding the hand sanitizer's active ingredient; (2) no substitute placebo hand sanitizer was available; and (3) community preferences changed regarding hand hygiene practices in the schools. The revised protocol is a randomized, longitudinal, community-based crossover trial. The primary aim is to evaluate the incremental effectiveness of a two-step hand hygiene process (hand hygiene education plus institutionally provided alcohol-based hand sanitizer) versus usual care to decrease asthma exacerbations. Enrollment was completed in May 2009 with 527 students from 30 schools. The intervention began in August 2009 and will continue through May 2011. Study results should be available at the end of 2011. The changed design does not allow us to directly measure the effectiveness of hand

  20. A mixed methods protocol for developing and testing implementation strategies for evidence-based obesity prevention in childcare: a cluster randomized hybrid type III trial.

    Science.gov (United States)

    Swindle, Taren; Johnson, Susan L; Whiteside-Mansell, Leanne; Curran, Geoffrey M

    2017-07-18

    Despite the potential to reach at-risk children in childcare, there is a significant gap between current practices and evidence-based obesity prevention in this setting. There are few investigations of the impact of implementation strategies on the uptake of evidence-based practices (EBPs) for obesity prevention and nutrition promotion. This study protocol describes a three-phase approach to developing and testing implementation strategies to support uptake of EBPs for obesity prevention practices in childcare (i.e., key components of the WISE intervention). Informed by the i-PARIHS framework, we will use a stakeholder-driven evidence-based quality improvement (EBQI) process to apply information gathered in qualitative interviews on barriers and facilitators to practice to inform the design of implementation strategies. Then, a Hybrid Type III cluster randomized trial will compare a basic implementation strategy (i.e., intervention as usual) with an enhanced implementation strategy informed by stakeholders. All Head Start centers (N = 12) within one agency in an urban area in a southern state in the USA will be randomized to receive the basic or enhanced implementation with approximately 20 classrooms per group (40 educators, 400 children per group). The educators involved in the study, the data collectors, and the biostastician will be blinded to the study condition. The basic and enhanced implementation strategies will be compared on outcomes specified by the RE-AIM model (e.g., Reach to families, Effectiveness of impact on child diet and health indicators, Adoption commitment of agency, Implementation fidelity and acceptability, and Maintenance after 6 months). Principles of formative evaluation will be used throughout the hybrid trial. This study will test a stakeholder-driven approach to improve implementation, fidelity, and maintenance of EBPs for obesity prevention in childcare. Further, this study provides an example of a systematic process to develop

  1. Improvement in QA protocol for TLD based personnel monitoring laboratory in last five year

    International Nuclear Information System (INIS)

    Rakesh, R.B.

    2018-01-01

    The Quality Assurance (QA) in Personnel monitoring (PM) is a tool to assess the performance of PM laboratories and reliability of dose estimation with respect to standards laid down by international agencies such as IAEA (ISO trumpet curve), IEC, ANSI etc. Reliable personal dose estimation is a basic requirement for radiation protection planning as well as decision making continuous improvement in radiation protection is inherent in radiation protection practices which is highly dependent on accuracy and reliability of the monitoring data. Experience based evolution of Quality control (QC) measures as well as Quality assurance (QA) protocol are two important aspects towards continuous improvement in accuracy and reliability of personnel monitoring results. The paper describes improvement in QC measures and QA protocols initiated during the last five years which led to improvement in the quality of PM services

  2. A Guanxi Shibboleth based security infrastructure for e-social science

    OpenAIRE

    Jie, Wei; Young, Alistair; Arshad, Junaid; Finch, June; Procter, Rob; Turner, Andy

    2008-01-01

    An e-Social Science infrastructure generally has security requirements to protect their restricted resources or services. As a widely accepted authentication and authorization technology, Shibboleth supports the sharing of resources on interinstitutional federation. Guanxi is an open source implementation of the Shibboleth protocol and architecture. In this paper, we propose a security infrastructure for e-social science based on the Guanxi Shibboleth. This security infrastructure presents tw...

  3. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  4. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  5. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  6. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  7. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  8. Improved two-way six-state protocol for quantum key distribution

    International Nuclear Information System (INIS)

    Shaari, J.S.; Bahari, Asma' Ahmad

    2012-01-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  9. Improved two-way six-state protocol for quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Shaari, J.S., E-mail: jesni_shamsul@yahoo.com [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia); Bahari, Asma' Ahmad [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia)

    2012-10-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  10. Investigation into Practical Implementations of a Zero Knowledge Protocol.

    Energy Technology Data Exchange (ETDEWEB)

    Marleau, Peter [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Krentz-Wee, Rebecca E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    In recent years, the concept of Zero Knowledge Protocols (ZKP) as a useful approach to nuclear warhead verification has become increasingly popular. Several implementations of ZKP have been proposed, driving technology development toward proof of concept demonstrations. Whereas proposed implementations seem to fall within the general class of template-based techniques, all physical implementations of ZKPs proposed to date have a complication: once the instrumentation is prepared, it is no longer authenticatable; the instrument physically contains sensitive information. In this work we explore three different concepts that may offer more authenticatable and practical ZKP implementations and evaluate the sensitive information that may be at risk when doing so: sharing a subset of detector counts in a preloaded image (with spatial information removed), real-time image subtraction, and a new concept, CONfirmation using a Fast-neutron Imaging Detector with Anti-image NULL-positive Time Encoding (CONFIDANTE). CONFIDANTE promises to offer an almost ideal implementation of ZKP: a positive result is indicated by a constant rate at all times enabling the monitoring party the possibility of full access to the instrument before, during, and after confirmation. A prototype of CONFIDANTE was designed, built, and its performance evaluated in a series of measurements of several objects including a set of plutonium dioxide Hemispheres. Very encouraging results proving feasibility are presented. 1 Rebecca is currently a graduate student in Nuclear Engineering at UC Berkeley

  11. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...... type annotations or explicit type casts. We have implemented a protocol verifier SpiCa based on the algorithm, and confirmed its effectiveness....

  12. Evaluation of an app-based stress protocol

    Directory of Open Access Journals (Sweden)

    Noeh Claudius

    2016-09-01

    Full Text Available Stress is a major influence on the quality of life in our fast-moving society. This paper describes a standardized and contemporary protocol that is capable of inducing moderate psychological stress in a laboratory setting. Furthermore, it evaluates its effects on physiological biomarkers. The protocol called “THM-Stresstest” mainly consists of a rest period (30 min, an app-based stress test under the surveillance of an audience (4 min and a regeneration period (32 min. We investigated 12 subjects to evaluate the developed protocol. We could show significant changes in heart rate variability, electromyography, electro dermal activity and salivary cortisol and α-amylase. From this data we conclude that the THM-Stresstest can serve as a psychobiological tool for provoking responses in the cardiovascular-, the endocrine and exocrine system as well as the sympathetic part of the central nervous system.

  13. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  14. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  15. Systems consultation: protocol for a novel implementation strategy designed to promote evidence-based practice in primary care.

    Science.gov (United States)

    Quanbeck, Andrew; Brown, Randall T; E Zgierska, Aleksandra; A Johnson, Roberta; Robinson, James M; Jacobson, Nora

    2016-01-27

    Adoption of evidence-based practices takes place at a glacial place in healthcare. This research will pilot test an innovative implementation strategy - systems consultation -intended to speed the adoption of evidence-based practice in primary care. The strategy is based on tenets of systems engineering and has been extensively tested in addiction treatment. Three innovations have been included in the strategy - translation of a clinical practice guideline into a checklist-based implementation guide, the use of physician peer coaches ('systems consultants') to help clinics implement the guide, and a focus on reducing variation in practices across prescribers and clinics. The implementation strategy will be applied to improving opioid prescribing practices in primary care, which may help ultimately mitigate the increasing prevalence of opioid abuse and addiction. The pilot test will compare four intervention clinics to four control clinics in a matched-pairs design. A leading clinical guideline for opioid prescribing has been translated into a checklist-based implementation guide in a systematic process that involved experts who wrote the guideline in consultation with implementation experts and primary care physicians. Two physicians with expertise in family and addiction medicine are serving as the systems consultants. Each systems consultant will guide two intervention clinics, using two site visits and follow-up communication by phone and email, to implement the translated guideline. Mixed methods will be used to test the feasibility, acceptability, and preliminary effectiveness of the implementation strategy in an evaluation that meets standards for 'fully developed use' of the RE-AIM framework (Reach, Effectiveness, Adoption, Implementation, Maintenance). The clinic will be the primary unit of analysis. The systems consultation implementation strategy is intended to generalize to the adoption of other clinical guidelines. This pilot test is intended to prepare

  16. A New Approach to Practical Active-Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio

    2012-01-01

    We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yao’s garbled circuits. We use an OT-based approach and get efficiency via OT extension in the random oracle model. To get a practical protocol we introduce...... a number of novel techniques for relating the outputs and inputs of OTs in a larger construction....

  17. Knowledge, attitudes, beliefs and behaviour intentions for three bowel management practices in intensive care: effects of a targeted protocol implementation for nursing and medical staff.

    Science.gov (United States)

    Knowles, Serena; Lam, Lawrence T; McInnes, Elizabeth; Elliott, Doug; Hardy, Jennifer; Middleton, Sandy

    2015-01-01

    Bowel management protocols have the potential to minimize complications for critically ill patients. Targeted implementation can increase the uptake of protocols by clinicians into practice. The theory of planned behaviour offers a framework in which to investigate clinicians' intention to perform the behaviour of interest. This study aimed to evaluate the effect of implementing a bowel management protocol on intensive care nursing and medical staffs' knowledge, attitude, subjective norms, perceived behavioural control, behaviour intentions, role perceptions and past behaviours in relation to three bowel management practices. A descriptive before and after survey using a self-administered questionnaire sent to nursing and medical staff working within three intensive care units before and after implementation of our bowel management protocol (pre: May - June 2008; post: Feb - May 2009). Participants had significantly higher knowledge scores post-implementation of our protocol (pre mean score 17.6; post mean score 19.3; p = 0.004). Post-implementation there was a significant increase in: self-reported past behaviour (pre mean score 5.38; post mean score 7.11; p = 0.002) and subjective norms scores (pre mean score 3.62; post mean score 4.18; p = 0.016) for bowel assessment; and behaviour intention (pre mean score 5.22; post mean score 5.65; p = 0.048) for administration of enema. This evaluation, informed by the theory of planned behaviour, has provided useful insights into factors that influence clinician intentions to perform evidence-based bowel management practices in intensive care. Addressing factors such as knowledge, attitudes and beliefs can assist in targeting implementation strategies to positively affect clinician behaviour change. Despite an increase in clinicians' knowledge scores, our implementation strategy did not, however, significantly change clinician behaviour intentions for all three bowel management practices. Further research is

  18. Institutional Context and E-recruitment Practices of Danish Organisations

    DEFF Research Database (Denmark)

    Holm, Anna B.

    2014-01-01

    and the adoption of e-recruitment from a macro organisational perspective. Design/methodology/approach - The study employs new institutional theory as a theoretical lens in order to understand how external pressures impact upon recruitment professionals and their practices. The empirical part is based...

  19. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication

    Directory of Open Access Journals (Sweden)

    Jaejin Jang

    2016-08-01

    Full Text Available Wireless access points (WAPs are devices that provide Internet connectivity to devices such as desktops, laptops, smartphones, and tablets. Hence, it is important to provide sufficient availability to devices and security for the traffic that is routed by a WAP. However, attackers can decrease the network bandwidth or obtain the traffic including private data such as search histories, login information, and device usage patterns by exploiting the vulnerabilities in firmware upgrades to install malicious firmware. To address this problem, we propose a sustainable and practical firmware upgrade for a WAP using password-based authentication. The proposed upgrade protocol ensures security by adding freshness to the firmware whenever a firmware upgrade occurs. This freshness is different for each event and each firmware; therefore, even if the freshness of one firmware is exposed, the others are secure. In addition, confidentiality, integrity, and authentication are ensured. Furthermore, the proposed protocol can be easily implemented and adapted to WAPs. Experiments are performed to evaluate the upgrade time, resource usage, and code size in wired and wireless connected environments by implementing a prototype and analyzing the security of the protocol. The results show that the proposed upgrade is secure and practical.

  20. Codes of practice and protocols for the dosimetry in reference conditions of proton and ion beams

    International Nuclear Information System (INIS)

    Vatnitsky, S.; Andreo, P.

    2002-01-01

    The advantages of radiotherapy protons and heavier charged-particle beams, the technological feasibility, and the clinical results obtained so far have led to the establishment of about 20 treatment facilities worldwide and plans to open another 20 proton and light-ion therapy centres in the next five years. In order to meet the expanding capabilities of treatment techniques, considerable effort has been devoted during the last fifteen years to the development of the dosimetry and calibration of such beams. This paper reviews these developments and summarizes the present status of Codes of Practice and protocols for the dosimetry in reference conditions of proton and ion beams. The first dosimetry protocol for heavy-particle radiotherapy beams, AAPM TG 20, was based on the use of Faraday cups and calorimeters, whereas ionization chamber dosimetry received little attention. Following the trends in 'nuclear particle' radiotherapy, TG 20 included recommendations for specifying 'dose to tissue'. The lack of availability of a harmonized set of data for the different particles made this protocol to include data for stopping-powers and for the mean energy required to produce and ion pair in air, W air , from multiple authors, without enough attention being paid to their consistency. The increased focus into proton beams was materialized in the publication of the ECHED Code of Practice, dedicated exclusively to protons, where ionization dosimetry received more attention than in TG 20. It was not until the publication of the Supplement to the ECHED recommendations that ionization chambers having a 60 CO calibration factor were recommended as a reference detector for proton dosimetry, and data supplied for chambers with different wall materials. The emphasis on ionization chamber-based proton dosimetry was complemented with a recommendation for using water as dosimetry phantom material and the necessary data on tissue and water to air stopping-power ratios and W air . One of

  1. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  2. Management of the infertile couple: an evidence-based protocol

    Directory of Open Access Journals (Sweden)

    Kamel Remah M

    2010-03-01

    Full Text Available Abstract Background Infertility is defined as inability of a couple to conceive naturally after one year of regular unprotected sexual intercourse. It remains a major clinical and social problem, affecting perhaps one couple in six. Evaluation usually starts after 12 months; however it may be indicated earlier. The most common causes of infertility are: male factor such as sperm abnormalities, female factor such as ovulation dysfunction and tubal pathology, combined male and female factors and unexplained infertility. Objectives The aim of this study is to provide the healthcare professionals an evidence-based management protocol for infertile couples away from medical information overload. Methods A comprehensive review where the literature was searched for "Management of infertility and/or infertile couples" at library website of University of Bristol (MetaLib by using a cross-search of different medical databases besides the relevant printed medical journals and periodicals. Guidelines and recommendations were retrieved from the best evidence reviews such as that from the American College of Obstetricians and Gynaecologists (ACOG, American Society for Reproductive Medicine (ASRM, Canadian Fertility and Andrology Society (CFAS, and Royal College of Obstetricians and Gynaecologists (RCOG. Results A simple guide for the clinicians to manage the infertile couples. Conclusions The study deploys a new strategy to translate the research findings and evidence-base recommendations into a simplified focused guide to be applied on routine daily practice. It is an approach to disseminate the recommended medical care for infertile couple to the practicing clinicians.

  3. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  4. Dynamics behind the scale up of evidence-based obesity prevention: protocol for a multi-site case study of an electronic implementation monitoring system in health promotion practice.

    Science.gov (United States)

    Conte, Kathleen P; Groen, Sisse; Loblay, Victoria; Green, Amanda; Milat, Andrew; Persson, Lina; Innes-Hughes, Christine; Mitchell, Jo; Thackway, Sarah; Williams, Mandy; Hawe, Penelope

    2017-12-06

    The effectiveness of many interventions to promote health and prevent disease has been well established. The imperative has therefore shifted from amassing evidence about efficacy to scale-up to maximise population-level health gains. Electronic implementation monitoring, or 'e-monitoring', systems have been designed to assist and track the delivery of preventive policies and programs. However, there is little evidence on whether e-monitoring systems improve the dissemination, adoption, and ongoing delivery of evidence-based preventive programs. Also, given considerable difficulties with e-monitoring systems in the clinical sector, scholars have called for a more sophisticated re-examination of e-monitoring's role in enhancing implementation. In the state of New South Wales (NSW), Australia, the Population Health Information Management System (PHIMS) was created to support the dissemination of obesity prevention programs to 6000 childcare centres and elementary schools across all 15 local health districts. We have established a three-way university-policymaker-practice research partnership to investigate the impact of PHIMS on practice, how PHIMS is used, and how achievement of key performance indicators of program adoption may be associated with local contextual factors. Our methods encompass ethnographic observation, key informant interviews and participatory workshops for data interpretation at a state and local level. We use an on-line social network analysis of the collaborative relationships across local health district health promotion teams to explore the relationship between PHIMS use and the organisational structure of practice. Insights will be sensitised by institutional theory, practice theory and complex adaptive system thinking, among other theories which make sense of socio-technical action. Our working hypothesis is that the science of getting evidence-based programs into practice rests on an in-depth understanding of the role they play in the on

  5. Comparison of mRNA splicing assay protocols across multiple laboratories: recommendations for best practice in standardized clinical testing.

    Science.gov (United States)

    Whiley, Phillip J; de la Hoya, Miguel; Thomassen, Mads; Becker, Alexandra; Brandão, Rita; Pedersen, Inge Sokilde; Montagna, Marco; Menéndez, Mireia; Quiles, Francisco; Gutiérrez-Enríquez, Sara; De Leeneer, Kim; Tenés, Anna; Montalban, Gemma; Tserpelis, Demis; Yoshimatsu, Toshio; Tirapo, Carole; Raponi, Michela; Caldes, Trinidad; Blanco, Ana; Santamariña, Marta; Guidugli, Lucia; de Garibay, Gorka Ruiz; Wong, Ming; Tancredi, Mariella; Fachal, Laura; Ding, Yuan Chun; Kruse, Torben; Lattimore, Vanessa; Kwong, Ava; Chan, Tsun Leung; Colombo, Mara; De Vecchi, Giovanni; Caligo, Maria; Baralle, Diana; Lázaro, Conxi; Couch, Fergus; Radice, Paolo; Southey, Melissa C; Neuhausen, Susan; Houdayer, Claude; Fackenthal, Jim; Hansen, Thomas Van Overeem; Vega, Ana; Diez, Orland; Blok, Rien; Claes, Kathleen; Wappenschmidt, Barbara; Walker, Logan; Spurdle, Amanda B; Brown, Melissa A

    2014-02-01

    Accurate evaluation of unclassified sequence variants in cancer predisposition genes is essential for clinical management and depends on a multifactorial analysis of clinical, genetic, pathologic, and bioinformatic variables and assays of transcript length and abundance. The integrity of assay data in turn relies on appropriate assay design, interpretation, and reporting. We conducted a multicenter investigation to compare mRNA splicing assay protocols used by members of the ENIGMA (Evidence-Based Network for the Interpretation of Germline Mutant Alleles) consortium. We compared similarities and differences in results derived from analysis of a panel of breast cancer 1, early onset (BRCA1) and breast cancer 2, early onset (BRCA2) gene variants known to alter splicing (BRCA1: c.135-1G>T, c.591C>T, c.594-2A>C, c.671-2A>G, and c.5467+5G>C and BRCA2: c.426-12_8delGTTTT, c.7988A>T, c.8632+1G>A, and c.9501+3A>T). Differences in protocols were then assessed to determine which elements were critical in reliable assay design. PCR primer design strategies, PCR conditions, and product detection methods, combined with a prior knowledge of expected alternative transcripts, were the key factors for accurate splicing assay results. For example, because of the position of primers and PCR extension times, several isoforms associated with BRCA1, c.594-2A>C and c.671-2A>G, were not detected by many sites. Variation was most evident for the detection of low-abundance transcripts (e.g., BRCA2 c.8632+1G>A Δ19,20 and BRCA1 c.135-1G>T Δ5q and Δ3). Detection of low-abundance transcripts was sometimes addressed by using more analytically sensitive detection methods (e.g., BRCA2 c.426-12_8delGTTTT ins18bp). We provide recommendations for best practice and raise key issues to consider when designing mRNA assays for evaluation of unclassified sequence variants.

  6. Study protocol for a pragmatic randomised controlled trial evaluating efficacy of a smoking cessation e-‘Tabac Info Service’: ee-TIS trial

    Science.gov (United States)

    Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F

    2017-01-01

    Introduction A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. Methods and analyses The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. Ethics and dissemination The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. Trial registration

  7. Development of a virtual lab for practical eLearning in eHealth.

    Science.gov (United States)

    Herzog, Juliane; Forjan, Mathias; Sauermann, Stefan; Mense, Alexander; Urbauer, Philipp

    2015-01-01

    In recent years an ongoing development in educational offers for professionals working in the field of eHealth has been observed. This education is increasingly offered in the form of eLearning courses. Furthermore, it can be seen that simulations are a valuable part to support the knowledge transfer. Based on the knowledge profiles defined for eHealth courses a virtual lab should be developed. For this purpose, a subset of skills and a use case is determined. After searching and evaluating appropriate simulating and testing tools six tools were chosen to implement the use case practically. Within an UML use case diagram the interaction between the tools and the user is represented. Initially tests have shown good results of the tools' feasibility. After an extensive testing phase the tools should be integrated in the eHealth eLearning courses.

  8. CASES ON GLOBAL E-LEARNING PRACTICES:Successes and Pitfalls

    Directory of Open Access Journals (Sweden)

    Reviewed by Yavuz AKBULUT

    2007-10-01

    Full Text Available “Cases on Global E-Learning Practices: Successes and Pitfalls” look into the global practices of e-learning which has assumed a considerable role in the education sector recently. It is edited by Ramesh C. Sharma and Sanjaya Mishra from Indira Gandhi National Open University in New Delhi, India. It is published by Information Science Publishing, which is an imprint of Idea Group, an international publishing company specializing in research publications in the fields of technology, management and information science. The book is consisted of 356 pages (+xiv covering 23 articles. Articles are related to successes and failures of e-learning professionals. Practical experiences and research on e-learning are provided in the form of case studies by experts from all over the world. E-learning practitioners who are involved in the design, development and implementation of e-learning may find the book quite useful since it might back up their working knowledge on how to design appropriate instructional strategies for e-learning. The book sheds light on the potential of e-learning in instruction through reader-friendly reviews followed by unique case studies. Case study approach is deliberately assumed since case studies have the potential to present authentic learning situations with a balance of both theory and practice. Both contributors and readers are encouraged to reflect on what, when, why and how an instructional endeavor has planned, designed and implemented. Such an approach seems to initiate continuous reflective thinking on the part of the authors. Case studies in the book are presented in three sections, namely, cases on completely online learning systems, cases on blended online learning systems and cases on resource-based online learning systems each sheltering relevant articles. The introduction provides an overview of the e-learning concepts, theories and practices. It is emphasized that e-learning is a system based on technology and

  9. A New Approach to Practical Active-Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio

    2011-01-01

    We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yao's garbled circuits. We use an OT-based approach and get efficiency via OT extension in the random oracle model. To get a practical protocol we introduce...... a number of novel techniques for relating the outputs and inputs of OTs in a larger construction. We also report on an implementation of this approach, that shows that our protocol is more efficient than any previous one: For big enough circuits, we can evaluate more than 20000 Boolean gates per second...

  10. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    Science.gov (United States)

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  11. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  12. Preventive evidence into practice (PEP study: implementation of guidelines to prevent primary vascular disease in general practice protocol for a cluster randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Harris Mark F

    2013-01-01

    Full Text Available Abstract Background There are significant gaps in the implementation and uptake of evidence-based guideline recommendations for cardiovascular disease (CVD and diabetes in Australian general practice. This study protocol describes the methodology for a cluster randomised trial to evaluate the effectiveness of a model that aims to improve the implementation of these guidelines in Australian general practice developed by a collaboration between researchers, non-government organisations, and the profession. Methods We hypothesise that the intervention will alter the behaviour of clinicians and patients resulting in improvements of recording of lifestyle and physiological risk factors (by 20% and increased adherence to guideline recommendations for: the management of CVD and diabetes risk factors (by 20%; and lifestyle and physiological risk factors of patients at risk (by 5%. Thirty-two general practices will be randomised in a 1:1 allocation to receive either the intervention or continue with usual care, after stratification by state. The intervention will be delivered through: small group education; audit of patient records to determine preventive care; and practice facilitation visits adapted to the needs of the practices. Outcome data will be extracted from electronic medical records and patient questionnaires, and qualitative evaluation from provider and patient interviews. Discussion We plan to disseminate study findings widely and directly inform implementation strategies by governments, professional bodies, and non-government organisations including the partner organisations.

  13. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  14. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

    OpenAIRE

    Han, Weiwei

    2012-01-01

    Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s protocol is vulnerable to the replay attack, the password guessing attack and the masquerade attack.

  15. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  16. Application of evidence-based dentistry: from research to clinical periodontal practice.

    Science.gov (United States)

    Kwok, Vivien; Caton, Jack G; Polson, Alan M; Hunter, Paul G

    2012-06-01

    Dentists need to make daily decisions regarding patient care, and these decisions should essentially be scientifically sound. Evidence-based dentistry is meant to empower clinicians to provide the most contemporary treatment. The benefits of applying the evidence-based method in clinical practice include application of the most updated treatment and stronger reasoning to justify the treatment. A vast amount of information is readily accessible with today's digital technology, and a standardized search protocol can be developed to ensure that a literature search is valid, specific and repeatable. It involves developing a preset question (population, intervention, comparison and outcome; PICO) and search protocol. It is usually used academically to perform commissioned reviews, but it can also be applied to answer simple clinical queries. The scientific evidence thus obtained can then be considered along with patient preferences and values, clinical patient circumstances and the practitioner's experience and judgment in order to make the treatment decision. This paper describes how clinicians can incorporate evidence-based methods into patient care and presents a clinical example to illustrate the process. © 2012 John Wiley & Sons A/S.

  17. Living better with dementia: strengths-based social work practice and dementia care.

    Science.gov (United States)

    McGovern, Justine

    2015-01-01

    This article first argues that quality of life is possible despite the onset of dementia in late life. It also demonstrates how core concepts of social work practice, such as family systems theory, the strengths perspective, and use of self, can be applied to practice with dementia-affected persons. In addition, it provides practical suggestions for supporting care partners in nurturing "we-ness", focusing on what remains rather than was is lost, and remaining authentic. When strengths-based social work practice is integrated into dementia care protocols, wellbeing can increase. As a result, the more than 40 million persons worldwide who are affected by dementia do not have to resign themselves to the despair, devastation and inevitable demise of quality of life that dominate perception of the illness.

  18. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Science.gov (United States)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  19. Problematizing the multidisciplinary residency in oncology: a practical teaching protocol from the perspective of nurse residents

    Directory of Open Access Journals (Sweden)

    Myllena Cândida de Melo

    2014-08-01

    Full Text Available Objective: To investigate practical teaching of nurse residents in a multidisciplinary residency in oncology. Method: A qualitative descriptive study grounded in the problematization methodology and its steps, represented by the Maguerez Arch. Data were analyzed using content analysis. Results: Potentiating and limiting elements of the residency guided the design of a practical teaching protocol from the perspective of residents, structured in three stages: Welcoming and ambience; Nursing care for problem situations; and, Evaluation process. Conclusion: Systematization of practical teaching promoted the autonomy of individuals and the approximation of teaching to reality, making residency less strenuous, stressful and distressing.

  20. Accessible protocol for practice classroom about physical and chemical factors that affect the biomembranes integrity

    Directory of Open Access Journals (Sweden)

    Thiago Barros Galvão

    2012-12-01

    Full Text Available The aim of the current work is to review a protocol used in practical classes to demonstrate some factors that affect biomembrane integrity. Sugar-beet fragments were utilized as the experimental model as membrane damage could be visualized by leakage of betacyanins, hydrophilic pigments accumulated in the cell vacuoles. The tests were carried out as discrete experiments utilizing physical agents and chemical products present in the student daily routine. To test the effect of temperature, sugar-beet fragments were submitted to heat, cold or both at different times of exposition. When chemical products were tested, sugar-beet fragments were exposed to organic solvents (common alcohol and acetone or polar and amphipathic substances (disinfectant, detergent, hydrogen peroxide, and sodium hypochlorite. The obtained results were discussed in terms of the capacity of the physical and chemical factors to cause membrane damage. The review of this protocol using reagents that are present in the student daily routine were able to demonstrate clearly the effect of the different tested factors, allowing the utilization of this practical class under limited conditions.

  1. A reliable, practical, and economical protocol for inducing diarrhea and severe dehydration in the neonatal calf.

    Science.gov (United States)

    Walker, P G; Constable, P D; Morin, D E; Drackley, J K; Foreman, J H; Thurmon, J C

    1998-07-01

    Fifteen healthy, colostrum-fed, male dairy calves, aged 2 to 7 d were used in a study to develop a diarrhea protocol for neonatal calves that is reliable, practical, and economical. After instrumentation and recording baseline data, diarrhea and dehydration were induced by administering milk replacer [16.5 mL/kg of body weight (BW), PO], sucrose (2 g/kg in a 20% aqueous solution, p.o.), spironolactone and hydrochlorothiazide (1 mg/kg, PO) every 8 h, and furosemide (2 mg/kg, i.m., q6h). Calves were administered sucrose and diuretic agents for 48 h to induce diarrhea and severe dehydration. Clinical changes after 48 h were severe watery diarrhea, severe depression, and marked dehydration (mean, 14% BW loss). Cardiac output, stroke volume, mean central venous pressure, plasma volume, thiocyanate space, blood pH and bicarbonate concentration, base excess, serum chloride concentration, and fetlock temperature were decreased. Plasma lactate concentration, hematocrit, and serum potassium, creatinine, phosphorus, total protein and albumin concentrations were increased. This non-infectious calf diarrhea protocol has a 100% response rate, while providing a consistent and predictable hypovolemic state with diarrhea that reflects most of the clinicopathologic changes observed in osmotic/maldigestive diarrhea caused by infection with rotavirus, coronavirus or cryptosporidia. Limitations of the protocol, when compared to infectious diarrhea models, include failure to induce a severe metabolic acidosis, absence of hyponatremia, renal instead of enteric loss of chloride, renal as well as enteric loss of free water, absence of profound clinical depression and suspected differences in the morphologic and functional effect on intestinal epithelium. Despite these differences, the sucrose/diuretic protocol should be useful in the initial screening of new treatment modalities for calf diarrhea. To confirm their efficacy, the most effective treatment methods should then be examined in

  2. E-mail security: mail clients must use encrypted protocols

    CERN Multimedia

    2006-01-01

    In the coming weeks, users of mail clients other than Outlook (e.g. Pine, Mozilla, Mac Mail, etc.) may receive an e-mail from Mail-service@cern.ch with instructions to update the security settings of their mail client. The aim of this campaign is to enforce the use of encrypted and authenticated mail protocols in order to prevent the propagation of viruses and protect passwords from theft. As a first step, from 6 June 2006 onwards, access to mail servers from outside CERN will require a securely configured mail client as described in the help page http://cern.ch/mmmservices/Help/?kbid=191040. On this page most users will also find tools that will update their mail client settings automatically. Note that Outlook clients and WebMail access are not affected. The Mail Team

  3. Development of a diagnostic protocol for dizziness in elderly patients in general practice: a Delphi procedure.

    NARCIS (Netherlands)

    Maarsingh, O.R.; Dros, J.; Weert, H.C. van; Schellevis, F.G.; Bindels, P.J.; Horst, H.E. van der

    2009-01-01

    BACKGROUND: Dizziness in general practice is very common, especially in elderly patients. The empirical evidence for diagnostic tests in the evaluation of dizziness is scarce. Aim of our study was to determine which set of diagnostic tests should be part of a diagnostic protocol for evaluating

  4. Redesigning a large school-based clinical trial in response to changes in community practice

    Science.gov (United States)

    Gerald, Lynn B; Gerald, Joe K; McClure, Leslie A; Harrington, Kathy; Erwin, Sue; Bailey, William C

    2011-01-01

    Background Asthma exacerbations are seasonal with the greatest risk in elementary-age students occurring shortly after returning to school following summer break. Recent research suggests that this seasonality in children is primarily related to viral respiratory tract infections. Regular hand washing is the most effective method to prevent the spread of viral respiratory infections; unfortunately, achieving hand washing recommendations in schools is difficult. Therefore, we designed a study to evaluate the effect of hand sanitizer use in elementary schools on exacerbations among children with asthma. Purpose To describe the process of redesigning the trial in response to changes in the safety profile of the hand sanitizer as well as changes in hand hygiene practice in the schools. Methods The original trial was a randomized, longitudinal, subject-blinded, placebo-controlled, community-based crossover trial. The primary aim was to evaluate the incremental effectiveness of hand sanitizer use in addition to usual hand hygiene practices to decrease asthma exacerbations in elementary-age children. Three events occurred that required major modifications to the original study protocol: (1) safety concerns arose regarding the hand sanitizer’s active ingredient; (2) no substitute placebo hand sanitizer was available; and (3) community preferences changed regarding hand hygiene practices in the schools. Results The revised protocol is a randomized, longitudinal, community-based crossover trial. The primary aim is to evaluate the incremental effectiveness of a two-step hand hygiene process (hand hygiene education plus institutionally provided alcohol-based hand sanitizer) versus usual care to decrease asthma exacerbations. Enrollment was completed in May 2009 with 527 students from 30 schools. The intervention began in August 2009 and will continue through May 2011. Study results should be available at the end of 2011. Limitations The changed design does not allow us to

  5. Interactive eLearning - a safe place to practice.

    Science.gov (United States)

    Einarson, Elisabeth; Moen, Anne; Kolberg, Ragnhild; Flingtorp, Gry; Linnerud, Eva

    2009-01-01

    Interactive web-based learning environment offers refreshing opportunities to create innovative solutions to explore and exploit informatics support on-the-job training. We report from a study where a hospital is created a interactive eLearning resource. The modules are creating a safe place to practice - to be used for introduction to the work and preparation for certification or re-certification of competencies.

  6. The Time Division Multi-Channel Communication Model and the Correlative Protocol Based on Quantum Time Division Multi-Channel Communication

    International Nuclear Information System (INIS)

    Liu Xiao-Hui; Pei Chang-Xing; Nie Min

    2010-01-01

    Based on the classical time division multi-channel communication theory, we present a scheme of quantum time-division multi-channel communication (QTDMC). Moreover, the model of quantum time division switch (QTDS) and correlative protocol of QTDMC are proposed. The quantum bit error rate (QBER) is analyzed and the QBER simulation test is performed. The scheme shows that the QTDS can carry out multi-user communication through quantum channel, the QBER can also reach the reliability requirement of communication, and the protocol of QTDMC has high practicability and transplantable. The scheme of QTDS may play an important role in the establishment of quantum communication in a large scale in the future. (general)

  7. Security of modified Ping-Pong protocol in noisy and lossy channel.

    Science.gov (United States)

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  8. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    Science.gov (United States)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  9. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed

    2012-04-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network\\'s transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  10. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network's transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  11. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2018-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another chal- lenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin...

  12. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2016-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another challenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin i...

  13. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  14. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  15. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    International Nuclear Information System (INIS)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols—HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. (general)

  16. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  17. Study protocol for a pragmatic randomised controlled trial evaluating efficacy of a smoking cessation e-'Tabac Info Service': ee-TIS trial.

    Science.gov (United States)

    Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F

    2017-02-24

    A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. NCT02841683; Pre-results. Published by the BMJ Publishing Group Limited. For

  18. Prakriti-based research: Good reporting practices.

    Science.gov (United States)

    Bhalerao, Supriya; Patwardhan, Kishor

    2016-03-01

    The recent advances in the fields of genomics, personalized medicine, and Ayurveda have motivated many researchers to look at the relationship between Prakriti (phenotype-based Ayurveda constitution) and various objective biological parameters. As a result, a number of studies reporting such a relationship have made their way into mainstream scholarly journals. However, when it comes to the protocols that these workers follow to identify one's Prakriti, there are several issues that are yet to be resolved. In this communication, we propose a few reporting practices that such workers are required to be encouraged to follow, while submitting their work on Prakriti to scholarly journals. We have arranged this proposal under the following domains that may serve as a preliminary checklist in this context: The textual references, validation process, assessment of characters, scoring pattern, weightage assignment, criterion for expressing the final Prakriti type, and a need to publish the complete Prakriti-determination tool. We advocate that only if the workers in the field adhere to these good reporting practices, one will be able to draw meaningful, generalizable, and applicable interpretations out of such studies. We also suggest that the editors of relevant scholarly journals may recommend these reporting practices while considering such reports for publication. Copyright © 2016 Transdisciplinary University, Bangalore and World Ayurveda Foundation. Published by Elsevier B.V. All rights reserved.

  19. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    International Nuclear Information System (INIS)

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-01-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution

  20. Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

    Directory of Open Access Journals (Sweden)

    Faisal Waheed

    2018-07-01

    Full Text Available Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System. Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS, attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step

  1. Invariant-based reasoning about parameterized security protocols

    NARCIS (Netherlands)

    Mooij, A.J.

    2010-01-01

    We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that

  2. ER-E2 regulation. Implementation of the national protocol for quality control of instrumentation in nuclear medicine

    International Nuclear Information System (INIS)

    2015-01-01

    The purpose of this regulation is the adoption and enforcement of the 'Protocol National Quality Control Instrumentation in Nuclear Medicine'; as well as the establishment of an annual program of external audits, which take place on CCEEM, in order to verify compliance with the established considerations into protocols. It is applicable to all entities within the NHS who perform the practice of nuclear medicine in Cuba, both for use 'in vitro' and 'in vivo'.

  3. Implementing exercise in cancer care: study protocol to evaluate a community-based exercise program for people with cancer

    OpenAIRE

    Cormie, Prue; Lamb, Stephanie; Newton, Robert U.; Valentine, Lani; McKiernan, Sandy; Spry, Nigel; Joseph, David; Taaffe, Dennis R.; Doran, Christopher M.; Galv?o, Daniel A.

    2017-01-01

    Background Clinical research has established the efficacy of exercise in reducing treatment-related side-effects and increasing wellbeing in people with cancer. Major oncology organisations have identified the importance of incorporating exercise in comprehensive cancer care but information regarding effective approaches to translating evidence into practice is lacking. This paper describes the implementation of a community-based exercise program for people with cancer and the protocol for pr...

  4. Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite

    Science.gov (United States)

    2017-07-01

    requirements. 22.2 Network Access Layer 22.2.1 Physical Layer Connectors and cable media should meet the electrical or optical properties required by the...Telemetry Standards, IRIG Standard 106-17 Chapter 22, July 2017 i CHAPTER 22 Network -Based Protocol Suite Acronyms...iii Chapter 22. Network -Based Protocol Suite

  5. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  6. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures.

    Science.gov (United States)

    Renggaman, Anriansyah; Choi, Hong L; Sudiarto, Sartika Ia; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assurance Program (applicable in the United States), that mostly focuses on management- and environment-based measures. In certain cases, however, animal-based measures might not be adequate for properly assessing pig welfare status. Similarly, welfare assessment that relies only on environment- and management-based measures might not represent the actual welfare status of pigs. Therefore, the objective of this paper was to develop a new welfare protocol by integrating animal-, environment-, and management-based measures. The background for selection of certain welfare criteria and modification of the scoring systems from existing welfare assessment protocols are described. The developed pig welfare assessment protocol consists of 17 criteria that are related to four main principles of welfare (good feeding, good housing, good health, and appropriate behavior). Good feeding, good housing, and good health were assessed using a 3-point scale: 0 (good welfare), 1 (moderate welfare), and 2 (poor welfare). In certain cases, only a 2-point scale was used: 0 (certain condition is present) or 2 (certain condition is absent). Appropriate behavior was assessed by scan sampling of positive and negative social behaviors based on qualitative behavior assessment and human-animal relationship tests. Modification of the body condition score into a 3-point scale revealed pigs with a moderate body condition (score 1). Moreover, additional criteria such as feed quality confirmed that farms had moderate (score 1) or poor feed quality (score 2), especially those farms located in a high relative humidity region. The developed protocol can be

  7. eLearning Hands-On: Blending Interactive eLearning with Practical Engineering Laboratory

    Science.gov (United States)

    Kiravu, Cheddi; Yanev, Kamen M.; Tunde, Moses O.; Jeffrey, Anna M.; Schoenian, Dirk; Renner, Ansel

    2016-01-01

    Purpose: Integrating laboratory work into interactive engineering eLearning contents augments theory with practice while simultaneously ameliorating the apparent theory-practice gap in traditional eLearning. The purpose of this paper is to assess and recommend media that currently fulfil this desirable dual pedagogical goal.…

  8. The Project Based Mechanisms of the Kyoto Protocol. Credible Instruments or Challenges to the Integrity of the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Takeuchi Waldegren, Linn

    2006-03-15

    The project based mechanisms of the Kyoto Protocol are innovative instruments which allow projects to earn credits for reducing greenhouse gas (GHG) emissions. The credits can in turn be used by countries to reach their emissions targets according to the Kyoto Protocol. The Project based mechanisms are known as the Clean Development Mechanism (CDM) and the Joint Implementation (JI). If the project based mechanisms are to be effective policy instruments they must ensure the integrity of the Kyoto Protocol, and their ability to promote and prove real emission reductions is critical. The environmental credibility of the project based mechanisms will also ensure their ability to promote cost effectiveness. Key concepts in this context are environmental and project additionality, and their role and value for the project based mechanisms are analyzed. Environmental additionality is established by comparing a project's emissions to a baseline. The baseline's credibility is thus vital. The concept of project additionality is somewhat controversial, but is nonetheless of equal importance. The case studies of CDM approved methodologies (AMs) and proposed projects suggest that there are credibility issues that need to be addressed if the project based mechanisms are to promote real emissions reductions.

  9. Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment

    Directory of Open Access Journals (Sweden)

    Byunggil Lee

    2014-01-01

    Full Text Available International Association of Lighthouse Authorities (IALA is developing the standard intersystem VTS exchange format (IVEF protocol for exchange of navigation and vessel information between VTS systems and between VTS and vessels. VTS (vessel traffic system is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (inter-VTS data exchange format for inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA does not include any highly trusted certification technology for the connectors. The output of standardization is distributed as the IALA recommendation V-145, and the protocol is implemented with an open source. The IVEF open source, however, is the code used to check the functions of standard protocols. It is too slow to be used in the field and requires a large memory. And the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this paper suggests the authentication protocol to increase the security of the VTS systems using the main certification server and IVEF.

  10. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  11. Realization of Intelligent Household Appliance Wireless Monitoring Network Based on LEACH Protocol

    Directory of Open Access Journals (Sweden)

    Weilong ZHOU

    2014-06-01

    Full Text Available The intelligent household appliance wireless monitoring network can real-time monitor the apparent power and power factor of various household appliances in different indoor regions, and can realize the real-time monitoring on the household appliance working status and performance. The household appliance wireless monitoring network based on LEACH protocol is designed in the paper. Firstly, the basic idea of LEACH routing algorithm is proposed. Aiming at the node-distribution feature of intelligent home, the selection of cluster head in the routing algorithm and the data transmission method at the stable communication phase is modified. Moreover, the hardware circuit of power acquisition and power factor measurement is designed. The realization of wireless monitoring network based on CC2530 is described, each module and the whole system were conducted the on-line debugging. Finally, the system is proved to meet the practical requirement through the networking test.

  12. Is Reading Instruction Evidence-Based? Analyzing Teaching Practices Using T-Patterns.

    Science.gov (United States)

    Suárez, Natalia; Sánchez, Carmen R; Jiménez, Juan E; Anguera, M Teresa

    2018-01-01

    The main goal of this study was to analyze whether primary teachers use evidence-based reading instruction for primary-grade readers. The study sample consisted of six teachers whose teaching was recorded. The observation instrument used was developed ad hoc for this study. The recording instrument used was Match Vision Studio. The data analysis was performed using SAS, GT version 2.0 E, and THEME. The results indicated that the teaching practices used most frequently and for the longest duration were: feedback (i.e., correcting the student when reading); fluency (i.e., individual and group reading, both out loud and silently, with and without intonation); literal or inference comprehension exercises (i.e., summarizing, asking questions); and use of educational resources (i.e., stories, songs, poems). Later, we conducted analyses of T-Patterns that showed the sequence of instruction in detail. We can conclude that practices used by the majority of teachers were based on the recommendations of the National Reading Panel (NRP). Only one teacher followed best practices. The same was the case for instructional time spent on the five essential components of reading, with the exception of teacher E., who dedicated 70.31% of class time implementing best practices. Teaching practices (i.e., learners' activities) designed and implemented to exercise and master alphabetic knowledge and phonological awareness skills were used less frequently in the classroom.

  13. Can E-learning change work practices?

    DEFF Research Database (Denmark)

    Noesgaard, Signe Schack

    2016-01-01

    Stand-alone e-learning is unlikely to change work practices. This claim contrasts with a comprehensive body of research arguing that e-learning is at least as effective as face-to-face instruction in improving work performance. Such a comparison is, however, problematic. On the one hand, it relies...... on the premise that face-to-face instruction is effective in changing work behaviors. This article argues that instruction—whether e-learning, face-to-face, or a blend of both—cannot stand alone. Individualized on-the-job scaffolding of employees is needed for meaningful learning transfer and sustainable...... behavior change to occur. On the other hand, e-learning can be as important as face-to-face instruction in preparing the ground for advancing work practices, when e-learning is designed in acknowledgement of its strength and limitations. In outlining the above arguments, this article contributes a four...

  14. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  15. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  16. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  17. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  18. Computer-assisted machine-to-human protocols for authentication of a RAM-based embedded system

    Science.gov (United States)

    Idrissa, Abdourhamane; Aubert, Alain; Fournel, Thierry

    2012-06-01

    Mobile readers used for optical identification of manufactured products can be tampered in different ways: with hardware Trojan or by powering up with fake configuration data. How a human verifier can authenticate the reader to be handled for goods verification? In this paper, two cryptographic protocols are proposed to achieve the verification of a RAM-based system through a trusted auxiliary machine. Such a system is assumed to be composed of a RAM memory and a secure block (in practice a FPGA or a configurable microcontroller). The system is connected to an input/output interface and contains a Non Volatile Memory where the configuration data are stored. Here, except the secure block, all the blocks are exposed to attacks. At the registration stage of the first protocol, the MAC of both the secret and the configuration data, denoted M0 is computed by the mobile device without saving it then transmitted to the user in a secure environment. At the verification stage, the reader which is challenged with nonces sendsMACs / HMACs of both nonces and MAC M0 (to be recomputed), keyed with the secret. These responses are verified by the user through a trusted auxiliary MAC computer unit. Here the verifier does not need to tract a (long) list of challenge / response pairs. This makes the protocol tractable for a human verifier as its participation in the authentication process is increased. In counterpart the secret has to be shared with the auxiliary unit. This constraint is relaxed in a second protocol directly derived from Fiat-Shamir's scheme.

  19. A New QKD Protocol Based upon Authentication by EPR Entanglement State

    Science.gov (United States)

    Abushgra, Abdulbast A.

    Cryptographic world has faced multiple challenges that are included in encoding and decoding transmitting information into a secure communication channel. Quantum cryptography may be another generation of the cryptography world, which is based on the law of physics. After decades of using the classical cryptography, there is an essential need to move a step forward through the most trusted systems, especially enormous amount of data flows through billions of communicating channels (e.g. The internet), and keeping this transmitting information away from eavesdropping is obligatory. Moreover, quantum cryptography has proved its standing against many weaknesses in the classical cryptography. One of these weaknesses is the ability to copy any type of information using a passive attack without an interruption, which is impossible in the quantum system. Theoretically, several quantum observables are utilized to diagnose an action of one particle. These observables are included in measuring mass, movement, speed, etc. The polarization of one photon occurs normally and randomly in the space. Any interruption that happens during sending of a light will cause a deconstruction of the light polarization. Therefore, particles' movement in a three-dimensional space is supported by Non-Cloning theory that makes eavesdroppers unable to interrupt a communication system. In case an eavesdropper tried to interrupt a photon, the photon will be destroyed after passing the photon into a quantum detector or any measurement device. In the last decades, many Quantum Key Distribution (QKD) protocols have been created to initiate a secret key during encoding and decoding transmitted data operations. Some of these protocols were proven un-secure based on the quantum attacks that were released early. Even though the power of physics is still active and the Non-Cloning theory is unbroken, some QKD protocols failed during the security measurements. The main reason of the failure is based on the

  20. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  1. Developing experimental protocols for chronic irradiation studies: the application of a good practice guide framework

    International Nuclear Information System (INIS)

    Wood, M.D.; Knowles, J.D.; Whittaker, J.H.; Copplestone, D.; Malcolm, H.M.; Bielby, S.; Zinger, I.

    2004-01-01

    The EC-funded FASSET (Framework for Assessment of Environmental Impact) project collated information on the transfer, dosimetry, and effects of ionising radiation on wildlife. A major output from the project is the FASSET Radiation Effects Database (FRED). A review of the information contained within FRED highlighted that information on the effects of low-dose, chronic exposure was, at best, fragmentary. However, these data are required to define the dose effect relationships needed to underpin the assessment tools that are being developed. To address this requirement, a series of four Good Practice Guides (GPGs) has been produced as part of a protocol development framework. This framework aims to harmonise experimental approaches, with a view to ensuring that all necessary data on appropriate endpoints are collected, so that dose effect relationships can be determined. The GPGs cover test species selection, endpoint selection, radiation exposure and experimental design considerations. A key is used to guide researchers through the GPGs and the decisions made are recorded on an output pro-forma. The completed pro-forma forms the basis of the experimental protocol. The pro-forma also indicates the information that should be included when presenting the results of the experiment. Standardising approaches ensures that results are comparable between experiments and that they are suitable for determining dose effect relationships. This protocol development framework has been adopted by the UK Environment Agency as a document upon which future Agency-funded experimental work on the effects of chronic, low-level exposure to ionising radiation will be based. It is hoped that the framework will gain acceptance in the wider scientific community and facilitate addressing the knowledge gaps that have been identified in order that successful protection of non-human biota can be demonstrated. (author)

  2. Developing an Anti-Xa-Based Anticoagulation Protocol for Patients with Percutaneous Ventricular Assist Devices.

    Science.gov (United States)

    Sieg, Adam; Mardis, B Andrew; Mardis, Caitlin R; Huber, Michelle R; New, James P; Meadows, Holly B; Cook, Jennifer L; Toole, J Matthew; Uber, Walter E

    2015-01-01

    Because of the complexities associated with anticoagulation in temporary percutaneous ventricular assist device (pVAD) recipients, a lack of standardization exists in their management. This retrospective analysis evaluates current anticoagulation practices at a single center with the aim of identifying an optimal anticoagulation strategy and protocol. Patients were divided into two cohorts based on pVAD implanted (CentriMag (Thoratec; Pleasanton, CA) / TandemHeart (CardiacAssist; Pittsburgh, PA) or Impella (Abiomed, Danvers, MA)), with each group individually analyzed for bleeding and thrombotic complications. Patients in the CentriMag/TandemHeart cohort were subdivided based on the anticoagulation monitoring strategy (activated partial thromboplastin time (aPTT) or antifactor Xa unfractionated heparin (anti-Xa) values). In the CentriMag/TandemHeart cohort, there were five patients with anticoagulation titrated based on anti-Xa values; one patient developed a device thrombosis and a major bleed, whereas another patient experienced major bleeding. Eight patients received an Impella pVAD. Seven total major bleeds in three patients and no thrombotic events were detected. Based on distinct differences between the devices, anti-Xa values, and outcomes, two protocols were created to guide anticoagulation adjustments. However, anticoagulation in patients who require pVAD support is complex with constantly evolving anticoagulation goals. The ideal level of anticoagulation should be individually determined using several coagulation laboratory parameters in concert with hemodynamic changes in the patient's clinical status, the device, and the device cannulation.

  3. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus.

    Science.gov (United States)

    Ribeiro, Christie Graf; Moreira, Ana Tereza Ramos; Pinto, José Simão DE Paula; Malafaia, Osvaldo

    2016-01-01

    to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) computerization of this theoretical ophthalmologic database using SINPE(c) and (3) interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties. criar uma base eletrônica de dados em oftalmologia com ênfase em estrabismo através da coleta padronizada de informações. Informatizar esta base sob a forma de software para a coleta sistemática de dados chamado "Protocolo Eletrônico" e incorporar este

  4. Effects of psychological therapies in randomized trials and practice-based studies.

    Science.gov (United States)

    Barkham, Michael; Stiles, William B; Connell, Janice; Twigg, Elspeth; Leach, Chris; Lucock, Mike; Mellor-Clark, John; Bower, Peter; King, Michael; Shapiro, David A; Hardy, Gillian E; Greenberg, Leslie; Angus, Lynne

    2008-11-01

    Randomized trials of the effects of psychological therapies seek internal validity via homogeneous samples and standardized treatment protocols. In contrast, practice-based studies aim for clinical realism and external validity via heterogeneous samples of clients treated under routine practice conditions. We compared indices of treatment effects in these two types of studies. Using published transformation formulas, the Beck Depression Inventory (BDI) scores from five randomized trials of depression (N = 477 clients) were transformed into Clinical Outcomes in Routine Evaluation-Outcome Measure (CORE-OM) scores and compared with CORE-OM data collected in four practice-based studies (N = 4,196 clients). Conversely, the practice-based studies' CORE-OM scores were transformed into BDI scores and compared with randomized trial data. Randomized trials showed a modest advantage over practice-based studies in amount of pre-post improvement. This difference was compressed or exaggerated depending on the direction of the transformation but averaged about 12%. There was a similarly sized advantage to randomized trials in rates of reliable and clinically significant improvement (RCSI). The largest difference was yielded by comparisons of effect sizes which suggested an advantage more than twice as large, reflecting narrower pre-treatment distributions in the randomized trials. Outcomes of completed treatments for depression in randomized trials appeared to be modestly greater than those in routine care settings. The size of the difference may be distorted depending on the method for calculating degree of change. Transforming BDI scores into CORE-OM scores and vice versa may be a preferable alternative to effect sizes for comparisons of studies using these measures.

  5. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  6. Is Reading Instruction Evidence-Based? Analyzing Teaching Practices Using T-Patterns

    Directory of Open Access Journals (Sweden)

    Natalia Suárez

    2018-02-01

    Full Text Available The main goal of this study was to analyze whether primary teachers use evidence-based reading instruction for primary-grade readers. The study sample consisted of six teachers whose teaching was recorded. The observation instrument used was developed ad hoc for this study. The recording instrument used was Match Vision Studio. The data analysis was performed using SAS, GT version 2.0 E, and THEME. The results indicated that the teaching practices used most frequently and for the longest duration were: feedback (i.e., correcting the student when reading; fluency (i.e., individual and group reading, both out loud and silently, with and without intonation; literal or inference comprehension exercises (i.e., summarizing, asking questions; and use of educational resources (i.e., stories, songs, poems. Later, we conducted analyses of T-Patterns that showed the sequence of instruction in detail. We can conclude that <50% of the teaching practices used by the majority of teachers were based on the recommendations of the National Reading Panel (NRP. Only one teacher followed best practices. The same was the case for instructional time spent on the five essential components of reading, with the exception of teacher E., who dedicated 70.31% of class time implementing best practices. Teaching practices (i.e., learners' activities designed and implemented to exercise and master alphabetic knowledge and phonological awareness skills were used less frequently in the classroom.

  7. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  8. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  9. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  10. A methodological protocol for selecting and quantifying low-value prescribing practices in routinely collected data: an Australian case study.

    Science.gov (United States)

    Brett, Jonathan; Elshaug, Adam G; Bhatia, R Sacha; Chalmers, Kelsey; Badgery-Parker, Tim; Pearson, Sallie-Anne

    2017-05-03

    Growing imperatives for safety, quality and responsible resource allocation have prompted renewed efforts to identify and quantify harmful or wasteful (low-value) medical practices such as test ordering, procedures and prescribing. Quantifying these practices at a population level using routinely collected health data allows us to understand the scale of low-value medical practices, measure practice change following specific interventions and prioritise policy decisions. To date, almost all research examining health care through the low-value lens has focused on medical services (tests and procedures) rather than on prescribing. The protocol described herein outlines a program of research funded by Australia's National Health and Medical Research Council to select and quantify low-value prescribing practices within Australian routinely collected health data. We start by describing our process for identifying and cataloguing international low-value prescribing practices. We then outline our approach to translate these prescribing practices into indicators that can be applied to Australian routinely collected health data. Next, we detail methods of using Australian health data to quantify these prescribing practices (e.g. prevalence of low-value prescribing and related costs) and their downstream health consequences. We have approval from the necessary Australian state and commonwealth human research ethics and data access committees to undertake this work. The lack of systematic and transparent approaches to quantification of low-value practices in routinely collected data has been noted in recent reviews. Here, we present a methodology applied in the Australian context with the aim of demonstrating principles that can be applied across jurisdictions in order to harmonise international efforts to measure low-value prescribing. The outcomes of this research will be submitted to international peer-reviewed journals. Results will also be presented at national and

  11. MO-E-18A-01: Imaging: Best Practices In Pediatric Imaging

    International Nuclear Information System (INIS)

    Willis, C; Strauss, K; MacDougall, R; Sammet, C

    2014-01-01

    This imaging educational program will focus on solutions to common pediatric imaging challenges. The speakers will present collective knowledge on best practices in pediatric imaging from their experience at dedicated children's hospitals. Areas of focus will include general radiography, the use of manual and automatic dose management in computed tomography, and enterprise-wide radiation dose management in the pediatric practice. The educational program will begin with a discussion of the complexities of exposure factor control in pediatric projection radiography. Following this introduction will be two lectures addressing the challenges of computed tomography (CT) protocol optimization in the pediatric population. The first will address manual CT protocol design in order to establish a managed radiation dose for any pediatric exam on any CT scanner. The second CT lecture will focus on the intricacies of automatic dose modulation in pediatric imaging with an emphasis on getting reliable results in algorithmbased technique selection. The fourth and final lecture will address the key elements needed to developing a comprehensive radiation dose management program for the pediatric environment with particular attention paid to new regulations and obligations of practicing medical physicists. Learning Objectives: To understand how general radiographic techniques can be optimized using exposure indices in order to improve pediatric radiography. To learn how to establish diagnostic dose reference levels for pediatric patients as a function of the type of examination, patient size, and individual design characteristics of the CT scanner. To learn how to predict the patient's radiation dose prior to the exam and manually adjust technique factors if necessary to match the patient's dose to the department's established dose reference levels. To learn how to utilize manufacturer-provided automatic dose modulation technology to consistently achieve patient

  12. MO-E-18A-01: Imaging: Best Practices In Pediatric Imaging

    Energy Technology Data Exchange (ETDEWEB)

    Willis, C; Strauss, K; MacDougall, R; Sammet, C [MD Anderson Cancer Center, Bellaire, TX (United States)

    2014-06-15

    This imaging educational program will focus on solutions to common pediatric imaging challenges. The speakers will present collective knowledge on best practices in pediatric imaging from their experience at dedicated children's hospitals. Areas of focus will include general radiography, the use of manual and automatic dose management in computed tomography, and enterprise-wide radiation dose management in the pediatric practice. The educational program will begin with a discussion of the complexities of exposure factor control in pediatric projection radiography. Following this introduction will be two lectures addressing the challenges of computed tomography (CT) protocol optimization in the pediatric population. The first will address manual CT protocol design in order to establish a managed radiation dose for any pediatric exam on any CT scanner. The second CT lecture will focus on the intricacies of automatic dose modulation in pediatric imaging with an emphasis on getting reliable results in algorithmbased technique selection. The fourth and final lecture will address the key elements needed to developing a comprehensive radiation dose management program for the pediatric environment with particular attention paid to new regulations and obligations of practicing medical physicists. Learning Objectives: To understand how general radiographic techniques can be optimized using exposure indices in order to improve pediatric radiography. To learn how to establish diagnostic dose reference levels for pediatric patients as a function of the type of examination, patient size, and individual design characteristics of the CT scanner. To learn how to predict the patient's radiation dose prior to the exam and manually adjust technique factors if necessary to match the patient's dose to the department's established dose reference levels. To learn how to utilize manufacturer-provided automatic dose modulation technology to consistently achieve patient

  13. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  14. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  15. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo...

  16. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    Science.gov (United States)

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2017-11-01

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  17. Efficient production of isotopically labeled proteins by cell-free synthesis: A practical protocol

    Energy Technology Data Exchange (ETDEWEB)

    Torizawa, Takuya; Shimizu, Masato [Crest, Jst (Japan); Taoka, Masato [Tokyo Metropolitan University, Graduate School of Science (Japan); Miyano, Hiroshi [Ajinomoto Co., Inc. Institute of Life Sciences (Japan); Kainosho, Masatsune [Crest, Jst (Japan)], E-mail: kainosho@nmr.chem.metro-u.ac.jp

    2004-11-15

    We provide detailed descriptions of our refined protocols for the cell-free production of labeled protein samples for NMR spectroscopy. These methods are efficient and overcome two critical problems associated with the use of conventional Escherichia coli extract systems. Endogenous amino acids normally present in E. coli S30 extracts dilute the added labeled amino acids and degrade the quality of NMR spectra of the target protein. This problem was solved by altering the protocol used in preparing the S30 extract so as to minimize the content of endogenous amino acids. The second problem encountered in conventional E. coli cell-free protein production is non-uniformity in the N-terminus of the target protein, which can complicate the NMR spectra. This problem was solved by adding a DNA sequence to the construct that codes for a cleavable N-terminal peptide tag. Addition of the tag serves to increase the yield of the protein as well as to ensure a homogeneous protein product following tag cleavage. We illustrate the method by describing its stepwise application to the production of calmodulin samples with different stable isotope labeling patterns for NMR analysis.

  18. Efficient production of isotopically labeled proteins by cell-free synthesis: A practical protocol

    International Nuclear Information System (INIS)

    Torizawa, Takuya; Shimizu, Masato; Taoka, Masato; Miyano, Hiroshi; Kainosho, Masatsune

    2004-01-01

    We provide detailed descriptions of our refined protocols for the cell-free production of labeled protein samples for NMR spectroscopy. These methods are efficient and overcome two critical problems associated with the use of conventional Escherichia coli extract systems. Endogenous amino acids normally present in E. coli S30 extracts dilute the added labeled amino acids and degrade the quality of NMR spectra of the target protein. This problem was solved by altering the protocol used in preparing the S30 extract so as to minimize the content of endogenous amino acids. The second problem encountered in conventional E. coli cell-free protein production is non-uniformity in the N-terminus of the target protein, which can complicate the NMR spectra. This problem was solved by adding a DNA sequence to the construct that codes for a cleavable N-terminal peptide tag. Addition of the tag serves to increase the yield of the protein as well as to ensure a homogeneous protein product following tag cleavage. We illustrate the method by describing its stepwise application to the production of calmodulin samples with different stable isotope labeling patterns for NMR analysis

  19. A Novel UDT-Based Transfer Speed-Up Protocol for Fog Computing

    Directory of Open Access Journals (Sweden)

    Zhijie Han

    2018-01-01

    Full Text Available Fog computing is a distributed computing model as the middle layer between the cloud data center and the IoT device/sensor. It provides computing, network, and storage devices so that cloud based services can be closer to IOT devices and sensors. Cloud computing requires a lot of bandwidth, and the bandwidth of the wireless network is limited. In contrast, the amount of bandwidth required for “fog computing” is much less. In this paper, we improved a new protocol Peer Assistant UDT-Based Data Transfer Protocol (PaUDT, applied to Iot-Cloud computing. Furthermore, we compared the efficiency of the congestion control algorithm of UDT with the Adobe’s Secure Real-Time Media Flow Protocol (RTMFP, based on UDP completely at the transport layer. At last, we built an evaluation model of UDT in RTT and bit error ratio which describes the performance. The theoretical analysis and experiment result have shown that UDT has good performance in IoT-Cloud computing.

  20. A multi-institutional study of the perceived barriers and facilitators to implementing evidence-based practice.

    Science.gov (United States)

    Duncombe, Daphne C

    2018-03-01

    To examine perceived barriers and facilitators to implementing evidence-based practice among nurses working in psychiatric, geriatric, hospital and community settings in The Bahamas. It is evident from previous studies that a number of factors exist which either obstruct or promote the utilisation of research evidence in nursing practice. Identifying these factors is vital to the successful uptake of evidence-based practice in nursing. Descriptive, comparative study. Data were collected using self-administered questionnaires. A stratified random sample (n = 100) of registered nurses participated; 5-point Likert-like scales were used to examine nurses' perceptions of barriers and facilitators of evidence-based practice. Descriptive statistics were used to describe demographic characteristics and to compare responses of nurses. Participants were predominantly female (98.4%), in the 25 to implement evidence-based practice previously. The greatest barriers identified were as follows: "Inadequate resources for implementing research findings" (85.2%; n = 52) and "Inadequate training in research methods" (83.6%; n = 51). The top facilitators identified were as follows: "Training in research methods" (88.5%; n = 54) and "Organisational policies and protocols that are evidence-based" (86.9%; n = 53). Nurses generally expressed that they required additional training in research and evidence-based practice concepts. Although some nurses had a desire to implement evidence-based practice to provide quality care and improve patient outcomes, many expressed that they lacked the required resources. The study draws attention to the need for prioritisation of evidence-based practice both at institutional and governmental levels. Successful adoption of evidence-based practice implies combined efforts of nurses, healthcare providers and policymakers. Further research is needed to determine the best method for successfully incorporating evidence-based practice into nursing

  1. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  2. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  3. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kashif Saleem

    2016-03-01

    Full Text Available The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP involves an artificial immune system (AIS that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2 and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  4. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  5. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  6. Virtual communities of practice in web-based second language learning

    DEFF Research Database (Denmark)

    Petersen, Karen Bjerg

    2013-01-01

    in communities of practice and of situated and collaborative learning have deeply inspired educators and teachers and, to a certain degree, become the theoretical and practical framework for developing web-based learning platforms, while findings from this research indicate that students perceive e...

  7. Obstacles to Successful Implementation of eHealth Applications into Clinical Practice.

    Science.gov (United States)

    Voogt, Marianne P; Opmeer, Brent C; Kastelein, Arnoud W; Jaspers, Monique W M; Peute, Linda W

    2018-01-01

    eHealth can improve healthcare worldwide, and scientific research should provide evidence on the efficacy, safety and added value of such interventions. For successful implementation of eHealth interventions into clinical practice, barriers need to be anticipated. We identified seven barriers by interviewing health professionals in the Dutch healthcare system. These barriers covered three topics: financing, human factors and organizational factors. This paper discusses their potential impact on eHealth uptake. Bridging the gap between studies to assess effective eHealth interventions and their value-based implementation in healthcare is much needed.

  8. Practical quantum private query with better performance in resisting joint-measurement attack

    Science.gov (United States)

    Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei

    2016-04-01

    As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.

  9. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    Science.gov (United States)

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  10. eMedOffice: A web-based collaborative serious game for teaching optimal design of a medical practice

    Directory of Open Access Journals (Sweden)

    Hannig Andreas

    2012-10-01

    Full Text Available Abstract Background Preparing medical students for the takeover or the start-up of a medical practice is an important challenge in Germany today. Therefore, this paper presents a computer-aided serious game (eMedOffice developed and currently in use at the RWTH Aachen University Medical School. The game is part of the attempt to teach medical students the organizational and conceptual basics of the medical practice of a general practitioner in a problem-based learning environment. This paper introduces methods and concepts used to develop the serious game and describes the results of an evaluation of the game's application in curricular courses at the Medical School. Results Results of the conducted evaluation gave evidence of a positive learning effect of the serious game. Educational supervisors observed strong collaboration among the players inspired by the competitive gaming aspects. In addition, an increase in willingness to learn and the exploration of new self-invented ideas were observed and valuable proposals for further prospective enhancements were elicited. A statistical analysis of the results of an evaluation provided a clear indication of the positive learning effect of the game. A usability questionnaire survey revealed a very good overall score of 4.07 (5=best, 1=worst. Conclusions We consider web-based, collaborative serious games to be a promising means of improving medical education. The insights gained by the implementation of eMedOffice will promote the future development of more effective serious games for integration into curricular courses of the RWTH Aachen University Medical School.

  11. Pediatric First Aid Practices in Ghana: A Population-Based Survey.

    Science.gov (United States)

    Gyedu, Adam; Mock, Charles; Nakua, Emmanuel; Otupiri, Easmon; Donkor, Peter; Ebel, Beth E

    2015-08-01

    Children in low- and middle-income countries (LMIC) often receive care outside the formal medical sector. Improving pre-hospital first aid has proven to be highly cost-effective in lowering trauma mortality. Few studies in LMIC have examined home first aid practices for injured children. We conducted a representative population-based survey of 200 caregivers of children under 18 years of age, representing 6520 households. Caregivers were interviewed about their first aid practices and care-seeking behaviors when a child sustained an injury at home. Injuries of interest included burns, lacerations, fractures and choking. Reported practices were characterized as recommended, low-risk, and potentially harmful. For common injuries, 75-96% of caregivers reported employing a recommended practice (e.g., running cool water over a burn injury). However, for these same injuries, 13-61% of caregivers also identified potentially harmful management strategies (e.g., applying sand to a laceration). Choking had the highest proportion (96%) of recommended first aid practice: (e.g., hitting the child's back) and the lowest percent (13%) of potentially harmful practices (e.g., attempting manual removal). Fractures had the lowest percent (75%) of recommended practices (e.g., immediately bringing the child to a health facility). Burns had the highest percent (61%) of potentially harmful practices (e.g., applying kerosene). While most caregivers were aware of helpful first aid practices to administer for a child injury, many parents also described potentially harmful practices or delays in seeking medical attention. As parents are the de facto first responders to childhood injury, there are opportunities to strengthen pre-hospital care for children in LMICs.

  12. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  13. Backpressure-based control protocols: design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, Willem R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  14. Backpressure-based control protocols: Design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, W.R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  15. Ballet as a movement-based contemplative practice? Implications for neuroscientific studies

    NARCIS (Netherlands)

    van Vugt, Marieke

    2014-01-01

    There is a rising scientific interest in the neuroscience behind contemplative practices (see e.g., Vago and Silbersweig, 2012 for a review), including movement-based practices such as yoga and tai chi. Given that, it becomes important to ask how such contemplative practices differ from Western

  16. Using an intervention mapping approach to develop a discharge protocol for intensive care patients.

    Science.gov (United States)

    van Mol, Margo; Nijkamp, Marjan; Markham, Christine; Ista, Erwin

    2017-12-19

    Admission into an intensive care unit (ICU) may result in long-term physical, cognitive, and emotional consequences for patients and their relatives. The care of the critically ill patient does not end upon ICU discharge; therefore, integrated and ongoing care during and after transition to the follow-up ward is pivotal. This study described the development of an intervention that responds to this need. Intervention Mapping (IM), a six-step theory- and evidence-based approach, was used to guide intervention development. The first step, a problem analysis, comprised a literature review, six semi-structured telephone interviews with former ICU-patients and their relatives, and seven qualitative roundtable meetings for all eligible nurses (i.e., 135 specialized and 105 general ward nurses). Performance and change objectives were formulated in step two. In step three, theory-based methods and practical applications were selected and directed at the desired behaviors and the identified barriers. Step four designed a revised discharge protocol taking into account existing interventions. Adoption, implementation and evaluation of the new discharge protocol (IM steps five and six) are in progress and were not included in this study. Four former ICU patients and two relatives underlined the importance of the need for effective discharge information and supportive written material. They also reported a lack of knowledge regarding the consequences of ICU admission. 42 ICU and 19 general ward nurses identified benefits and barriers regarding discharge procedures using three vignettes framed by literature. Some discrepancies were found. For example, ICU nurses were skeptical about the impact of writing a lay summary despite extensive evidence of the known benefits for the patients. ICU nurses anticipated having insufficient skills, not knowing the patient well enough, and fearing legal consequences of their writings. The intervention was designed to target the knowledge

  17. Samples and Sampling Protocols for Scientific Investigations | Joel ...

    African Journals Online (AJOL)

    ... from sampling, through sample preparation, calibration to final measurement and reporting. This paper, therefore offers useful information on practical guidance on sampling protocols in line with best practice and international standards. Keywords: Sampling, sampling protocols, chain of custody, analysis, documentation ...

  18. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  19. Video- or text-based e-learning when teaching clinical procedures? A randomized controlled trial.

    Science.gov (United States)

    Buch, Steen Vigh; Treschow, Frederik Philip; Svendsen, Jesper Brink; Worm, Bjarne Skjødt

    2014-01-01

    This study investigated the effectiveness of two different levels of e-learning when teaching clinical skills to medical students. Sixty medical students were included and randomized into two comparable groups. The groups were given either a video- or text/picture-based e-learning module and subsequently underwent both theoretical and practical examination. A follow-up test was performed 1 month later. The students in the video group performed better than the illustrated text-based group in the practical examination, both in the primary test (Pvideo group performed better on the follow-up test (P=0.04). Video-based e-learning is superior to illustrated text-based e-learning when teaching certain practical clinical skills.

  20. Spray-on-skin cells in burns: a common practice with no agreed protocol.

    Science.gov (United States)

    Allouni, Ammar; Papini, Remo; Lewis, Darren

    2013-11-01

    Cultured epithelial autograft (CEA) has been used for skin coverage after burn wound excision since 1981. It is used in burn units and centres throughout the U.K.; however, there appears to be no agreed standards of practice. We aimed to investigate the experience and current practice with its usage in the management of acute burn injury. An online survey was sent to twenty-five burns consultants in the U.K., who are members of the British Burn Association. We received 14 responses. Rarely have the responders agreed to the same practice in most of the questions. Different choices were given by responders with regards the indications for cell culture, techniques used, primary and secondary dressings used, first wound review timing, and measures used to evaluate outcomes. In the current economic environment, the NHS needs to rationalize services on the basis of cost effectiveness. CEA is an expensive procedure that requires an adequately sterile laboratory, special equipments and highly experienced dedicated staff. When dealing with expensive management options, it is important to have an agreed protocol that can form the standard that can be referred to when auditing practices and results to improve burn management and patients' care. Crown Copyright © 2013. Published by Elsevier Ltd. All rights reserved.

  1. EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Halikul Lenando

    2018-01-01

    Full Text Available In opportunistic networks, the nature of intermittent and disruptive connections degrades the efficiency of routing. Epidemic routing protocol is used as a benchmark for most of routing protocols in opportunistic mobile social networks (OMSNs due to its high message delivery and latency. However, Epidemic incurs high cost in terms of overhead and hop count. In this paper, we propose a hybrid routing protocol called EpSoc which utilizes the Epidemic routing forwarding strategy and exploits an important social feature, that is, degree centrality. Two techniques are used in EpSoc. Messages’ TTL is adjusted based on the degree centrality of nodes, and the message blocking mechanism is used to control replication. Simulation results show that EpSoc increases the delivery ratio and decreases the overhead ratio, the average latency, and the hop counts as compared to Epidemic and Bubble Rap.

  2. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  3. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  4. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  5. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  6. Preventing disease through opportunistic, rapid engagement by primary care teams using behaviour change counselling (PRE-EMPT): protocol for a general practice-based cluster randomised trial.

    Science.gov (United States)

    Spanou, Clio; Simpson, Sharon A; Hood, Kerry; Edwards, Adrian; Cohen, David; Rollnick, Stephen; Carter, Ben; McCambridge, Jim; Moore, Laurence; Randell, Elizabeth; Pickles, Timothy; Smith, Christine; Lane, Claire; Wood, Fiona; Thornton, Hazel; Butler, Chris C

    2010-09-21

    Smoking, excessive alcohol consumption, lack of exercise and an unhealthy diet are the key modifiable factors contributing to premature morbidity and mortality in the developed world. Brief interventions in health care consultations can be effective in changing single health behaviours. General Practice holds considerable potential for primary prevention through modifying patients' multiple risk behaviours, but feasible, acceptable and effective interventions are poorly developed, and uptake by practitioners is low. Through a process of theoretical development, modeling and exploratory trials, we have developed an intervention called Behaviour Change Counselling (BCC) derived from Motivational Interviewing (MI). This paper describes the protocol for an evaluation of a training intervention (the Talking Lifestyles Programme) which will enable practitioners to routinely use BCC during consultations for the above four risk behaviours. This cluster randomised controlled efficacy trial (RCT) will evaluate the outcomes and costs of this training intervention for General Practitioners (GPs) and nurses. Training methods will include: a practice-based seminar, online self-directed learning, and reflecting on video recorded and simulated consultations. The intervention will be evaluated in 29 practices in Wales, UK; two clinicians will take part (one GP and one nurse) from each practice. In intervention practices both clinicians will receive training. The aim is to recruit 2000 patients into the study with an expected 30% drop out. The primary outcome will be the proportion of patients making changes in one or more of the four behaviours at three months. Results will be compared for patients seeing clinicians trained in BCC with patients seeing non-BCC trained clinicians. Economic and process evaluations will also be conducted. Opportunistic engagement by health professionals potentially represents a cost effective medical intervention. This study integrates an existing

  7. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  8. Authentication protocols for internet of things: a comprehensive survey

    OpenAIRE

    Ferrag, Mohamed Amine; Maglaras, Leandros A.; Janicke, Helge; Jiang, Jianmin; Shu, Lei

    2017-01-01

    open access article In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, c...

  9. E-books in libraries a practical guide

    CERN Document Server

    Price, Kate

    2011-01-01

    Providing a practical appraisal of e-books, this book addresses the key questions: Where do e-books come from and what are the key business models that support them? What needs to change before e-books become universally and easily used? What will the e-book landscape look like in ten years' time? And more.

  10. The Effect of a Collaborative Mentoring Program on Beginning Science Teachers' Inquiry-based Teaching Practice

    Science.gov (United States)

    Nam, Jeonghee; Seung, Eulsun; Go, MunSuk

    2013-03-01

    This study investigated how a collaborative mentoring program influenced beginning science teachers' inquiry-based teaching and their reflection on practice. The one-year program consisted of five one-on-one mentoring meetings, weekly science education seminars, weekly mentoring group discussions, and self-evaluation activities. The participants were three beginning science teachers and three mentors at the middle school level (7-9th grades) in an urban area of South Korea. For each beginning teacher, five lessons were evaluated in terms of lesson design/implementation, procedural knowledge, and classroom culture by using the Reformed Teaching Observation Protocol. Five aspects of the beginning teachers' reflections were identified. This study showed that a collaborative mentoring program focusing on inquiry-based science teaching encouraged the beginning teachers to reflect on their own perceptions and teaching practice in terms of inquiry-based science teaching, which led to changes in their teaching practice. This study also highlighted the importance of collaborative interactions between the mentors and the beginning teachers during the mentoring process.

  11. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  12. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  13. Student Responses to an ICT-Based E-Assessment Application for the Teaching Practicum/Teaching Practice MODULE

    Science.gov (United States)

    Davids, M. Noor

    2017-01-01

    Situated within the context of Initial Teacher Education (ITE) in South Africa, this study introduces the notion of an interactive Teaching Practicum E- Assessment application: e-assessment application for the teaching practicum/Teaching Practice module to replace the current model of assessment. At present students enrolled for an Initial Teacher…

  14. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  15. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  16. Research on Multioperator silk screen printer Based on Communication Protocol Macro

    Directory of Open Access Journals (Sweden)

    Zhiming Zhang

    2018-01-01

    Full Text Available Multioperator silk screen printer is automatic silk screen printing equipment. There are many advantages, such as energy saving, reduce the labor intensity and so on. The control system consists of an intermittent movement main motor and eight color working station printing cycle motion motors. The system controls nine frequency converters through protocol macro communication by using PLC. This paper studies the principle and process characteristics of multioperator silk screen printer. Besides, this paper adopts protocol macro sequence generation method for communication between PLC and frequency converter. This method can control the programming of parameters, such as frequency, operation and monitoring. It also can realize the printing of eight color working stations and monitor the printing status in real time. The practical application proves that the method meets the technical requirements and the reliability is good.

  17. New Approaches to Practical Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Nordholt, Peter Sebastian

    all practical protocols with malicious security were based on Yao’s garbled circuits. We report on an implementation of this protocol demonstrating its high efficiency. For larger circuits it evaluates 20000 Boolean gates per second. As an example, evaluating one oblivious AES encryption (around 34000...

  18. The carrying out process of Kyoto Protocol in Italy. Methods, scenarios and policy evaluation; Il processo di attuazione del Protocollo di Kyoto in Italia. Metodi, scenari e valutazione di politiche e misure

    Energy Technology Data Exchange (ETDEWEB)

    Menna, P.; Tosato, G.C.; Parenti, A.; Santi, F.; Simbolotti, G.; Presutto, M.; Dalla Costa, M.; Colosimo, A. [ENEA, Rome (Italy); Bonanni, P.; Contaldi, M.; De Lauretis, R. [Agenzia Nazionale per la Protezione dell' Ambiente, Rome (Italy)

    2000-07-01

    This paper reports some technical contributes related to the Kyoto Protocol and its application in Italian decision making policy. [Italian] Il presente volume raccoglie una decina di contributi tecnici originariamente preparati o commissionati dall'ENEA, Ente Nazionale per le Nuove Tecnologie, l'Energia e l'Ambiente, in vista della Conferenza Nazionale Energia e Ambiente. Questa fotografia di una situazione in rapida evoluzione e' stata preparata da esperti del settore che contribuiscono a redigere il materiale tecnico di base utilizzato dai negoziatori nazionali durante le trattative internazionali e dai responsabili nazionali per avviare il processo di presa di decisioni in materia.

  19. The Fangshan/Family-based Ischemic Stroke Study In China (FISSIC protocol

    Directory of Open Access Journals (Sweden)

    Chen Dafang

    2007-09-01

    Full Text Available Abstract Background The exact etiology of ischemic stroke remains unclear, because multiple genetic predispositions and environmental risk factors may be involved, and their interactions dictate the complexity. Family-based studies provide unique features in design, while they are currently underrepresented for studies of ischemic stroke in developing countries. The Fangshan/Family-based Ischemic Stroke Study In China (FISSIC program aims to conduct a genetic pedigree study of ischemic stroke in rural communities of China. Methods/Design The pedigrees of ischemic stroke with clear documentation are recruited by using the proband-initiated contact method, based on the stroke registry in hospital and communities. Blood samples and detailed information of pedigrees are collected through the health care network in the rural area, and prospective follow-up of the pedigrees cohort is scheduled. Complementary strategies of both family-based design and matched case-spousal control design are used, and comprehensive statistical methods will be implemented to ascertain potential complex genetic and environmental factors and their interactions as well. Discussion This study is complementary to other genetic pedigree studies of ischemic stroke, such as the Siblings With Ischemic Stroke Study (SWISS, which are established in developed countries. We describe the protocol of this family-based genetic epidemiological study that may be used as a new practical guideline and research paradigm in developing countries and facilitate initiatives of stroke study for international collaborations.

  20. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  1. Security of Semi-Device-Independent Random Number Expansion Protocols.

    Science.gov (United States)

    Li, Dan-Dan; Wen, Qiao-Yan; Wang, Yu-Kun; Zhou, Yu-Qian; Gao, Fei

    2015-10-27

    Semi-device-independent random number expansion (SDI-RNE) protocols require some truly random numbers to generate fresh ones, with making no assumptions on the internal working of quantum devices except for the dimension of the Hilbert space. The generated randomness is certified by non-classical correlation in the prepare-and-measure test. Until now, the analytical relations between the amount of the generated randomness and the degree of non-classical correlation, which are crucial for evaluating the security of SDI-RNE protocols, are not clear under both the ideal condition and the practical one. In the paper, first, we give the analytical relation between the above two factors under the ideal condition. As well, we derive the analytical relation under the practical conditions, where devices' behavior is not independent and identical in each round and there exists deviation in estimating the non-classical behavior of devices. Furthermore, we choose a different randomness extractor (i.e., two-universal random function) and give the security proof.

  2. On the Temporal Stability of Analyte Recognition with an E-Nose Based on a Metal Oxide Sensor Array in Practical Applications.

    Science.gov (United States)

    Kiselev, Ilia; Sysoev, Victor; Kaikov, Igor; Koronczi, Ilona; Adil Akai Tegin, Ruslan; Smanalieva, Jamila; Sommer, Martin; Ilicali, Coskan; Hauptmannl, Michael

    2018-02-11

    The paper deals with a functional instability of electronic nose (e-nose) units which significantly limits their real-life applications. Here we demonstrate how to approach this issue with example of an e-nose based on a metal oxide sensor array developed at the Karlsruhe Institute of Technology (Germany). We consider the instability of e-nose operation at different time scales ranging from minutes to many years. To test the e-nose we employ open-air and headspace sampling of analyte odors. The multivariate recognition algorithm to process the multisensor array signals is based on the linear discriminant analysis method. Accounting for the received results, we argue that the stability of device operation is mostly affected by accidental changes in the ambient air composition. To overcome instabilities, we introduce the add-training procedure which is found to successfully manage both the temporal changes of ambient and the drift of multisensor array properties, even long-term. The method can be easily implemented in practical applications of e-noses and improve prospects for device marketing.

  3. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  4. Recruiting primary care practices for practice-based research: a case study of a group-randomized study (TRANSLATE CKD) recruitment process.

    Science.gov (United States)

    Loskutova, Natalia Y; Smail, Craig; Ajayi, Kemi; Pace, Wilson D; Fox, Chester H

    2018-01-16

    We assessed the challenging process of recruiting primary care practices in a practice-based research study. In this descriptive case study of recruitment data collected for a large practice-based study (TRANSLATE CKD), 48 single or multiple-site health care organizations in the USA with a total of 114 practices were invited to participate. We collected quantitative and qualitative measures of recruitment process and outcomes for the first 25 practices recruited. Information about 13 additional practices is not provided due to staff transitions and limited data collection resources. Initial outreach was made to 114 practices (from 48 organizations, 41% small); 52 (45%) practices responded with interest. Practices enrolled in the study (n = 25) represented 22% of the total outreach number, or 48% of those initially interested. Average time to enroll was 71 calendar days (range 11-107). There was no difference in the number of days practices remained under recruitment, based on enrolled versus not enrolled (44.8 ± 30.4 versus 46.8 ± 25.4 days, P = 0.86) or by the organization size, i.e. large versus small (defined by having ≤4 distinct practices; 52 ± 23.6 versus 43.6 ± 27.8 days; P = 0.46). The most common recruitment barriers were administrative, e.g. lack of perceived direct organizational benefit, and were more prominent among large organizations. Despite the general belief that the research topic, invitation method, and interest in research may facilitate practice recruitment, our results suggest that most of the recruitment challenges represent managerial challenges. Future research projects may need to consider relevant methodologies from businesses administration and marketing fields. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Evidence-based practice in radiology: Knowledge, attitude and perceived barriers to practice among residents in radiology

    Energy Technology Data Exchange (ETDEWEB)

    Anuradha, Chandramohan, E-mail: anuradhachandramohan@gmail.com [Department of Radiology, Christian Medical College, Vellore, Tamil Nadu 632 004 (India); Jacob, K.S., E-mail: ksjacob@cmcvellore.ac.in [Department of Psychiatry, Christian Medical College, Vellore, Tamil Nadu 632 004 (India); Specialist Mental Health Service for Older People, Suite 106, 64–68 Derby Street, Kingswood, Penrith 2750 (Australia); Shyamkumar, N.K., E-mail: aparnashyam@gmail.com [Department of Radiology, Christian Medical College, Vellore, Tamil Nadu 632 004 (India); Sridhar, Gibikote, E-mail: gibikote@cmcvellore.ac.in [Department of Radiology, Christian Medical College, Vellore, Tamil Nadu 632 004 (India)

    2013-05-15

    Aim: We examinted the attitude, knowledge and perceived barriers to evidence-based practice of radiology (EBPR) among residents in radiology. Study design and setting: We used the McColl questionnaire (1) and the BARRIERS scale (2) to assess the issues among radiology trainees attending an annual refresher course. Ninety six residents from 32 medical colleges from Southern India attended the course. Results: Eighty (83.3%) residents, 55 male and 25 female of age range 24–34 years, consented and returned the questionnaire. The majority of the participants had a positive attitude towards EBPR. However, 45% were unaware of sources for evidence based literature although many had access to Medline (45%) and the internet (80%). The majority (70%) were aware of the common technical terms (e.g. odds ratio, absolute and relative risk) but other complex details (e.g. meta-analysis, clinical effectiveness, confidence interval, publication bias and number needed to treat) were poorly understood. Though majority of residents (59%) were currently following guidelines and protocols laid by colleagues within their departments, 70% of residents were interested in learning the skills of EBPR and were willing to appraise primary literature or systematic reviews by themselves. Insufficient time on the job to implement new ideas (70.1%); relevant literature is not being complied in one place (68.9%); not being able to understand statistical methods (68.5%) were considered to be the major barriers to EBPR. Training in critical appraisal significantly influence usage of bibliographic databases (p < 0.0001). Attitude of collegues (p = 0.006) influenced attitude of the trainees towards EBPR. Those with higher knowledge scores (p = 0.02) and a greater awareness of sources for seeking evidence based literature (p = 0.05) held stronger beliefs that EBPR significantly improved patient care. Conclusions: The large knowledge gap related to EBPR suggests the need to incorporate structured

  6. Evidence-based practice in radiology: Knowledge, attitude and perceived barriers to practice among residents in radiology

    International Nuclear Information System (INIS)

    Anuradha, Chandramohan; Jacob, K.S.; Shyamkumar, N.K.; Sridhar, Gibikote

    2013-01-01

    Aim: We examinted the attitude, knowledge and perceived barriers to evidence-based practice of radiology (EBPR) among residents in radiology. Study design and setting: We used the McColl questionnaire (1) and the BARRIERS scale (2) to assess the issues among radiology trainees attending an annual refresher course. Ninety six residents from 32 medical colleges from Southern India attended the course. Results: Eighty (83.3%) residents, 55 male and 25 female of age range 24–34 years, consented and returned the questionnaire. The majority of the participants had a positive attitude towards EBPR. However, 45% were unaware of sources for evidence based literature although many had access to Medline (45%) and the internet (80%). The majority (70%) were aware of the common technical terms (e.g. odds ratio, absolute and relative risk) but other complex details (e.g. meta-analysis, clinical effectiveness, confidence interval, publication bias and number needed to treat) were poorly understood. Though majority of residents (59%) were currently following guidelines and protocols laid by colleagues within their departments, 70% of residents were interested in learning the skills of EBPR and were willing to appraise primary literature or systematic reviews by themselves. Insufficient time on the job to implement new ideas (70.1%); relevant literature is not being complied in one place (68.9%); not being able to understand statistical methods (68.5%) were considered to be the major barriers to EBPR. Training in critical appraisal significantly influence usage of bibliographic databases (p < 0.0001). Attitude of collegues (p = 0.006) influenced attitude of the trainees towards EBPR. Those with higher knowledge scores (p = 0.02) and a greater awareness of sources for seeking evidence based literature (p = 0.05) held stronger beliefs that EBPR significantly improved patient care. Conclusions: The large knowledge gap related to EBPR suggests the need to incorporate structured

  7. E-health applications and services for patient empowerment: Directions for best practices in the Netherlands

    NARCIS (Netherlands)

    Alpay, L.L.; Henkemans, O.B.; Otten, W.; Rövekamp, T.A.J.M.; Dumay, A.C.M.

    2010-01-01

    Objective: E-health may enable the empowerment process for patients, particularly the chronically ill. However, e-health is not always designed with the requirements of patient empowerment in mind. Drawing on evidence-based e-health studies, we propose directions for best practices to develop

  8. E-health Applications and Services for Patient Empowerment : Directions for Best Practices in The Netherlands

    NARCIS (Netherlands)

    Alpay, L.L.; Blanson Henkemans, O.; Otten, W.; Rövekamp, T.A.J.M.; Dumay, A.C.M.

    2010-01-01

    Objective: E-health may enable the empowerment process for patients, particularly the chronically ill. However, e-health is not always designed with the requirements of patient empowerment in mind. Drawing on evidence-based e-health studies, we propose directions for best practices to develop

  9. Generalized HARQ Protocols with Delayed Channel State Information and Average Latency Constraints

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Popovski, Petar

    2018-01-01

    In many practical wireless systems, the signal-to-interference-and-noise ratio (SINR) that is applicable to a certain transmission, referred to as channel state information (CSI), can only be learned after the transmission has taken place and is thereby delayed (outdated). In such systems, hybrid...... automatic repeat request (HARQ) protocols are often used to achieve high throughput with low latency. This paper put forth the family of expandable message space (EMS) protocols that generalize the HARQ protocol and allow for rate adaptation based on delayed CSI at the transmitter (CSIT). Assuming a block...

  10. Helping Pre-Service Mathematics Teachers Connect Theory and Practice: Using Reading, Writing, and Observation Protocols to Structure Field Experiences

    Science.gov (United States)

    Cross, Stephanie Behm; Bayazit, Nermin Tosmur

    2014-01-01

    The authors designed the project described her in order to address their students' expressed frustrations at the perceived disconnect between theory and practice. The project combined course readings, journaling, collaboratively created observation protocols, and classroom observation into a semester-long iterative assignment. The students' work…

  11. Can E-Learning Change Work Practices?

    Science.gov (United States)

    Noesgaard, Signe Schack

    2016-01-01

    Stand-alone e-learning is unlikely to change work practices. This claim contrasts with a comprehensive body of research arguing that e-learning is at least as effective as face-to-face instruction in improving work performance. Such a comparison is, however, problematic. On the one hand, it relies on the premise that face-to-face instruction is…

  12. The Establishment of an e-Learning System Based on SDT

    Directory of Open Access Journals (Sweden)

    Mihyang Bang

    2014-06-01

    Full Text Available This study established an elementary-school English e-learning system on the basis of theory-based motivation strategies, and verified the effectiveness of the motivation strategies through educational practice and the applicability of traditional motivation theories in e-learning environments. Six motivation strategies were deducted, two from each of the three psychological needs (Autonomy, Competence, Relatedness presupposed as preconditions that increase human motivation based on the Self-Determination Theory. Next, the e-learning system intended to increase intrinsic motivation for English learning was established based on the motivation strategies. Then, this system was used for year-long educational practice in 115 private educational institutes nationwide. Finally, a survey was conducted with 2,300 students to determine whether the e-learning system applying the motivation strategies satisfied the three psychological needs of elementary-school English learners, and whether it improved intrinsic motivation for English studies. Moreover, this study analysed the correlation among motivation strategies, three psychological needs, and five motivation groups. The results revealed that the motivation strategies applied to the e-learning system had a significant influence on the three psychological needs, and those needs had a significant influence on the five motivation groups. This proved the effectiveness of motivation strategies applied to the e-learning system. It was found that SDT, the traditional motivation theory that has been applied to face-to-face classes, is also effective in the e-learning environment. Finally, even in the e-learning environment focusing on individual learning, learners were found to value relationships with others, in addition to competence, which has been studied relatively often in the past. The significance of this study is that it established a theory-based e-learning system and that it is an empirical study

  13. Implementation of an Evidence-Based Protocol for Surgical Infection Prophylaxis

    National Research Council Canada - National Science Library

    Savino, John A; Smeland, Jane; Flink, Ellen L; Ruperto, Angelo; Hines, Amanda; Sullivan, Thomas; Galvin, Kerri; Risucci, Donald A

    2005-01-01

    An evidence-based surgical antimicrobial prophylaxis (AMP) protocol was implemented in multiple facilities to determine if compliance led to a decrease in New York State reportable surgical site infections (SSIs...

  14. A Protocol for Advanced Psychometric Assessment of Surveys

    Science.gov (United States)

    Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.

    2013-01-01

    Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759

  15. Practice nurses and obesity: professional and practice-based factors affecting role adequacy and role legitimacy.

    Science.gov (United States)

    Nolan, Christine; Deehan, Ann; Wylie, Ann; Jones, Roger

    2012-10-01

    This qualitative study explored the professional and practice-based factors affecting the role legitimacy and adequacy of practice nurses in managing obese patients. There are strong clinical, financial and practical reasons for tackling obesity in UK general practice. Although practice nurses may seem to be in an ideal position to manage obesity, there remain questions about their role adequacy (sense of self-efficacy in responding to patients' problems) and role legitimacy (their perceived boundaries of professional responsibility and right to intervene). Semi-structured face-to-face interviews were conducted with 22 practice nurses in Lambeth, Southwark and Lewisham in South London. Interviews were digitally recorded and transcribed. Key themes were identified following coding of the data. Findings Factors that positively affected nurses' role adequacy and legitimacy were: their belief that obesity management was part of their chronic disease management and health promotion remit; their confidence in their own communication skills and ability to build rapport with patients; having attended training and being supported to take extra time for obesity management. Factors negatively affecting their role legitimacy and adequacy were: their low awareness and use of guidance; lack of knowledge of referral options; limited knowledge and use of non-medical and non-persuasive approaches; perceived lack of expertise in motivating patients, as well as in nutrition, child obesity and assessment; belief that there were some contexts in which it was more appropriate to raise the issue than others; lack of culturally appropriate materials and language barriers; belief that they had limited impact on outcome and that the patient is responsible for lack of success. Other factors negatively affecting their role adequacy and legitimacy included their ambivalence about the effectiveness of the interventions offered; perceived lack of priority for obesity management within practices

  16. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  17. Implementing and up-scaling evidence-based eMental health in Europe

    DEFF Research Database (Denmark)

    Vis, Christiaan; Kleiboer, Annet; Prior, Reinhard

    2015-01-01

    Background: Depressive disorder is a major societal challenge. Despite the availability of clinically and cost-effective treatments including Internet interventions, the number of patients receiving treatment is limited. Evidence-based Internet interventions promise wide availability and high...... efficiency of treatments. However, these interventions often do not enter routine mental healthcare delivery at a large scale. The MasterMind project aims to provide insight into the factors that promote or hinder the uptake and implementation of evidence-based Internet interventions by mental healthcare...... practice. Internet-based Cognitive Behaviour Therapy (iCBT) and videoconferencing facilitating collaborative care (ccVC) will be implemented in routine mental healthcare. The services will be offered to 5230 depressed adults in 15 European regions. The current paper describes the evaluation protocol...

  18. Qigong in Cancer Care: Theory, Evidence-Base, and Practice

    Directory of Open Access Journals (Sweden)

    Penelope Klein

    2017-01-01

    Full Text Available Background: The purpose of this discussion is to explore the theory, evidence base, and practice of Qigong for individuals with cancer. Questions addressed are: What is qigong? How does it work? What evidence exists supporting its practice in integrative oncology? What barriers to wide-spread programming access exist? Methods: Sources for this discussion include a review of scholarly texts, the Internet, PubMed, field observations, and expert opinion. Results: Qigong is a gentle, mind/body exercise integral within Chinese medicine. Theoretical foundations include Chinese medicine energy theory, psychoneuroimmunology, the relaxation response, the meditation effect, and epigenetics. Research supports positive effects on quality of life (QOL, fatigue, immune function and cortisol levels, and cognition for individuals with cancer. There is indirect, scientific evidence suggesting that qigong practice may positively influence cancer prevention and survival. No one Qigong exercise regimen has been established as superior. Effective protocols do have common elements: slow mindful exercise, easy to learn, breath regulation, meditation, emphasis on relaxation, and energy cultivation including mental intent and self-massage. Conclusions: Regular practice of Qigong exercise therapy has the potential to improve cancer-related QOL and is indirectly linked to cancer prevention and survival. Wide-spread access to quality Qigong in cancer care programming may be challenged by the availability of existing programming and work force capacity.

  19. Variability in donation after cardiac death protocols: a national survey.

    Science.gov (United States)

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  20. Registered nurses' clinical reasoning in home healthcare clinical practice: A think-aloud study with protocol analysis.

    Science.gov (United States)

    Johnsen, Hege Mari; Slettebø, Åshild; Fossum, Mariann

    2016-05-01

    The home healthcare context can be unpredictable and complex, and requires registered nurses with a high level of clinical reasoning skills and professional autonomy. Thus, additional knowledge about registered nurses' clinical reasoning performance during patient home care is required. The aim of this study is to describe the cognitive processes and thinking strategies used by recently graduated registered nurses while caring for patients in home healthcare clinical practice. An exploratory qualitative think-aloud design with protocol analysis was used. Home healthcare visits to patients with stroke, diabetes, and chronic obstructive pulmonary disease in seven healthcare districts in southern Norway. A purposeful sample of eight registered nurses with one year of experience. Each nurse was interviewed using the concurrent think-aloud technique in three different patient home healthcare clinical practice visits. A total of 24 home healthcare visits occurred. Follow-up interviews were conducted with each participant. The think-aloud sessions were transcribed and analysed using three-step protocol analysis. Recently graduated registered nurses focused on both general nursing concepts and concepts specific to the domains required and tasks provided in home healthcare services as well as for different patient groups. Additionally, participants used several assertion types, cognitive processes, and thinking strategies. Our results showed that recently graduated registered nurses used both simple and complex cognitive processes involving both inductive and deductive reasoning. However, their reasoning was more reactive than proactive. The results may contribute to nursing practice in terms of developing effective nursing education programmes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  2. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  3. BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Rohit Kumar Das

    2016-12-01

    Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.

  4. An XML-Based Protocol for Distributed Event Services

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the application of an XML (extensible mark-up language)-based protocol to the developing field of distributed processing by way of a computational grid which resembles an electric power grid. XML tags would be used to transmit events between the participants of a transaction, namely, the consumer and the producer of the grid scheme.

  5. Cryptanalysis of Wang et al.’s lattice-based key exchange protocol

    Directory of Open Access Journals (Sweden)

    Daya Sagar Gupta

    2016-09-01

    Full Text Available Wang et al. proposed a new hard problem on lattices which is an extension of the small integer solution (SIS on lattices. This new generated hard problem is named to be bilateral in-homogeneous small integer solution (Bi-ISIS. Using the hardness of Bi-ISIS, Wang et al. proposed a new key exchange protocol, which is based on the lattice-based cryptography. In this paper, we signalize that Wang et al.’s lattice-based key exchange protocol is vulnerable to an attack, namely, man-in-the-middle (MITM attack. Through this attack, Eavesdropper can intercept the authenticated messages and communicate the unauthentic messages among the communicating parties.

  6. Preoperative magnetic resonance imaging protocol for endoscopic cranial base image-guided surgery.

    Science.gov (United States)

    Grindle, Christopher R; Curry, Joseph M; Kang, Melissa D; Evans, James J; Rosen, Marc R

    2011-01-01

    Despite the increasing utilization of image-guided surgery, no radiology protocols for obtaining magnetic resonance (MR) imaging of adequate quality are available in the current literature. At our institution, more than 300 endonasal cranial base procedures including pituitary, extended pituitary, and other anterior skullbase procedures have been performed in the past 3 years. To facilitate and optimize preoperative evaluation and assessment, there was a need to develop a magnetic resonance protocol. Retrospective Technical Assessment was performed. Through a collaborative effort between the otolaryngology, neurosurgery, and neuroradiology departments at our institution, a skull base MR image-guided (IGS) protocol was developed with several ends in mind. First, it was necessary to generate diagnostic images useful for the more frequently seen pathologies to improve work flow and limit the expense and inefficiency of case specific MR studies. Second, it was necessary to generate sequences useful for IGS, preferably using sequences that best highlight that lesion. Currently, at our institution, all MR images used for IGS are obtained using this protocol as part of preoperative planning. The protocol that has been developed allows for thin cut precontrast and postcontrast axial cuts that can be used to plan intraoperative image guidance. It also obtains a thin cut T2 axial series that can be compiled separately for intraoperative imaging, or may be fused with computed tomographic images for combined modality. The outlined protocol obtains image sequences effective for diagnostic and operative purposes for image-guided surgery using both T1 and T2 sequences. Copyright © 2011 Elsevier Inc. All rights reserved.

  7. Evidence-based clinical practice, [corrected] evidence-based medicine and the Cochrane collaboration.

    Science.gov (United States)

    Gambrill, E

    1999-03-01

    Encouraging professionals in training and later to consider practice-related research findings when making important clinical decisions is an on-going concern. Evidenced-Based Medicine (EBM) and the Cochrane Collaboration (CC) provide a source of tools and ideas for doing so, as well as a roster of colleagues who share this interest. Evidenced-based medicine involves integrating clinical expertise with the best available external evidence from systematic research as well as considering the values and expectations of patients/clients. Advantage can be taken of educational formats developed in EBM, such as problem-based learning and critical-appraisal workshops in which participants learn how to ask key answerable questions related to important clinical practice questions (e.g., regarding effectiveness, accuracy of assessment measures, prediction, prevention, and quality of clinical practice guidelines) and to access and critically appraise related research. The Cochrane Collaboration is a world-wide network of centers that prepare, maintain, and disseminate high-quality systematic reviews on the efficacy of healthcare. These databases allow access to evidence related to clinical practice decisions. Forging reciprocal working relationships with those involved in EBM reciprocal and the CC should contribute to the pursuit of shared goals such as basing clinical decisions on the best-available evidence and involving clients as informed consumers.

  8. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  9. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  10. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    Science.gov (United States)

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with

  11. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  12. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  13. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2013-11-01

    Full Text Available Due to the characteristics of underwater acoustic channel, media access control (MAC protocols designed for underwater acoustic sensor networks (UWASNs are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA CDMA MAC (POCA-CDMA-MAC, is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA or receiver-oriented code assignment (ROCA. Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  14. Implementing and up-scaling evidence-based eMental health in Europe: The study protocol for the MasterMind project

    Directory of Open Access Journals (Sweden)

    Christiaan Vis

    2015-11-01

    Discussion: The use of Internet interventions in routine practice is limited. MasterMind attempts to bridge the gap between routine practice and effectiveness research by evaluating the implementation of evidence-based Internet interventions for depressive disorders in routine mental healthcare settings in Europe.

  15. Implementation of Quality Control Protocol in Mammography: A Serbian Experience

    International Nuclear Information System (INIS)

    Ciraj Bjelac, O.; Kosutic, D.; Arandjic, D.; Kovacevic, M.

    2008-01-01

    Mammography is method of choice for early detection of breast cancer. In Serbia, mammography is performed only clinically, although there is a long term plan to introduce mammography as screening method. Currently there are 60 mammography units in practice in Serbia, resulting with 70 000 mammographies annually. The purpose of this paper is preliminary evaluation of the mammography practice in Serbia, having in mind the annual number of examinations and fact that part of examination is performed on women without any clinical signs. For pilot implementation of Quality Control (QC) protocol in mammography, five hospitals with highest workload have been selected, representing the typical mammography practice in Serbia. Developed QC protocol, based on European guidelines for quality assurance in breast cancer screening and diagnosis, actual practice and resources, includes equipment testing and maintenance, staff training and QC management and allocation of responsibilities. Subsequently, it should be applied on the national scale. The survey demonstrated considerable variations in technical parameters that affect image quality and patients doses. Mean glandular doses ranged from 0.12 to 2.8 mGy, while reference optical density ranged from 1.2 to 2.8. Main problems were associated with film processing, viewing conditions and optical density control. The preliminary survey of mammography practice highlighted the need for optimization of radiation protection and training of operating staff, although the survey itself was very valuable learning process for all participants. Furthermore, systematic implementation of QC protocol should provide reliable performance of mammography units and maintain satisfactory image quality and keep patient doses as low as reasonably practical.(author)

  16. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    Science.gov (United States)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  17. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  18. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  19. Rescue dose orders as an alternative to range orders: an evidence-based practice project.

    Science.gov (United States)

    Yi, Cassia

    2015-06-01

    Relief of pain is a fundamental aspect of optimal patient care. However, pain management in the inpatient setting is often constrained by concerns related to regulatory oversight, particularly with regard to the use of opioid dose range orders. These concerns can inadvertently result in the development of policies and practices that can negatively impact the health care team's ability to deliver optimal and individualized pain management. An evidence-based practice project was undertaken to address concerns about regulatory oversight of pain management processes by changing the way pain was managed in a large academic hospital setting. A novel pain management approach using rescue dose medications was established as an alternative to opioid dose range orders. The use of the rescue dose protocol was successfully implemented. Outcomes included an overall reduction in the administration of inappropriate intravenous opioids and opioid-acetaminophen combination medications, with a subsequent increase in single-entity first-line opioid analgesics. Rescue dose protocols may offer an alternative to opioid dose range orders as a means of effectively managing pain. Copyright © 2015 American Society of PeriAnesthesia Nurses. Published by Elsevier Inc. All rights reserved.

  20. Creating an interactive Web-based e-learning course: a practical introduction for radiologists.

    Science.gov (United States)

    Hoa, Denis; Micheau, Antoine; Gahide, Gerald

    2006-01-01

    With the development of e-learning and its ability to provide rich animated content rapidly to a wide audience, new methods for teaching medical imaging have evolved. E-learning tools allow building of learner-focused structured courses. Standards such as shareable content object reference model (SCORM) or Aviation Industry Computer-based Training Committee (AICC) guidelines and recommendations provide the framework required to combine text, images, videos, animations, and quizzes for learning assessment, even if each of these elements is created with different software. The main features to consider when choosing a learning management system are content management, assessment and reporting tools, customization options, course delivery, administration, and security. The tools for building a Web-based course with pages containing text, images, videos, and Flash animations are now accessible to any radiologist. Open-source learning management systems and content authoring software are available at no cost. The authors developed e-MRI.com, a free Web-based e-learning course with interactive animations and simulations, self-tests, and clinical cases to demonstrate the potential of the latest advances in e-learning and pedagogy applied to magnetic resonance imaging physics.

  1. Laboratory Medicine Best Practice Guideline: Vitamins A, E and the Carotenoids in Blood

    Science.gov (United States)

    Greaves, Ronda F; Woollard, Gerald A; Hoad, Kirsten E; Walmsley, Trevor A; Johnson, Lambro A; Briscoe, Scott; Koetsier, Sabrina; Harrower, Tamantha; Gill, Janice P

    2014-01-01

    Despite apparent method similarities between laboratories there appear to be confounding factors inhibiting uniform reporting and standardisation of vitamin assays. The Australasian Association of Clinical Biochemists (AACB) Vitamins Working Party, in conjunction with The Royal College of Pathologists of Australasia Quality Assurance Programs, has formulated a guideline to improve performance, reproducibility and accuracy of fat-soluble vitamin results. The aim of the guideline is to identify critical pre-analytical, analytical and post-analytical components of the analysis of vitamins A, E and carotenoids in blood to promote best practice and harmonisation. This best practice guideline has been developed with reference to the Centers for Disease Control and Prevention (CDC) “Laboratory Medicine Best Practices: Developing an Evidence-Based Review and Evaluation Process”. The CDC document cites an evaluation framework for generating best practice recommendations that are specific to laboratory medicine. These 50 recommendations proposed herein, were generated from a comprehensive literature search and the extensive combined experience of the AACB Vitamins Working Party members. They were formulated based on comparison between an impact assessment rating and strength of evidence and were classified as either: (1) strongly recommend, (2) recommend, (3) no recommendation for or against, or (4) recommend against. These best practice recommendations represent the consensus views, in association with peer reviewed evidence of the AACB Vitamins Working Party, towards best practice for the collection, analysis and interpretation of vitamins A, E and carotenoids in blood. PMID:25210208

  2. Latino Parent Home-Based Practices that Bolster Student Academic Persistence

    Science.gov (United States)

    Mena, Jasmine A.

    2011-01-01

    Home-based parental involvement practices (i.e., educational encouragement, monitoring, and support) and their impact on students' academic persistence were investigated with a sample of 137, ninth-grade Latino students in a northeast high school. Structural Equation Modeling results indicate that the relationship between home-based parental…

  3. 342 Quality Assurance Using ICT Best Practices in School-Based ...

    African Journals Online (AJOL)

    User

    2012-01-24

    Jan 24, 2012 ... ... in School-Based. Assessment of Students' Learning in Nigerian University ... Guidance and Counselling, University of Port–Harcourt, Rivers State. E-mail: ... Key words: Quality Assurance, ICTs best practices, School – Based ... Quality could mean a grade of achievement or standard against which to.

  4. Team Science Approach to Developing Consensus on Research Good Practices for Practice-Based Research Networks: A Case Study.

    Science.gov (United States)

    Campbell-Voytal, Kimberly; Daly, Jeanette M; Nagykaldi, Zsolt J; Aspy, Cheryl B; Dolor, Rowena J; Fagnan, Lyle J; Levy, Barcey T; Palac, Hannah L; Michaels, LeAnn; Patterson, V Beth; Kano, Miria; Smith, Paul D; Sussman, Andrew L; Williams, Robert; Sterling, Pamela; O'Beirne, Maeve; Neale, Anne Victoria

    2015-12-01

    Using peer learning strategies, seven experienced PBRNs working in collaborative teams articulated procedures for PBRN Research Good Practices (PRGPs). The PRGPs is a PBRN-specific resource to facilitate PBRN management and staff training, to promote adherence to study protocols, and to increase validity and generalizability of study findings. This paper describes the team science processes which culminated in the PRGPs. Skilled facilitators used team science strategies and methods from the Technology of Participation (ToP®), and the Consensus Workshop Method to support teams to codify diverse research expertise in practice-based research. The participatory nature of "sense-making" moved through identifiable stages. Lessons learned include (1) team input into the scope of the final outcome proved vital to project relevance; (2) PBRNs with diverse domains of research expertise contributed broad knowledge on each topic; and (3) ToP® structured facilitation techniques were critical for establishing trust and clarifying the "sense-making" process. © 2015 Wiley Periodicals, Inc.

  5. Supporting Implementation of Evidence-Based Practices through Practice-Based Coaching

    Science.gov (United States)

    Snyder, Patricia A.; Hemmeter, Mary Louise; Fox, Lise

    2015-01-01

    In active implementation science frameworks, coaching has been described as an important competency "driver" to ensure evidence-based practices are implemented as intended. Empirical evidence also has identified coaching as a promising job-embedded professional development strategy to support implementation of quality teaching practices.…

  6. Discurso e prática religiosa nas Comunidades Eclesiais de Base italianas e brasileiras: um estudo comparativo com base na teoria da mudança social de Max Weber (Speech and religious practice in the Basic Ecclesial Communities in Italy and Brazil

    Directory of Open Access Journals (Sweden)

    Marinete Luzia Francisca de Souza

    2011-12-01

    Full Text Available Este estudo é uma reflexão sobre  o discurso e a prática nas comunidades Eclesiais de Base no Brasil e na Itália. Buscamos demonstrar, a partir de uma pesquisa empírica e teórica, as relações entres duas Comunidades Eclesiais de Base, a Comunidade San Paolo (Roma-IT e a Prelazia de São Félix (Mato Gross-BR, demonstrando que estas baseiam-se em dois elementos: resultam das discussões  advindas do Concílio Vaticano II e estão fortemente ligadas a seus líderes. E, ainda, que tais comunidades ligam-se por fortes laços simbólicos. Este fato permitiu-nos concluir  que a Teologia da Libertação empenhou-se em promover mudanças sociais e em criar um corpo simbólico que a corroborasse. Tais análises foram sustentadas pela teoria da transformação social de Max Weber e, ainda, pelos estudos  de Karl Mannheim e de  Glock e Stark. Palavras-chaves:Transformação social, Teologia da Libertação, prática, discurso. Abstract This study is a reflection of the discourse and practice on the Basic Ecclesial communities in Brazil and Italy. We try to show, from an empirical and theoretical research, the relations between two Christian Base Communities: the San Paolo Community (Rome – IT and the Prelature of São Félix (BR – Mato Grosso, based on two factors: the result of discussions arising out of Vatican II, and the strong link to its leaders. Such communities bind by strong symbolic ties that really allowed us to conclude that Liberation Theology endeavored to promote social changes and to create a symbolic body that corroborates it. Such analysis was supported by the theory of social transformation of Max Weber, by the studies of Karl Mannheim and Glock and Stark. Keywords: Social Transformation; Liberation Theology, Practice, Discourse.

  7. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  8. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  9. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  10. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    OpenAIRE

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  11. Communicating systems with UML 2 modeling and analysis of network protocols

    CERN Document Server

    Barrera, David Garduno

    2013-01-01

    This book gives a practical approach to modeling and analyzing communication protocols using UML 2. Network protocols are always presented with a point of view focusing on partial mechanisms and starting models. This book aims at giving the basis needed for anybody to model and validate their own protocols. It follows a practical approach and gives many examples for the description and analysis of well known basic network mechanisms for protocols.The book firstly shows how to describe and validate the main protocol issues (such as synchronization problems, client-server interactions, layer

  12. Dental-CT: image quality and absorbed radiation dose of different scan protocols

    International Nuclear Information System (INIS)

    Schorn, C.; Alamo, L.; Funke, M.; Grabbe, E.; Visser, H.; Hermann, K.P.

    1999-01-01

    Purpose: To develop a scan protocol for dental-CT which guarantees good image quality at the lowest possible radiation dose. Methods: In an experimental investigation Dental-CT (HSA, GE, Milwaukee, USA) of the mandible of two human skeletons positioned in a water tank were performed in order to define the most advantageous scan protocol. Tube currents ranged from 40 to 200 mA and the scan technique was modified (axial mode or helical mode with pitches of 1 to 3 and corresponding increments of 0.4 to 1.0 mm). 39 patients underwent a dental-CT with decreased current (80 mA) in the helical scan mode (pitch 2, slice thickness 1 mm). Dose measurements were performed for two different scan protocols (A: axial, 130 mAs, B: helical, 80 mA, pitch 2). Results: The preliminary investigations of image quality showed only a minor effect of the applied current. For the helical scan mode, pitches of more than 2 impaired image quality. A low increment had no advantages. There were no disadvantages in clinical practice using protocol B with decreased tube current. Absorbed radiation dose of dental CT performed with protocol B was decreased to one third in comparison to protocol A. Conclusions: A scan protocol with a low tube current (e.g., 80 mA, for a rotation time of 1 s) and a helical scan mode (e.g., for a slice thickness of 1 mm with a pitch of 2 and an increment of 1 mm) is recommended for performing dental-CT. (orig.) [de

  13. The Application of Observational Practice and Educational Networking in Simulation-Based and Distributed Medical Education Contexts.

    Science.gov (United States)

    Welsher, Arthur; Rojas, David; Khan, Zain; VanderBeek, Laura; Kapralos, Bill; Grierson, Lawrence E M

    2018-02-01

    Research has revealed that individuals can improve technical skill performance by viewing demonstrations modeled by either expert or novice performers. These findings support the development of video-based observational practice communities that augment simulation-based skill education and connect geographically distributed learners. This study explores the experimental replicability of the observational learning effect when demonstrations are sampled from a community of distributed learners and serves as a context for understanding learner experiences within this type of training protocol. Participants from 3 distributed medical campuses engaged in a simulation-based learning study of the elliptical excision in which they completed a video-recorded performance before being assigned to 1 of 3 groups for a 2-week observational practice intervention. One group observed expert demonstrations, another observed novice demonstrations, and the third observed a combination of both. Participants returned for posttesting immediately and 1 month after the intervention. Participants also engaged in interviews regarding their perceptions of the usability and relevance of video-based observational practice to clinical education. Checklist (P simulation-based skill learning in a group of geographically distributed trainees. These findings support the use of Internet-mediated observational learning communities in distributed and simulation-based medical education contexts.

  14. Leader-Following Consensus Stability of Discrete-Time Linear Multiagent Systems with Observer-Based Protocols

    Directory of Open Access Journals (Sweden)

    Bingbing Xu

    2013-01-01

    Full Text Available We consider the leader-following consensus problem of discrete-time multiagent systems on a directed communication topology. Two types of distributed observer-based consensus protocols are considered to solve such a problem. The observers involved in the proposed protocols include full-order observer and reduced-order observer, which are used to reconstruct the state variables. Two algorithms are provided to construct the consensus protocols, which are based on the modified discrete-time algebraic Riccati equation and Sylvester equation. In light of graph and matrix theory, some consensus conditions are established. Finally, a numerical example is provided to illustrate the obtained result.

  15. Developing a Video-Based eHealth Intervention for HIV-Positive Gay, Bisexual, and Other Men Who Have Sex with Men: Study Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Hirshfield, Sabina; Downing, Martin J; Parsons, Jeffrey T; Grov, Christian; Gordon, Rachel J; Houang, Steven T; Scheinmann, Roberta; Sullivan, Patrick S; Yoon, Irene S; Anderson, Ian; Chiasson, Mary Ann

    2016-06-17

    Gay, bisexual, and other men who have sex with men (GBMSM) accounted for 67% of new US human immunodeficiency virus (HIV) infections in 2012; however, less than 40% of HIV-positive GBMSM are virally suppressed. Preventing transmission from virally unsuppressed men who have condomless anal sex (CAS) with serodiscordant partners is a public health imperative. New HIV infections in GBMSM are attributed in part to online access to sex partners; therefore, low-cost eHealth interventions are a unique opportunity to reach men where they meet partners. To describe the protocol of a randomized controlled trial evaluating whether video-based messaging delivered online may lead to reductions in serodiscordant CAS and increased HIV disclosure. Sex Positive!([+]) is a two-arm, phase III, video-based randomized controlled trial delivered online to GBMSM living with HIV. Participants in the intervention arm receive 10 video vignettes grounded in social learning and social cognitive theories that are designed to elicit critical thinking around issues of HIV transmission and disclosure. Participants in the attention control arm receive 10 video vignettes that focus on healthy living. All videos are optimized for mobile viewing. The study protocol includes five online assessments conducted over a 1-year period among 1500 US white, black, or Hispanic/Latino GBMSM living with HIV who report suboptimal antiretroviral therapy (ART) adherence or a detectable viral load in the past 12 months and recent CAS (past 6 months) with HIV-negative or unknown status male partners. Compared to the control arm, we hypothesize that men who watch the intervention videos will report at 12-month follow-up significantly fewer serodiscordant CAS partners, increased HIV disclosure, and improved social cognition (eg, condom use self-efficacy, perceived responsibility). Participant recruitment began in June 2015 and ended in December 2015. This protocol describes the underlying theoretical framework and

  16. Un protocole pour la modélisation du fonctionnement des stations d'épuration à boues activées GMP Protocol for activated sludge models

    Directory of Open Access Journals (Sweden)

    GILLOT, Sylvie ; LANGERGRABER, Günter ; OHTSUKI, Takayuki ; SHAW, Andrew ; TAKACS, Imre ; WINKLER, Stefan ; RIEGER, Leiv

    2012-12-01

    Full Text Available Les stations d’épuration sont des systèmes dynamiques, soumis à d’importantes variations temporelles. La modélisation de leur fonctionnement, qui consiste à représenter mathématiquement l’évolution dans le temps de variables d’intérêt représentant les phénomènes biologiques, physiques et chimiques qui se déroulent dans les ouvrages, est utilisée pour mieux comprendre les processus mis en jeu et optimiser le traitement des eaux résiduaires.. Focus sur les activités du groupe de travail Good Modelling Practice de l’IWA, auquel participe activement les équipes d’Irstea, notamment dans l’élaboration d’un protocole pour l’utilisation des modèles de boues activées en pratique.The IWA Task Group on Good Modelling Practice (GMP has analysed current practice and experience on the use of activated sludge models. The group developed a framework to make modelling more straightforward and that helps structuring the interaction between modellers and the project stakeholders. The GMP protocol is a synthesis of existing procedures, and contains five major steps: (i Project definition, (ii Data collection and reconciliation, (iii Plant model set-up, (iv Calibration and validation, and (v Simulation and result interpretation. The Unified Protocol forms the basis of a Scientific and Technical Report that will be published in late 2012.

  17. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    Science.gov (United States)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  18. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  19. Standardisation of neonatal clinical practice.

    Science.gov (United States)

    Bhutta, Z A; Giuliani, F; Haroon, A; Knight, H E; Albernaz, E; Batra, M; Bhat, B; Bertino, E; McCormick, K; Ochieng, R; Rajan, V; Ruyan, P; Cheikh Ismail, L; Paul, V

    2013-09-01

    The International Fetal and Newborn Growth Consortium for the 21(st) Century (INTERGROWTH-21(st) ) is a large-scale, population-based, multicentre project involving health institutions from eight geographically diverse countries, which aims to assess fetal, newborn and preterm growth under optimal conditions. Given the multicentre nature of the project and the expected number of preterm births, it is vital that all centres follow the same standardised clinical care protocols to assess and manage preterm infants, so as to ensure maximum validity of the resulting standards as indicators of growth and nutrition with minimal confounding. Moreover, it is well known that evidence-based clinical practice guidelines can reduce the delivery of inappropriate care and support the introduction of new knowledge into clinical practice. The INTERGROWTH-21(st) Neonatal Group produced an operations manual, which reflects the consensus reached by members of the group regarding standardised definitions of neonatal morbidities and the minimum standards of care to be provided by all centres taking part in the project. The operational definitions and summary management protocols were developed by consensus through a Delphi process based on systematic reviews of relevant guidelines and management protocols by authoritative bodies. This paper describes the process of developing the Basic Neonatal Care Manual, as well as the morbidity definitions and standardised neonatal care protocols applied across all the INTERGROWTH-21(st) participating centres. Finally, thoughts about implementation strategies are presented. © 2013 Royal College of Obstetricians and Gynaecologists.

  20. A web-based computer-tailored smoking prevention programme for primary school children: intervention design and study protocol

    Science.gov (United States)

    2012-01-01

    Background Although the number of smokers has declined in the last decade, smoking is still a major health problem among youngsters and adolescents. For this reason, there is a need for effective smoking prevention programmes targeting primary school children. A web-based computer-tailored feedback programme may be an effective intervention to stimulate youngsters not to start smoking, and increase their knowledge about the adverse effects of smoking and their attitudes and self-efficacy regarding non-smoking. Methods & design This paper describes the development and evaluation protocol of a web-based out-of-school smoking prevention programme for primary school children (age 10-13 years) entitled ‘Fun without Smokes’. It is a transformation of a postal mailed intervention to a web-based intervention. Besides this transformation the effects of prompts will be examined. This web-based intervention will be evaluated in a 2-year cluster randomised controlled trial (c-RCT) with three study arms. An intervention and intervention + prompt condition will be evaluated for effects on smoking behaviour, compared with a no information control condition. Information about pupils’ smoking status and other factors related to smoking will be obtained using a web-based questionnaire. After completing the questionnaire pupils in both intervention conditions will receive three computer-tailored feedback letters in their personal e-mail box. Attitudes, social influences and self-efficacy expectations will be the content of these personalised feedback letters. Pupils in the intervention + prompt condition will - in addition to the personalised feedback letters - receive e-mail and SMS messages prompting them to revisit the ‘Fun without Smokes’ website. The main outcome measures will be ever smoking and the utilisation of the ‘Fun without Smokes’ website. Measurements will be carried out at baseline, 12 months and 24 months of follow-up. Discussion The present study

  1. A web-based computer-tailored smoking prevention programme for primary school children: intervention design and study protocol

    Directory of Open Access Journals (Sweden)

    Cremers Henricus-Paul

    2012-06-01

    Full Text Available Abstract Background Although the number of smokers has declined in the last decade, smoking is still a major health problem among youngsters and adolescents. For this reason, there is a need for effective smoking prevention programmes targeting primary school children. A web-based computer-tailored feedback programme may be an effective intervention to stimulate youngsters not to start smoking, and increase their knowledge about the adverse effects of smoking and their attitudes and self-efficacy regarding non-smoking. Methods & design This paper describes the development and evaluation protocol of a web-based out-of-school smoking prevention programme for primary school children (age 10-13 years entitled ‘Fun without Smokes’. It is a transformation of a postal mailed intervention to a web-based intervention. Besides this transformation the effects of prompts will be examined. This web-based intervention will be evaluated in a 2-year cluster randomised controlled trial (c-RCT with three study arms. An intervention and intervention + prompt condition will be evaluated for effects on smoking behaviour, compared with a no information control condition. Information about pupils’ smoking status and other factors related to smoking will be obtained using a web-based questionnaire. After completing the questionnaire pupils in both intervention conditions will receive three computer-tailored feedback letters in their personal e-mail box. Attitudes, social influences and self-efficacy expectations will be the content of these personalised feedback letters. Pupils in the intervention + prompt condition will - in addition to the personalised feedback letters - receive e-mail and SMS messages prompting them to revisit the ‘Fun without Smokes’ website. The main outcome measures will be ever smoking and the utilisation of the ‘Fun without Smokes’ website. Measurements will be carried out at baseline, 12 months and 24 months of follow

  2. Blended care vs. usual care in the treatment of depressive symptoms and disorders in general practice [BLENDING]: study protocol of a non-inferiority randomized trial.

    Science.gov (United States)

    Massoudi, Btissame; Blanker, Marco H; van Valen, Evelien; Wouters, Hans; Bockting, Claudi L H; Burger, Huibert

    2017-06-13

    The majority of patients with depressive disorders are treated by general practitioners (GPs) and are prescribed antidepressant medication. Patients prefer psychological treatments but they are under-used, mainly due to time constraints and limited accessibility. A promising approach to deliver psychological treatment is blended care, i.e. guided online treatment. However, the cost-effectiveness of blended care formatted as an online psychological treatment supported by the patients' own GP or general practice mental health worker (MHW) in routine primary care is unknown. We aim to demonstrate non-inferiority of blended care compared with usual care in patients with depressive symptoms or a depressive disorder in general practice. Additionally, we will explore the real-time course over the day of emotions and affect, and events within individuals during treatment. This is a pragmatic non-inferiority trial including 300 patients with depressive symptoms, recruited by collaborating GPs and MHWs. After inclusion, participants are randomized to either blended care or usual care in routine general practice. Blended care consists of the 'Act and Feel' treatment: an eight-week web-based program based on behavioral activation with integrated monitoring of depressive symptomatology and automatized feedback. GPs or their MHWs coach the participants through regular face-to-face or telephonic consultations with at least three sessions. Depressive symptomatology, health status, functional impairment, treatment satisfaction, daily activities and resource use are assessed during a follow-up period of 12 months. During treatment, real-time fluctuations in emotions and affect, and daily events will be rated using ecological momentary assessment. The primary outcome is the reduction of depressive symptoms from baseline to three months follow-up. We will conduct intention-to-treat analyses and supplementary per-protocol analyses. This trial will show whether blended care might be an

  3. Use of an evidence-based protocol to screen for sleep-disordered breathing in a heart failure disease management clinic.

    Science.gov (United States)

    Garner, Shelby L; Traverse, Ramona D

    2014-01-01

    Undiagnosed and untreated sleep-disordered breathing can lead to negative health outcomes and increased utilization of health resources among patients with heart failure. The purpose of this evidence-based practice project was to implement and evaluate a new multifaceted sleep-disordered breathing screening protocol in a heart failure disease management clinic. The combined use of a symptoms questionnaire, the Epworth sleepiness scale, and overnight pulse oximetry was significantly more effective in identifying patients with a positive diagnosis of sleep-disordered breathing than using the Epworth sleepiness scale alone (P < .05).

  4. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Osama Moh’d Alia

    2014-01-01

    Full Text Available Energy conservation in wireless sensor networks (WSNs is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network’s lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  5. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    Science.gov (United States)

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  6. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  7. A research-based child welfare employee selection protocol: strengthening retention of the workforce.

    Science.gov (United States)

    Ellett, Alberta J; Ellett, Chad D; Ellis, Jacquelyn; Lerner, Betsy

    2009-01-01

    This article describes the development and initial implementation of a new employee selection protocol (ESP) for child welfare grounded in the results of recent large-scale employee retention studies and a set of research-based, minimally essential knowledge, skills, abilities, and values. The complete ESP consists of a sequenced set of Web- and site-based assessment processes and procedures for potential applicants. Using the ESP, applicants and employers make informed decisions about the goodness of fit between the applicant and the demands of a career in child welfare. To date, the new ESP has been piloted in three Georgia Division of Family and Children Services (DFCS) regions and implemented by all nine colleges and universities participating in IV-E child welfare education programs. Evaluation data collected from students and new employees in one DFCS region strongly support the value of the ESP Web-based activities to make a more informed decision about whether to apply for the IV-E stipends and child welfare positions. Feedback from trained ESP assessors supports the value of various ESP activities. A major goal of implementing the ESP is to select more professionally committed and highly qualified applicants to strengthen employee retention and outcomes for children and families.

  8. Developing a Web-Based Nursing Practice and Research Information Management System: A Pilot Study.

    Science.gov (United States)

    Choi, Jeeyae; Lapp, Cathi; Hagle, Mary E

    2015-09-01

    Many hospital information systems have been developed and implemented to collect clinical data from the bedside and have used the information to improve patient care. Because of a growing awareness that the use of clinical information improves quality of care and patient outcomes, measuring tools (electronic and paper based) have been developed, but most of them require multiple steps of data collection and analysis. This necessitated the development of a Web-based Nursing Practice and Research Information Management System that processes clinical nursing data to measure nurses' delivery of care and its impact on patient outcomes and provides useful information to clinicians, administrators, researchers, and policy makers at the point of care. This pilot study developed a computer algorithm based on a falls prevention protocol and programmed the prototype Web-based Nursing Practice and Research Information Management System. It successfully measured performance of nursing care delivered and its impact on patient outcomes successfully using clinical nursing data from the study site. Although Nursing Practice and Research Information Management System was tested with small data sets, results of study revealed that it has the potential to measure nurses' delivery of care and its impact on patient outcomes, while pinpointing components of nursing process in need of improvement.

  9. Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    Abstract—This paper evaluates the performance in terms of resource consumption of a service discovery protocol proposed for heterogeneous Wireless Sensor Networks (WSNs). The protocol is based on a clustering structure, which facilitates the construction of a distributed directory. Nodes with higher

  10. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    Science.gov (United States)

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs.

  11. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  12. Cognitive Hypnotherapy as a Transdiagnostic Protocol for Emotional Disorders.

    Science.gov (United States)

    Alladin, Assen; Amundson, Jon

    2016-01-01

    This article describes cognitive hypnotherapy (CH), an integrative treatment that provides an evidence-based framework for synthesizing clinical practice and research. CH combines hypnotherapy with cognitive-behavior therapy in the management of emotional disorders. This blended version of clinical practice meets criteria for an assimilative model of integrative psychotherapy, which incorporates both theory and empirical findings. Issues related to (a) additive effect of hypnosis in treatment, (b) transdiagnostic consideration, and (c) unified treatment protocols in the treatment of emotional disorders are considered in light of cognitive hypnotherapy.

  13. A universal data access and protocol integration mechanism for smart home

    Science.gov (United States)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  14. Barriers and Facilitators to eHealth Use in Daily Practice: Perspectives of Patients and Professionals in Dermatology.

    Science.gov (United States)

    Ariens, Lieneke Fm; Schussler-Raymakers, Florine Ml; Frima, Cynthia; Flinterman, Annebeth; Hamminga, Eefje; Arents, Bernd Wm; Bruijnzeel-Koomen, Carla Afm; de Bruin-Weller, Marjolein S; van Os-Medendorp, Harmieke

    2017-09-05

    The number of eHealth interventions in the management of chronic diseases such as atopic dermatitis (AD) is growing. Despite promising results, the implementation and use of these interventions is limited. This study aimed to assess opinions of the most important stakeholders influencing the implementation and use of eHealth services in daily dermatology practice. The perspectives of health care professionals and patients towards the implementation and use of eHealth services in daily practice were assessed by using a mixed method design. A cross-sectional survey based on the eHealth implementation toolkit (eHit) was conducted to explore factors influencing the adoption of eHealth interventions offering the possibility of e-consultations, Web-based monitoring, and Web-based self-management training among dermatologists and dermatology nurses. The perspectives of patients with atopic dermatitis (AD) regarding the use of eHealth services were discussed in an online focus group. Health care professionals (n=99) and patients (n=9) acknowledged the value of eHealth services and were willing to use these digital tools in daily dermatology practice. Key identified barriers (statements with eHealth interventions included concerns about the availability (12/99, 12%) and allocation (14/99, 14%) of resources, financial aspects (26/99, 26%), reliability, security, and confidentially of the intervention itself (29/99, 29%), and the lack of education and training (6/99, 6%). Health care professionals and patients acknowledge the benefits arising from the implementation and use of eHealth services in daily dermatology practice. However, some important barriers were identified that might be useful in addressing the implementation strategy in order to enhance the implementation success of eHealth interventions in dermatology. ©Lieneke FM Ariens, Florine ML Schussler-Raymakers, Cynthia Frima, Annebeth Flinterman, Eefje Hamminga, Bernd WM Arents, Carla AFM Bruijnzeel

  15. Implementation of a mandatory checklist of protocols and objectives improves compliance with a wide range of evidence-based intensive care unit practices.

    Science.gov (United States)

    Byrnes, Matthew C; Schuerer, Douglas J E; Schallom, Marilyn E; Sona, Carrie S; Mazuski, John E; Taylor, Beth E; McKenzie, Wendi; Thomas, James M; Emerson, Jeffrey S; Nemeth, Jennifer L; Bailey, Ruth A; Boyle, Walter A; Buchman, Timothy G; Coopersmith, Craig M

    2009-10-01

    To determine a) if a checklist covering a diverse group of intensive care unit protocols and objectives would improve clinician consideration of these domains and b) if improved consideration would change practice patterns. Pre- and post observational study. A 24-bed surgical/burn/trauma intensive care unit in a teaching hospital. A total of 1399 patients admitted between June 2006 and May 2007. The first component of the study evaluated whether mandating verbal review of a checklist covering 14 intensive care unit best practices altered verbal consideration of these domains. Evaluation was performed using real-time bedside audits on morning rounds. The second component evaluated whether the checklist altered implementation of these domains by changing practice patterns. Evaluation was performed by analyzing data from the Project IMPACT database after patients left the intensive care unit. Verbal consideration of evaluable domains improved from 90.9% (530/583) to 99.7% (669/671, p < .0001) after verbal review of the checklist was mandated. Bedside consideration improved on the use of deep venous thrombosis prophylaxis (p < .05), stress ulcer prophylaxis (p < .01), oral care for ventilated patients (p < 0.01), electrolyte repletion (p < .01), initiation of physical therapy (p < .05), and documentation of restraint orders (p < .0001). Mandatory verbal review of the checklist resulted in a greater than two-fold increase in transferring patients out of the intensive care unit on telemetry (16% vs. 35%, p < .0001) and initiation of physical therapy (28% vs. 42%, p < .0001) compared with baseline practice. A mandatory verbal review of a checklist covering a wide range of objectives and goals at each patient's bedside is an effective method to improve both consideration and implementation of intensive care unit best practices. A bedside checklist is a simple, cost-effective method to prevent errors of omission in basic domains of intensive care unit management that might

  16. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  17. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  18. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  19. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    Science.gov (United States)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  20. A Web-Based Decision Tool to Improve Contraceptive Counseling for Women With Chronic Medical Conditions: Protocol For a Mixed Methods Implementation Study.

    Science.gov (United States)

    Wu, Justine P; Damschroder, Laura J; Fetters, Michael D; Zikmund-Fisher, Brian J; Crabtree, Benjamin F; Hudson, Shawna V; Ruffin, Mack T; Fucinari, Juliana; Kang, Minji; Taichman, L Susan; Creswell, John W

    2018-04-18

    Women with chronic medical conditions, such as diabetes and hypertension, have a higher risk of pregnancy-related complications compared with women without medical conditions and should be offered contraception if desired. Although evidence based guidelines for contraceptive selection in the presence of medical conditions are available via the United States Medical Eligibility Criteria (US MEC), these guidelines are underutilized. Research also supports the use of decision tools to promote shared decision making between patients and providers during contraceptive counseling. The overall goal of the MiHealth, MiChoice project is to design and implement a theory-driven, Web-based tool that incorporates the US MEC (provider-level intervention) within the vehicle of a contraceptive decision tool for women with chronic medical conditions (patient-level intervention) in community-based primary care settings (practice-level intervention). This will be a 3-phase study that includes a predesign phase, a design phase, and a testing phase in a randomized controlled trial. This study protocol describes phase 1 and aim 1, which is to determine patient-, provider-, and practice-level factors that are relevant to the design and implementation of the contraceptive decision tool. This is a mixed methods implementation study. To customize the delivery of the US MEC in the decision tool, we selected high-priority constructs from the Consolidated Framework for Implementation Research and the Theoretical Domains Framework to drive data collection and analysis at the practice and provider level, respectively. A conceptual model that incorporates constructs from the transtheoretical model and the health beliefs model undergirds patient-level data collection and analysis and will inform customization of the decision tool for this population. We will recruit 6 community-based primary care practices and conduct quantitative surveys and semistructured qualitative interviews with women who

  1. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  2. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  3. A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

    OpenAIRE

    Abdelmorhit E. Rhazi; Samuel Pierre; Hanifa Boucheneb

    2007-01-01

    The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the protocol detects several attacks, such as denial of service, incorrect execution and re-execution of...

  4. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    International Nuclear Information System (INIS)

    Wu, D; France, E; Lambert, J; Hinkle, J

    2016-01-01

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articles were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse

  5. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    Energy Technology Data Exchange (ETDEWEB)

    Wu, D; France, E; Lambert, J; Hinkle, J [The University of Oklahoma Health Sciences Center, Oklahoma City, OK (United States)

    2016-06-15

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articles were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse

  6. A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network

    Science.gov (United States)

    Han, Zhao; Wu, Jie; Zhang, Jie; Liu, Liefeng; Tian, Kaiyun

    2014-04-01

    Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long-life work time. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Researchers have proposed many protocols such as LEACH, HEED, PEGASIS, TBC and PEDAP. In this paper, we propose a General Self-Organized Tree-Based Energy-Balance routing protocol (GSTEB) which builds a routing tree using a process where, for each round, BS assigns a root node and broadcasts this selection to all sensor nodes. Subsequently, each node selects its parent by considering only itself and its neighbors' information, thus making GSTEB a dynamic protocol. Simulation results show that GSTEB has a better performance than other protocols in balancing energy consumption, thus prolonging the lifetime of WSN.

  7. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

    Directory of Open Access Journals (Sweden)

    Zhicai Shi

    2017-07-01

    Full Text Available A Radio Frequency Identification (RFID grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and efficiency, we propose a lightweight RFID grouping-proof protocol based on parallel mode and DHCP (Dynamic Host Configuration Protocol mechanism. Our protocol involves multiple readers and multiple tag groups. During the grouping-proof period, one reader and one tag group are chosen by the verifier by means of DHCP mechanism. When only a part of the tags of the chosen group exist, the protocol can also give the evidence of their co-existence. Our protocol utilizes parallel communication mode between reader and tags so as to ensure its grouping-proof efficiency. It only uses Hash function to complete the mutual authentication among verifier, readers and tags. It can preserve the privacy of the RFID system and resist the attacks such as eavesdropping, replay, trace and impersonation. Therefore the protocol is secure, flexible and efficient. It only uses some lightweight operations such as Hash function and a pseudorandom number generator. Therefore it is very suitable to some low-cost RFID systems.

  8. Making practice transparent through e-portfolio.

    Science.gov (United States)

    Stewart, Sarah M

    2013-12-01

    Midwives are required to maintain a professional portfolio as part of their statutory requirements. Some midwives are using open social networking tools and processes to develop an e-portfolio. However, confidentiality of patient and client data and professional reputation have to be taken into consideration when using online public spaces for reflection. There is little evidence about how midwives use social networking tools for ongoing learning. It is uncertain how reflecting in an e-portfolio with an audience impacts on learning outcomes. This paper investigates ways in which reflective midwifery practice be carried out using e-portfolio in open, social networking platforms using collaborative processes. Using an auto-ethnographic approach I explored my e-portfolio and selected posts that had attracted six or more comments. I used thematic analysis to identify themes within the textual conversations in the posts and responses posted by readers. The analysis identified that my collaborative e-portfolio had four themes: to provide commentary and discuss issues; to reflect and process learning; to seek advice, brainstorm and process ideas for practice, projects and research, and provide evidence of professional development. E-portfolio using open social networking tools and processes is a viable option for midwives because it facilitates collaborative reflection and shared learning. However, my experience shows that concerns about what people think, and client confidentiality does impact on the nature of open reflection and learning outcomes. I conclude this paper with a framework for managing midwifery statutory obligations using online public spaces and social networking tools. Copyright © 2013 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  9. [The intervention mapping protocol: A structured process to develop, implement and evaluate health promotion programs].

    Science.gov (United States)

    Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J

    2016-02-01

    Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.

  10. Applying the Intervention Mapping protocol to develop a kindergarten-based, family-involved intervention to increase European preschool children's physical activity levels: the ToyBox-study.

    Science.gov (United States)

    De Craemer, M; De Decker, E; De Bourdeaudhuij, I; Verloigne, M; Duvinage, K; Koletzko, B; Ibrügger, S; Kreichauf, S; Grammatikaki, E; Moreno, L; Iotova, V; Socha, P; Szott, K; Manios, Y; Cardon, G

    2014-08-01

    Although sufficient physical activity is beneficial for preschoolers' health, activity levels in most preschoolers are low. As preschoolers spend a considerable amount of time at home and at kindergarten, interventions should target both environments to increase their activity levels. The aim of the current paper was to describe the six different steps of the Intervention Mapping protocol towards the systematic development and implementation of the physical activity component of the ToyBox-intervention. This intervention is a kindergarten-based, family-involved intervention implemented across six European countries. Based on the results of literature reviews and focus groups with parents/caregivers and kindergarten teachers, matrices of change objectives were created. Then, theory-based methods and practical strategies were selected to develop intervention materials at three different levels: (i) individual level (preschoolers); (ii) interpersonal level (parents/caregivers) and (iii) organizational level (teachers). This resulted in a standardized intervention with room for local and cultural adaptations in each participating country. Although the Intervention Mapping protocol is a time-consuming process, using this systematic approach may lead to an increase in intervention effectiveness. The presented matrices of change objectives are useful for future programme planners to develop and implement an intervention based on the Intervention Mapping protocol to increase physical activity levels in preschoolers. © 2014 World Obesity.

  11. Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model Generation for ns-3

    Science.gov (United States)

    2015-12-01

    more protocols (especially at different layers of the OSI model ), implementing an inference engine to extract inter- and intrapacket dependencies, and...ARL-TR-7543 ● DEC 2015 US Army Research Laboratory Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model ...ICMP) Model Generation for ns-3 by Jaime C Acosta and Felipe Jovel Survivability/Lethality Analysis Directorate, ARL Felipe Sotelo and Caesar

  12. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  13. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  14. Alternating-Offers Protocol for Multi-issue Bilateral Negotiation in Semantic-Enabled Marketplaces

    Science.gov (United States)

    Ragone, Azzurra; di Noia, Tommaso; di Sciascio, Eugenio; Donini, Francesco M.

    We present a semantic-based approach to multi-issue bilateral negotiation for e-commerce. We use Description Logics to model advertisements, and relations among issues as axioms in a TBox. We then introduce a logic-based alternating-offers protocol, able to handle conflicting information, that merges non-standard reasoning services in Description Logics with utility thoery to find the most suitable agreements. We illustrate and motivate the theoretical framework, the logical language, and the negotiation protocol.

  15. Evaluation of sexual history-based screening of anatomic sites for chlamydia trachomatis and neisseria gonorrhoeae infection in men having sex with men in routine practice

    Directory of Open Access Journals (Sweden)

    Jansen Casper L

    2011-07-01

    Full Text Available Abstract Background Sexually transmitted infection (STI screening programmes are implemented in many countries to decrease burden of STI and to improve sexual health. Screening for Chlamydia trachomatis and Neisseria gonorrhoeae has a prominent role in these protocols. Most of the screening programmes concerning men having sex with men (MSM are based on opportunistic urethral testing. In The Netherlands, a history-based approach is used. The aim of this study is to evaluate the protocol of screening anatomic sites for C. trachomatis and N. gonorrhoeae infection based on sexual history in MSM in routine practice in The Netherlands. Methods All MSM visiting the clinic for STI in The Hague are routinely asked about their sexual practice during consulting. As per protocol, tests for urogenital, oropharyngeal and anorectal infection are obtained based on reported site(s of sexual contact. All consultations are entered into a database as part of the national STI monitoring system. Data of an 18 months period were retrieved from this database and analysed. Results A total of 1455 consultations in MSM were registered during the study period. The prevalence of C. trachomatis and N. gonorrhoeae per anatomic site was: urethral infection 4.0% respectively and 2.8%, oropharynx 1.5% and 4.2%, and anorectum 8.2% and 6.0%. The majority of chlamydia cases (72% involved a single anatomic site, which was especially manifest for anorectal infections (79%, while 42% of gonorrhoea cases were single site. Twenty-six percent of MSM with anorectal chlamydia and 17% with anorectal gonorrhoea reported symptoms of proctitis; none of the oropharyngeal infections were symptomatic. Most cases of anorectal infection (83% and oropharyngeal infection (100% would have remained undiagnosed with a symptom-based protocol. Conclusions The current strategy of sexual-history based screening of multiple anatomic sites for chlamydia and gonorrhoea in MSM is a useful and valid guideline

  16. Research and Implementation of Collision Detection Based on Modbus Protocol

    Directory of Open Access Journals (Sweden)

    Yinglan Fang

    2013-01-01

    Full Text Available In order to solve the communication errors resulted by traditional working condition multi-platform device communication using the custom protocol communication and link congestion malpractice brought by retransmission, it ensures network communication using time-sharing communication conflict detection based on mature Modbus protocol. Thereby it enhances the stability of the entire system during operation process, and provides simple, efficient, stable business specification interface for the future expansion of the system. After a comprehensive evaluation and analysis of system communication messages before and after improvement, system comprehensive evaluation target has improved. While the system is more flexible to modular design, develop transparent, structure open side and has a broad application prospects.

  17. The History of Evidence-Based Practice in Nursing Education and Practice.

    Science.gov (United States)

    Mackey, April; Bassendowski, Sandra

    Beginning with Florence Nightingale in the 1800s and evolving again within the medical community, evidence-based practice continues to advance along with the nursing discipline. Evidence-based practice is foundational to undergraduate and graduate nursing education and is a way for the nursing discipline to minimize the theory to practice gap. This article discusses the concept of evidence-based practice from a historical perspective as it relates to nursing in the educational and practice domains. The concept evidence-based practice is defined, and the similarities and differences to evidence-based medicine are discussed. It is crucial that registered nurses be proactive in their quest for research knowledge, so the gap between theory and practice continues to close. Utilizing nursing best practice guidelines, reviewing and implementing applicable research evidence, and taking advantage of technological advances are all ways in which nursing can move forward as a well-informed discipline. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. Cluster chain based energy efficient routing protocol for moblie WSN

    Directory of Open Access Journals (Sweden)

    WU Ziyu

    2016-04-01

    Full Text Available With the ubiquitous smart devices acting as mobile sensor nodes in the wireless sensor networks(WSNs to sense and transmit physical information,routing protocols should be designed to accommodate the mobility issues,in addition to conventional considerations on energy efficiency.However,due to frequent topology change,traditional routing schemes cannot perform well.Moreover,existence of mobile nodes poses new challenges on energy dissipation and packet loss.In this paper,a novel routing scheme called cluster chain based routing protocol(CCBRP is proposed,which employs a combination of cluster and chain structure to accomplish data collection and transmission and thereafter selects qualified cluster heads as chain leaders to transmit data to the sink.Furthermore,node mobility is handled based on periodical membership update of mobile nodes.Simulation results demonstrate that CCBRP has a good performance in terms of network lifetime and packet delivery,also strikes a better balance between successful packet reception and energy consumption.

  19. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    Directory of Open Access Journals (Sweden)

    Gongliang Liu

    2014-01-01

    Full Text Available In order to overcome the shortcomings of existing medium access control (MAC protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  20. A reliable, practical, and economical protocol for inducing diarrhea and severe dehydration in the neonatal calf.

    OpenAIRE

    Walker, P G; Constable, P D; Morin, D E; Drackley, J K; Foreman, J H; Thurmon, J C

    1998-01-01

    Fifteen healthy, colostrum-fed, male dairy calves, aged 2 to 7 d were used in a study to develop a diarrhea protocol for neonatal calves that is reliable, practical, and economical. After instrumentation and recording baseline data, diarrhea and dehydration were induced by administering milk replacer [16.5 mL/kg of body weight (BW), PO], sucrose (2 g/kg in a 20% aqueous solution, p.o.), spironolactone and hydrochlorothiazide (1 mg/kg, PO) every 8 h, and furosemide (2 mg/kg, i.m., q6h). Calves...

  1. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  2. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  3. AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzad Kiani

    2016-01-01

    Full Text Available Energy issue is one of the most important problems in wireless sensor networks. They consist of low-power sensor nodes and a few base station nodes. They must be adaptive and efficient in data transmission to sink in various areas. This paper proposes an aware-routing protocol based on clustering and recursive search approaches. The paper focuses on the energy efficiency issue with various measures such as prolonging network lifetime along with reducing energy consumption in the sensor nodes and increasing the system reliability. Our proposed protocol consists of two phases. In the first phase (network development phase, the sensors are placed into virtual layers. The second phase (data transmission is related to routes discovery and data transferring so it is based on virtual-based Classic-RBFS algorithm in the lake of energy problem environments but, in the nonchargeable environments, all nodes in each layer can be modeled as a random graph and then begin to be managed by the duty cycle method. Additionally, the protocol uses new topology control, data aggregation, and sleep/wake-up schemas for energy saving in the network. The simulation results show that the proposed protocol is optimal in the network lifetime and packet delivery parameters according to the present protocols.

  4. A security and privacy preserving e-prescription system based on smart cards.

    Science.gov (United States)

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  5. Comparison of IAEA protocols for clinical electron beam dosimetry

    International Nuclear Information System (INIS)

    Novotny, J.; Soukup, M.

    2002-01-01

    In most beam calibration protocols so far used in clinical practice, the method recommended for the determination of absorbed dose to water in high-energy electron beams is based on either an exposure or an air kerma calibration factor of an ionisation chamber in a C0 60 gamma-ray or 2 MV x-ray beam. These protocols are complex and the overall uncertainty in the absorbed dose to water under reference conditions is about 3-4%. The new generation of protocols, namely IAEA TRS 398, are based on absorbed dose-to-water standards in photon beams from Co 60 and accelerator beams. The possible errors in absorbed dose determination in reference conditions in practical clinical dosimetry caused by replacement of TRS 277 and TRS 381 protocols for a new TRS 398 protocol were carefully studied for clinical electron beams in energy range 6-20 MeV. All measurements were performed on Varian CLINAC 2100 C linear accelerator. The electron beam energy ranged from 6 to 20 MeV. Basically three different detectors were used for measurements: PTW Roos plane-parallel ionization chamber, calibrated PTW 30002 Farmer type, ionization, Scanditronix electron diode detector. Measurements of central axis percentage depth doses were made by diode using Wellhoefer WP700 beam scanner in 40 cm x 40 cm x 50 cm water phantom. A reference chamber or semiconductor diode mounted on electron treatment cone was used to correct beam output variations for a chamber or diode measurements during scanning. Absolute dose measurements were carried out with Roos plane-parallel chamber connected to PTW UNIDOS electrometer always for preselected number of monitor units. In a new IAEA dosimetry protocol clinical reference dosimetry for electron beam is performed at depth of d ref = 0.6R 50 - 0.1 [cm] instead of d max as in previous ones. To check the stability of electron beams for energy and to establish d ref and standard deviation for reference depth position, the depth dose curves obtained during the quality

  6. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  7. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  8. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    Science.gov (United States)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  9. ANÁLISES DE PROTOCOLOS TELETERÁPICOS DE CONTROLE DE QUALIDADE DE ALGUNS SERVIÇOS LOCAIS, BASEADOS NO TG40 E ARCAL XXX Routine teletherapy quality control protocols based on TG40 and ARCAL XXX

    Directory of Open Access Journals (Sweden)

    Carmen S. Guzmán Calcina

    2002-01-01

    Full Text Available Considerando a importância da garantia da qualidade nos serviços de radioterapia, este trabalho tem como primeiro objetivo fazer uma avaliação dos testes propostos pelos protocolos oficiais internacionais TG40 e ARCAL XXX para os equipamentos de cobalto, acelerador linear e simulador. O segundo objetivo consistiu em se fazer uma avaliação dos testes que atualmente são realizados por alguns serviços de radioterapia nacionais e da América Latina, comparando-os com os apresentados nos protocolos citados. Dos resultados obtidos, observou-se que embora o TG40 apresente os testes básicos necessários para um controle de qualidade adequado, o ARCAL ainda sugere testes complementares. Dos resultados e discussões, concluiu-se que é necessário que os serviços de radioterapia implementem os testes de controle de qualidade básicos e indispensáveis aos seus equipamentos, e que os demais testes sejam implementados de acordo com as suas necessidades e disponibilidades. Como produto deste estudo, sugestões de protocolos são apresentadas para o trabalho de rotina, provenientes da fusão dos protocolos analisados.In view of the great importance of quality control in radiotherapy services, this paper aimed primarily to evaluate the tests recommended by international protocols TG40 and ARCAL XXX for teletherapic equipments (cobalt, linear accelerator and simulator. A second objective was to evaluate the tests currently used in some radiotherapy services in Brazil and Latin America and to compare these tests with the ones recommended by the international protocols. Our results suggest that ARCAL is more complete than TG40, although the latter includes all the essential basic tests. We concluded that radiotherapy services should implement all basic quality control tests and that all other complementary tests should be implemented according to the need of each service. Finally, suggestions of protocols are presented, elaborated from the official and

  10. Effectiveness of enhanced cognitive behavioral therapy (CBT-E) for eating disorders: study protocol for a randomized controlled trial.

    Science.gov (United States)

    de Jong, Martie; Korrelboom, Kees; van der Meer, Iris; Deen, Mathijs; Hoek, Hans W; Spinhoven, Philip

    2016-12-03

    While eating disorder not otherwise specified (EDNOS) is the most common eating disorder (ED) diagnosis in routine clinical practice, no specific treatment methods for this diagnosis have yet been developed and studied. Enhanced cognitive behavioral therapy (CBT-E) has been described and put to the test as a transdiagnostic treatment protocol for all EDs, including EDNOS. Initial research in the UK suggests that CBT-E is more effective for EDs, especially bulimia nervosa (BN) and EDNOS, than the earlier version of CBT. These positive results of CBT-E have to be replicated in more detail, preferably by independent researchers in different countries. Being the first Dutch study into CBT-E, the results from this national multicenter study - on three sites specialized in EDs - will deliver important information about the effectiveness of CBT-E in several domains of ED pathology, while providing input for the upcoming update of the Dutch Multidisciplinary Guideline for the Treatment of Eating Disorders. A multicenter randomized controlled trial will be conducted. One hundred and thirty-two adult outpatients (aged 18 years and older) with an ED diagnosis and a Body Mass index (BMI) of between 17.5 and 40 will be randomly allocated to the control or the intervention group. Subjects in the control group will receive Treatment as Usual (standard outpatient treatment provided at the participating sites). Subjects in the intervention group will receive 20 sessions of CBT-E in 20 weeks. The design is a 2 (group) × 5 (time) repeated measures factorial design in which neither therapists nor patients will be blinded for treatment allocation. The primary outcome measure is recovery from the ED. Secondary outcome measures include ED psychopathology, common mental disorders, anxiety and depressive symptoms, health-related quality of life, health care use and productivity loss. Self-esteem, perfectionism and interpersonal problems will be examined as putative predictors and

  11. Medical Assistant-based care management for high risk patients in small primary care practices

    DEFF Research Database (Denmark)

    Freund, Tobias; Peters-Klimm, Frank; Boyd, Cynthia M.

    2016-01-01

    Background: Patients with multiple chronic conditions are at high risk of potentially avoidable hospital admissions, which may be reduced by care coordination and self-management support. Medical assistants are an increasingly available resource for patient care in primary care practices. Objective......: To determine whether protocol-based care management delivered by medical assistants improves patient care in patients at high risk of future hospitalization in primary care. Design: Two-year cluster randomized clinical trial. Setting: 115 primary care practices in Germany. Patients: 2,076 patients with type 2......, and monitoring delivered by medical assistants with usual care. Measurements: All-cause hospitalizations at 12 months (primary outcome) and quality of life scores (Short Form 12 Health Questionnaire [SF-12] and the Euroqol instrument [EQ-5D]). Results: Included patients had, on average, four co-occurring chronic...

  12. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  13. Hepatocellular carcinoma: From clinical practice to evidence-based treatment protocols

    Science.gov (United States)

    Galun, Danijel; Basaric, Dragan; Zuvela, Marinko; Bulajic, Predrag; Bogdanovic, Aleksandar; Bidzic, Nemanja; Milicevic, Miroslav

    2015-01-01

    Hepatocellular carcinoma (HCC) is one of the major malignant diseases in many healthcare systems. The growing number of new cases diagnosed each year is nearly equal to the number of deaths from this cancer. Worldwide, HCC is a leading cause of cancer-related deaths, as it is the fifth most common cancer and the third most important cause of cancer related death in men. Among various risk factors the two are prevailing: viral hepatitis, namely chronic hepatitis C virus is a well-established risk factor contributing to the rising incidence of HCC. The epidemic of obesity and the metabolic syndrome, not only in the United States but also in Asia, tend to become the leading cause of the long-term rise in the HCC incidence. Today, the diagnosis of HCC is established within the national surveillance programs in developed countries while the diagnosis of symptomatic, advanced stage disease still remains the characteristic of underdeveloped countries. Although many different staging systems have been developed and evaluated the Barcelona-Clinic Liver Cancer staging system has emerged as the most useful to guide HCC treatment. Treatment allocation should be decided by a multidisciplinary board involving hepatologists, pathologists, radiologists, liver surgeons and oncologists guided by personalized -based medicine. This approach is important not only to balance between different oncologic treatments strategies but also due to the complexity of the disease (chronic liver disease and the cancer) and due to the large number of potentially efficient therapies. Careful patient selection and a tailored treatment modality for every patient, either potentially curative (surgical treatment and tumor ablation) or palliative (transarterial therapy, radioembolization and medical treatment, i.e., sorafenib) is mandatory to achieve the best treatment outcome. PMID:26380652

  14. Self-testing protocols based on the chained Bell inequalities

    International Nuclear Information System (INIS)

    Šupić, I; Augusiak, R; Salavrakos, A; Acín, A

    2016-01-01

    Self-testing is a device-independent technique based on non-local correlations whose aim is to certify the effective uniqueness of the quantum state and measurements needed to produce these correlations. It is known that the maximal violation of some Bell inequalities suffices for this purpose. However, most of the existing self-testing protocols for two devices exploit the well-known Clauser–Horne–Shimony–Holt Bell inequality or modifications of it, and always with two measurements per party. Here, we generalize the previous results by demonstrating that one can construct self-testing protocols based on the chained Bell inequalities, defined for two devices implementing an arbitrary number of two-output measurements. On the one hand, this proves that the quantum state and measurements leading to the maximal violation of the chained Bell inequality are unique. On the other hand, in the limit of a large number of measurements, our approach allows one to self-test the entire plane of measurements spanned by the Pauli matrices X and Z. Our results also imply that the chained Bell inequalities can be used to certify two bits of perfect randomness. (paper)

  15. Current practices in long-term video-EEG monitoring services: A survey among partners of the E-PILEPSY pilot network of reference for refractory epilepsy and epilepsy surgery.

    Science.gov (United States)

    Kobulashvili, Teia; Höfler, Julia; Dobesberger, Judith; Ernst, Florian; Ryvlin, Philippe; Cross, J Helen; Braun, Kees; Dimova, Petia; Francione, Stefano; Hecimovic, Hrvoje; Helmstaedter, Christoph; Kimiskidis, Vasilios K; Lossius, Morten Ingvar; Malmgren, Kristina; Marusic, Petr; Steinhoff, Bernhard J; Boon, Paul; Craiu, Dana; Delanty, Norman; Fabo, Daniel; Gil-Nagel, Antonio; Guekht, Alla; Hirsch, Edouard; Kalviainen, Reetta; Mameniskiené, Ruta; Özkara, Çiğdem; Seeck, Margitta; Rubboli, Guido; Krsek, Pavel; Rheims, Sylvain; Trinka, Eugen

    2016-05-01

    The European Union-funded E-PILEPSY network aims to improve awareness of, and accessibility to, epilepsy surgery across Europe. In this study we assessed current clinical practices in epilepsy monitoring units (EMUs) in the participating centers. A 60-item web-based survey was distributed to 25 centers (27 EMUs) of the E-PILEPSY network across 22 European countries. The questionnaire was designed to evaluate the characteristics of EMUs, including organizational aspects, admission, and observation of patients, procedures performed, safety issues, cost, and reimbursement. Complete responses were received from all (100%) EMUs surveyed. Continuous observation of patients was performed in 22 (81%) EMUs during regular working hours, and in 17 EMUs (63%) outside of regular working hours. Fifteen (56%) EMUs requested a signed informed consent before admission. All EMUs performed tapering/withdrawal of antiepileptic drugs, 14 (52%) prior to admission to an EMU. Specific protocols on antiepileptic drugs (AED) tapering were available in four (15%) EMUs. Standardized Operating Procedures (SOP) for the treatment of seizure clusters and status epilepticus were available in 16 (59%). Safety measures implemented by EMUs were: alarm seizure buttons in 21 (78%), restricted patient's ambulation in 19 (70%), guard rails in 16 (59%), and specially designated bathrooms in 7 (26%). Average costs for one inpatient day in EMU ranged between 100 and 2200 Euros. This study shows a considerable diversity in the organization and practice patterns across European epilepsy monitoring units. The collected data may contribute to the development and implementation of evidence-based recommended practices in LTM services across Europe. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  16. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol.

    Science.gov (United States)

    Bennell, Kim L; Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Abbott, J Haxby; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S

    2015-10-01

    Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist-instructed home exercise leads to greater reductions in pain and improvements in function. An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. The study will be conducted in a community setting. The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. A self-reported diagnosis of persistent hip pain will be used. The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist-instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative

  17. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    Science.gov (United States)

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  18. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-12-01

    Full Text Available Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN. Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS. This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime

  19. CASES ON GLOBAL E-LEARNING PRACTICES:Successes and Pitfalls

    OpenAIRE

    Reviewed by Yavuz AKBULUT

    2007-01-01

    “Cases on Global E-Learning Practices: Successes and Pitfalls” look into the global practices of e-learning which has assumed a considerable role in the education sector recently. It is edited by Ramesh C. Sharma and Sanjaya Mishra from Indira Gandhi National Open University in New Delhi, India. It is published by Information Science Publishing, which is an imprint of Idea Group, an international publishing company specializing in research publications in the fields of technology, management ...

  20. Evidence based practice readiness: A concept analysis.

    Science.gov (United States)

    Schaefer, Jessica D; Welton, John M

    2018-01-15

    To analyse and define the concept "evidence based practice readiness" in nurses. Evidence based practice readiness is a term commonly used in health literature, but without a clear understanding of what readiness means. Concept analysis is needed to define the meaning of evidence based practice readiness. A concept analysis was conducted using Walker and Avant's method to clarify the defining attributes of evidence based practice readiness as well as antecedents and consequences. A Boolean search of PubMed and Cumulative Index for Nursing and Allied Health Literature was conducted and limited to those published after the year 2000. Eleven articles met the inclusion criteria for this analysis. Evidence based practice readiness incorporates personal and organisational readiness. Antecedents include the ability to recognize the need for evidence based practice, ability to access and interpret evidence based practice, and a supportive environment. The concept analysis demonstrates the complexity of the concept and its implications for nursing practice. The four pillars of evidence based practice readiness: nursing, training, equipping and leadership support are necessary to achieve evidence based practice readiness. Nurse managers are in the position to address all elements of evidence based practice readiness. Creating an environment that fosters evidence based practice can improve patient outcomes, decreased health care cost, increase nurses' job satisfaction and decrease nursing turnover. © 2018 John Wiley & Sons Ltd.

  1. Professionalism and evidence-based practice

    DEFF Research Database (Denmark)

    Rasmussen, Palle

    2015-01-01

    of evidence- based methods in Danish pre-school education and care. The management sees the use of these methods as strengthening pre- school teacher professionalism, but the actual practices in the day-careinstitutions are ambiguous. In some cases, using the methods becomes an end in itself and tends......The idea of evidence- based practice is influential in public welfare services, including education. The idea is controversial, however, not least because it involves a poten tial redefinition of the relation ship between knowledge, authority and professionalism. This is discussed based on a study...... to displace important educational objectives. In other cases, the methods are reflectively adjusted to a given context. Used in this way only, evid ence-based practice and methodology is a valuable resource for professional practice in education. From such a perspective, at least some types of research based...

  2. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  3. Protocol for a systematic review with network meta-analysis of the modalities used to deliver eHealth interventions for chronic pain.

    Science.gov (United States)

    Slattery, Brian W; Haugh, Stephanie; Francis, Kady; O'Connor, Laura; Barrett, Katie; Dwyer, Christopher P; O'Higgins, Siobhan; Egan, Jonathan; McGuire, Brian E

    2017-03-03

    As eHealth interventions prove both efficacious and practical, and as they arguably overcome certain barriers encountered by traditional face-to-face treatment for chronic pain, their number has increased dramatically in recent times. However, there is a dearth of research that focuses on evaluating and comparing the different types of technology-assisted interventions. This is a protocol for a systematic review that aims to evaluate the eHealth modalities in the context of psychological and non-psychological (other than non-drug) interventions for chronic pain. We will search the Cochrane Central Register of Controlled Trials (CENTRAL: The Cochrane Library), MEDLINE, Embase and PsycINFO. Randomised controlled trials (RCTs) with more than 20 participants per trial arm that have evaluated non-drug psychological or non-psychological interventions delivered via an eHealth modality and have pain as an outcome measure will be included. Two review authors will independently extract data and assess the study suitability in accordance with the Cochrane Collaboration Risk of Bias Tool. Studies will be included if they measure at least one outcome variable in accordance with the IMMPACT guidelines (i.e. pain severity, pain interference, physical functioning, symptoms, emotional functioning, global improvement and disposition). Secondary outcomes will be measures of depression and health-related quality of life (HRQoL). A network meta-analysis will be conducted based on direct comparisons to generate indirect comparisons of modalities across treatment trials, which will return rankings for the eHealth modalities in terms of their effectiveness. Most trials that use an eHealth intervention to manage chronic pain typically use one modality. As a result, little evidence exists to support which modality type is the most effective. The current review will address this gap in the literature and compare the different eHealth modalities used for technology-assisted interventions for

  4. A Rule-Based Data Transfer Protocol for On-Demand Data Exchange in Vehicular Environment

    Directory of Open Access Journals (Sweden)

    Liao Hsien-Chou

    2009-01-01

    Full Text Available The purpose of Intelligent Transport System (ITS is mainly to increase the driving safety and efficiency. Data exchange is an important way to achieve the purpose. An on-demand data exchange is especially useful to assist a driver avoiding some emergent events. In order to handle the data exchange under dynamic situations, a rule-based data transfer protocol is proposed in this paper. A set of rules is designed according to the principle of request-forward-reply (RFR. That is, they are used to determine the timing of data broadcasting, forwarding, and replying automatically. Two typical situations are used to demonstrate the operation of rules. One is the front view of a driver occluded by other vehicles. The other is the traffic jam. The proposed protocol is flexible and extensible for unforeseen situations. Three simulation tools were also implemented to demonstrate the feasibility of the protocol and measure the network transmission under high density of vehicles. The simulation results show that the rule-based protocol is efficient on data exchange to increase the driving safety.

  5. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  6. On the security of a novel key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Xiang Tao; Wong, K.-W.; Liao Xiaofeng

    2009-01-01

    Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.'s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

  7. Managing symptoms during cancer treatments: evaluating the implementation of evidence-informed remote support protocols

    Directory of Open Access Journals (Sweden)

    Stacey Dawn

    2012-11-01

    Full Text Available Abstract Background Management of cancer treatment-related symptoms is an important safety issue given that symptoms can become life-threatening and often occur when patients are at home. With funding from the Canadian Partnership Against Cancer, a pan-Canadian steering committee was established with representation from eight provinces to develop symptom protocols using a rigorous methodology (CAN-IMPLEMENT©. Each protocol is based on a systematic review of the literature to identify relevant clinical practice guidelines. Protocols were validated by cancer nurses from across Canada. The aim of this study is to build an effective and sustainable approach for implementing evidence-informed protocols for nurses to use when providing remote symptom assessment, triage, and guidance in self-management for patients experiencing symptoms while undergoing cancer treatments. Methods A prospective mixed-methods study design will be used. Guided by the Knowledge to Action Framework, the study will involve (a establishing an advisory knowledge user team in each of three targeted settings; (b assessing factors influencing nurses’ use of protocols using interviews/focus groups and a standardized survey instrument; (c adapting protocols for local use, ensuring fidelity of the content; (d selecting intervention strategies to overcome known barriers and implementing the protocols; (e conducting think-aloud usability testing; (f evaluating protocol use and outcomes by conducting an audit of 100 randomly selected charts at each of the three settings; and (g assessing satisfaction with remote support using symptom protocols and change in nurses’ barriers to use using survey instruments. The primary outcome is sustained use of the protocols, defined as use in 75% of the calls. Descriptive analysis will be conducted for the barriers, use of protocols, and chart audit outcomes. Content analysis will be conducted on interviews/focus groups and usability testing

  8. Secure E-payment Protocol

    OpenAIRE

    Sattar J Aboud

    2009-01-01

    The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost of workers andcommunications falls down considerably while the cost of trusted authority andprotecting information is increased. E-payment is now ...

  9. Evidence-based Practice of Radiology.

    Science.gov (United States)

    Lavelle, Lisa P; Dunne, Ruth M; Carroll, Anne G; Malone, Dermot E

    2015-10-01

    Current health care reform in the United States is producing a shift in radiology practice from the traditional volume-based role of performing and interpreting a large number of examinations to providing a more affordable and higher-quality service centered on patient outcomes, which is described as a value-based approach to the provision of health care services. In the 1990 s, evidence-based medicine was defined as the integration of current best evidence with clinical expertise and patient values. When these methods are applied outside internal medicine, the process is called evidence-based practice (EBP). EBP facilitates understanding, interpretation, and application of the best current evidence into radiology practice, which optimizes patient care. It has been incorporated into "Practice-based Learning and Improvement" and "Systems-based Practice," which are two of the six core resident competencies of the Accreditation Council for Graduate Medical Education and two of the 12 American Board of Radiology milestones for diagnostic radiology. Noninterpretive skills, such as systems-based practice, are also formally assessed in the "Quality and Safety" section of the American Board of Radiology Core and Certifying examinations. This article describes (a) the EBP framework, with particular focus on its relevance to the American Board of Radiology certification and maintenance of certification curricula; (b) how EBP can be integrated into a residency program; and (c) the current value and likely place of EBP in the radiology information technology infrastructure. Online supplemental material is available for this article. © RSNA, 2015.

  10. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  11. Comparison of Greenhouse Gas Offset Quantification Protocols for Nitrogen Management in Dryland Wheat Cropping Systems of the Pacific Northwest

    Directory of Open Access Journals (Sweden)

    Tabitha T. Brown

    2017-11-01

    Full Text Available In the carbon market, greenhouse gas (GHG offset protocols need to ensure that emission reductions are of high quality, quantifiable, and real. Lack of consistency across protocols for quantifying emission reductions compromise the credibility of offsets generated. Thus, protocol quantification methodologies need to be periodically reviewed to ensure emission offsets are credited accurately and updated to support practical climate policy solutions. Current GHG emission offset credits generated by agricultural nitrogen (N management activities are based on reducing the annual N fertilizer application rate for a given crop without reducing yield. We performed a “road test” of agricultural N management protocols to evaluate differences among protocol components and quantify nitrous oxide (N2O emission reductions under sample projects relevant to N management in dryland, wheat-based cropping systems of the inland Pacific Northwest (iPNW. We evaluated five agricultural N management offset protocols applicable to North America: two methodologies of American Carbon Registry (ACR1 and ACR2, Verified Carbon Standard (VCS, Climate Action Reserve (CAR, and Alberta Offset Credit System (Alberta. We found that only two protocols, ACR2 and VCS, were suitable for this study, in which four sample projects were developed representing feasible N fertilizer rate reduction activities. The ACR2 and VCS protocols had identical baseline and project emission quantification methodologies resulting in identical emission reduction values. Reducing N fertilizer application rate by switching to variable rate N (sample projects 1–3 or split N application (sample project 4 management resulted in a N2O emission reduction ranging from 0.07 to 0.16, and 0.26 Mg CO2e ha−1, respectively. Across the range of C prices considered ($5, $10, and $50 per metric ton of CO2 equivalent, we concluded that the N2O emission offset payment alone ($0.35–$13.0 ha−1 was unlikely to

  12. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  13. Introduction to basic immunological methods : Generalities, Principles, Protocols and Variants of basic protocols

    International Nuclear Information System (INIS)

    Mejri, Naceur

    2013-01-01

    This manuscript is dedicated to student of biological sciences. It provides the information necessary to perform practical works, the most commonly used in immunology. During my doctoral and post-doctoral periods, panoply of methods was employed in diverse subjects in my research. Technical means used in my investigations were diverse enough that i could extract a set of techniques that cover most the basic immunological methods. Each chapter of this manuscript contains a fairly complete description of immunological methods. In each topic the basic protocol and its variants were preceded by background information provided in paragraphs concerning the principle and generalities. The emphasis is placed on describing situations in which each method and its variants were used. These basic immunological methods are useful for students and even researchers studying the immune system of human, nice and other species. Different subjects showed not only detailed protocols but also photos or/and shemas used as support to illustrate some knowledge or practical knowledge. I hope that students will find this manual interesting, easy to use contains necessary information to acquire skills in immunological practice. (Author)

  14. A protocol for developing a clinical practice guideline for intra-articular injection for treating knee osteoarthritis

    Directory of Open Access Journals (Sweden)

    Dan Xing

    2018-01-01

    Ethics and dissemination: The protocol will provide us a roadmap to systematically develop evidence-based CPG for intra-articular injection for knee OA. The work will be disseminated electronically and in print. The guideline would be the first CPG that is developed primarily by orthopedic specialists in China and strictly based on systematic methodology.

  15. Protocol for a randomised controlled trial investigating the effectiveness of an online e health application for the prevention of Generalised Anxiety Disorder

    Directory of Open Access Journals (Sweden)

    Kenardy Justin

    2010-03-01

    Full Text Available Abstract Background Generalised Anxiety Disorder (GAD is a highly prevalent psychiatric disorder. Effective prevention in young adulthood has the potential to reduce the prevalence of the disorder, to reduce disability and lower the costs of the disorder to the community. The present trial (the WebGAD trial aims to evaluate the effectiveness of an evidence-based online prevention website for GAD. Methods/Design The principal clinical question under investigation is the effectiveness of an online GAD intervention (E-couch using a community-based sample. We examine whether the effect of the intervention can be maximised by either human support, in the form of telephone calls, or by automated support through emails. The primary outcome will be a reduction in symptoms on the GAD-7 in the active arms relative to the non active intervention arms. Discussion The WebGAD trial will be the first to evaluate the use of an internet-based cognitive behavioural therapy (CBT program contrasted with a credible control condition for the prevention of GAD and the first formal RCT evaluation of a web-based program for GAD using community recruitment. In general, internet-based CBT programs have been shown to be effective for the treatment of other anxiety disorders such as Post Traumatic Stress Disorder, Social Phobia, Panic Disorder and stress in clinical trials; however there is no evidence for the use of internet CBT in the prevention of GAD. Given the severe shortage of therapists identified in Australia and overseas, and the low rates of treatment seeking in those with a mental illness, the successful implementation of this protocol has important practical outcomes. If found to be effective, WebGAD will provide those experiencing GAD with an easily accessible, free, evidence-based prevention tool which can be promoted and disseminated immediately. Trial Registration Controlled-trials.com: ISRCTN76298775

  16. Application for automatic e-mail forwarding

    OpenAIRE

    Skupek, Rok

    2010-01-01

    The diploma thesis has two main goals: the first objective is to develop a dynamic library, which will contain methods able to download e-mail messages from mail server using POP3 protocol. The second objective involves development of application for processing and distribution of e-mail messages. Introduction cointains presentation of a practical application example in real time situation. Here are described procedures used for development of server - client communication library, which u...

  17. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  18. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  19. Association of eHealth literacy with colorectal cancer knowledge and screening practice among internet users in Japan.

    Science.gov (United States)

    Mitsutake, Seigo; Shibata, Ai; Ishii, Kaori; Oka, Koichiro

    2012-11-13

    In rapidly developing Internet-user societies, eHealth literacy has become important in promoting wellness. Although previous studies have observed that poor health literacy is associated with less knowledge and screening practice of colorectal cancer (CRC), little is known about whether eHealth literacy is associated with these variables. The present study examined associations between eHealth literacy, knowledge of CRC, and CRC screening practices. Data were analyzed for 2970 Japanese adults (men, 49.9%; mean age±SD, 39.7±10.9 years) who responded to an Internet-based cross-sectional survey. Knowledge of the definition of CRC, its risk factors and screening practice, previous experience of CRC screening, score on the Japanese version of the eHEALS (J-eHEALS), sociodemographic attributes (sex, age, marital status, educational attainment, and household income level), and frequency of Internet usage were obtained. Sociodemographic attributes and frequency of Internet usage were used as control variables in the multiple regression and logistic regression models. eHealth literacy was positively associated with CRC knowledge (β=.116, increase of 1 point in the eHEALS score signified that participants were 1.03 times (95% CI=1.01-1.05) more likely to undergo CRC screening. Internet users with high eHealth literacy are more likely to have knowledge and previous screening practice related to CRC compared to those with low eHealth literacy.

  20. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    Science.gov (United States)

    Taylor, M. B.; Boch, T.; Taylor, J.

    2015-06-01

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  1. Psychometric Properties and U.S. National Norms of the Evidence-Based Practice Attitude Scale (EBPAS)

    Science.gov (United States)

    Aarons, Gregory A.; Glisson, Charles; Hoagwood, Kimberly; Kelleher, Kelly; Landsverk, John; Cafri, Guy

    2010-01-01

    The Evidence-Based Practice Attitude Scale (EBPAS) assesses mental health and social service provider attitudes toward adopting evidence-based practices. Scores on the EBPAS derive from 4 subscales (i.e., Appeal, Requirements, Openness, and Divergence) as well as the total scale, and preliminary studies have linked EBPAS scores to clinic structure…

  2. Mistakes, Errors and Foul-Ups: Practice-Based Evidence for Evidence Based Practice

    Directory of Open Access Journals (Sweden)

    Mark Turner

    2016-11-01

    Full Text Available In human medicine, the management of care to ensure safety for the service-user constitutes an important element of the patient ‘journey.’ The name given to this discipline is patient safety. It is founded upon those elements of good medical practice which help avoid or mitigate human error.  Investigations in the U.S. first highlighted the alarming extent of medical error: Brennan et al. (1991 concluded that in the state of New York, the overall rate of adverse events was approximately 4% for hospitalised patients, which equated to over 13,000 deaths a year. Doctors looked to other safety critical industries and aviation in particular (Reason 1995, to address this phenomenon: there is now a wealth of research on the impact of various safety initiatives on measurable rates of harm. The World Health Organisation’s ‘Safe Surgery Saves Lives’ initiative - a campaign that advocates the use of a surgical checklist to standardise aspects of peri-operative care - is one example of aviation methodology successfully employed in a clinical setting (van Klei et al. 2012. The critical importance of effective communication, leadership and situational awareness has also been discussed at length in the human patient safety literature.ObjectivesVeterinary patient safety is an analogous discipline and researchers have attempted to understand more about the topic of veterinary medical error. However, the evidence-base for veterinary patient safety is sparse.  This presentation aims to summarise the evidence to date and highlight the benefits in practice of an emerging subject. MethodA search of the terms veterinary patient safety on the PubMed database from 1990 to 2016 was performed.Findings15 articles were identified as contributing to the veterinary patient safety literature.OutcomeThe available literature has addressed a number of areas. The use of checklists in a clinical setting has been proven to reduce the incidence of specific undesirable

  3. The international protocol for the dosimetry of external radiotherapy beams based on standards of absorbed dose to water

    International Nuclear Information System (INIS)

    Andreo, P.

    2001-01-01

    An International Code of Practice (CoP, or dosimetry protocol) for external beam radiotherapy dosimetry based on standards of absorbed dose to water has been published by the IAEA on behalf of IAEA, WHO, PAHO and ESTRO. The CoP provides a systematic and internationally unified approach for the determination of the absorbed dose to water in reference conditions with radiotherapy beams. The development of absorbed-dose-to-water standards for high-energy photons and electrons offers the possibility of reducing the uncertainty in the dosimetry of radiotherapy beams. Many laboratories already provide calibrations at the radiation quality of 60Co gamma-rays and some have extended calibrations to high-energy photon and electron beams. The dosimetry of kilovoltage x-rays, as well as that of proton and ion beams can also be based on these standards. Thus, a coherent dosimetry system based on the same formalism is achieved for practically all radiotherapy beams. The practical use of the CoP as simple. The document is formed by a set of different CoPs for each radiation type, which include detailed procedures and worksheets. All CoPs are based on ND,w chamber calibrations at a reference beam quality Qo, together with radiation beam quality correction factors kQ preferably measured directly for the user's chamber in a standards laboratory. Calculated values of kQ are provided together with their uncertainty estimates. Beam quality specifiers are 60Co, TPR20,10 (high-energy photons), R50 (electrons), HVL and kV (x-rays) and Rres (protons and ions) [es

  4. Exploring the Role of Relational Practices in Water Governance Using a Game-Based Approach

    Directory of Open Access Journals (Sweden)

    Piotr Magnuszewski

    2018-03-01

    Full Text Available The growing complexity and interdependence of water management processes requires the involvement of multiple stakeholders in water governance. Multi-party collaboration is increasingly vital at both the strategy development and implementation levels. Multi-party collaboration involves a process of joint decision-making among key stakeholders in a problem domain directed towards the future of that domain. However, the common goal is not present from the beginning; rather, the common goal emerges during the process of collaboration. Unfortunately, when the conflicting interests of different actors are at stake, the large majority of environmental multi-party efforts often do not reliably deliver sustainable improvements to policy and/or practice. One of the reasons for this, which has been long established by many case studies, is that social learning with a focus on relational practices is missing. The purpose of this paper is to present the design and initial results of a pilot study that utilized a game-based approach to explore the effects of relational practices on the effectiveness of water governance. This paper verifies the methods used by addressing the following question: are game mechanisms, protocols for facilitation and observation, the recording of decisions and results, and participant surveys adequate to reliably test hypotheses about behavioral decisions related to water governance? We used the “Lords of the Valley” (LOV game, which focuses on the local-level management of a hypothetical river valley involving many stakeholders. We used an observation protocol to collect data on the quality of relational practices and compared this data with the quantitative outcomes achieved by participants in the game. In this pilot study, we ran the game three times with different groups of participants, and here we provide the outcomes within the context of verifying and improving the methods.

  5. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    International Nuclear Information System (INIS)

    Hirota, Osamu

    2007-01-01

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or αη scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption

  6. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  7. Evidence-based clinical practice

    DEFF Research Database (Denmark)

    Gluud, Christian

    2002-01-01

    , and single clinics. Accordingly, there is an urgent need to improve this situation. Guidelines for Good Clinical (Research) Practice, conduct of more trials as multicentre trials, The Consort Statement, and The Cochrane Collaboration may all help in the application of the best research evidence in clinical......Evidence-based medicine combines the patient's preferences with clinical experience and the best research evidence. Randomized clinical trials are considered the most valid research design for evaluating health-care interventions. However, empirical research shows that intervention effects may...... practice. By investments in education, applied research, and The Cochrane Collaboration, evidence-based medicine may form a stronger basis for clinical practice....

  8. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  9. Game-Based Practice versus Traditional Practice in Computer-Based Writing Strategy Training: Effects on Motivation and Achievement

    Science.gov (United States)

    Proske, Antje; Roscoe, Rod D.; McNamara, Danielle S.

    2014-01-01

    Achieving sustained student engagement with practice in computer-based writing strategy training can be a challenge. One potential solution is to foster engagement by embedding practice in educational games; yet there is currently little research comparing the effectiveness of game-based practice versus more traditional forms of practice. In this…

  10. Impact of using a local protocol in preoperative testing: blind randomized clinical trial.

    Science.gov (United States)

    Santos, Mônica Loureiro; Iglesias, Antônio Carlos

    2017-01-01

    to evaluate the impact of the use of a local protocol of preoperative test requests in reducing the number of exams requested and in the occurrence of changes in surgical anesthetic management and perioperative complications. we conducted a randomized, blinded clinical trial at the Gaffrée and Guinle University Hospital with 405 patients candidates for elective surgery randomly divided into two groups, according to the practice of requesting preoperative exams: a group with non-selectively requested exams and a protocol group with exams requested according to the study protocol. Studied exams: complete blood count, coagulogram, glycemia, electrolytes, urea and creatinine, ECG and chest X-ray. Primary outcomes: changes in surgical anesthetic management caused by abnormal exams, reduction of the number of exams requested after the use of the protocol and perioperative complications. there was a significant difference (pgrupos segundo a prática de solicitação de exames pré-operatórios: grupo Rotina com exames solicitados de maneira não seletiva e grupo Protocolo com exames solicitados de acordo com o protocolo em estudo. Exames em estudo: hemograma, coagulograma, glicemia, eletrólitos, ureia e creatinina, ECG e radiografia de tórax. Desfechos primários: alterações na conduta anestésico-cirúrgica motivadas por exames anormais, redução do número de exames solicitados após o uso do protocolo e complicações perioperatórias. foi observada diferença significativa (pgrupos (14,9% x 29,1%) e redução de 57,3% no número de exames pedidos entre os dois grupos (pgrupos. Na análise multivariada hemograma e coagulograma foram os únicos exames capazes de modificar a conduta anestésico-cirúrgica. o protocolo proposto foi efetivo em eliminar um quantitativo significativo de exames complementares sem indicação clínica, sem que houvesse aumento na morbidade e mortalidades perioperatórias.

  11. An Improved Constraint-Based System for the Verification of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial

  12. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  13. Using the intervention mapping protocol to reduce European preschoolers’ sedentary behavior, an application to the ToyBox-Study

    Science.gov (United States)

    2014-01-01

    Background High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers’ sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Methods Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. Results The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers’ sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. Conclusions A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with

  14. Using the intervention mapping protocol to reduce European preschoolers' sedentary behavior, an application to the ToyBox-Study.

    Science.gov (United States)

    De Decker, Ellen; De Craemer, Marieke; De Bourdeaudhuij, Ilse; Verbestel, Vera; Duvinage, Kristin; Iotova, Violeta; Grammatikaki, Evangelia; Wildgruber, Andreas; Mouratidou, Theodora; Manios, Yannis; Cardon, Greet

    2014-02-19

    High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers' sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers' sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with the inclusion of parental involvement. The

  15. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  16. Standard Practice for Analysis and Interpretation of Light-Water Reactor Surveillance Results, E706(IA)

    CERN Document Server

    American Society for Testing and Materials. Philadelphia

    2001-01-01

    1.1 This practice covers the methodology, summarized in Annex A1, to be used in the analysis and interpretation of neutron exposure data obtained from LWR pressure vessel surveillance programs; and, based on the results of that analysis, establishes a formalism to be used to evaluate present and future condition of the pressure vessel and its support structures (1-70). 1.2 This practice relies on, and ties together, the application of several supporting ASTM standard practices, guides, and methods (see Master Matrix E 706) (1, 5, 13, 48, 49). In order to make this practice at least partially self-contained, a moderate amount of discussion is provided in areas relating to ASTM and other documents. Support subject areas that are discussed include reactor physics calculations, dosimeter selection and analysis, and exposure units. Note 1—(Figure 1 is deleted in the latest update. The user is refered to Master Matrix E 706 for the latest figure of the standards interconnectivity). 1.3 This practice is restri...

  17. Staff views on supporting evidence based practice for children with ASD.

    Science.gov (United States)

    Trembath, David; Sulek, Rhylee; Paynter, Jessica; Simpson, Kate; Keen, Deb

    2017-11-22

    A variety of empirically supported interventions are available for children with autism spectrum disorder (ASD), but previous research suggests that their selection and use within an evidence-based practice (EBP) framework in clinical settings is challenging. To date, research has primarily focused on identifying individual, organisational, and contextual barriers to EBP rather than identifying collaborative solutions to these barriers through consultation with staff. The aim of our study was to explore staff views on supporting EBP in their work with children with ASD. We conducted five focus groups involving 29 professional (e.g., speech pathologists, teachers), paraprofessional (e.g., childcare workers), and managerial staff to explore their views. Audio recordings were transcribed verbatim and analysed using thematic analysis. Two central themes, comprising six categories, emerged to account for the participants' views. Initiative and Effort accounted for the range of creative strategies staff had developed to support their engagement in EBP. They also expressed the need for A Better Way involving organisational-wide support such as this engagement, including peer-to-peer mentoring. The findings suggest that an organisational-wide model to support engagement in EBP, with peer-to-peer mentoring at its foundation, may provide a desirable, ecologically valid, and acceptable model. Implications for Rehabilitation Clinicians and educators recognise the importance of evidence-based practice. Efforts to support evidence-based practice have focused mostly on access to research evidence. Clinicians and educators in this study were developing their own strategies based on intuition. They identified a need for organisation-wide approaches to supporting evidence-based practice. Peer-to-peer mentoring appears to be an acceptable and viable strategy.

  18. A comparison of sennosides-based bowel protocols with and without docusate in hospitalized patients with cancer.

    Science.gov (United States)

    Hawley, Philippa Helen; Byeon, Jai Jun

    2008-05-01

    Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.

  19. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  20. Best practices and better protocols : guidance for a comprehensive community emissions inventory system from a high level review of international best practices

    International Nuclear Information System (INIS)

    Boston, A.

    2007-11-01

    A community greenhouse gas emission and energy inventory is an important tool to help local governments plan, implement and monitor climate change mitigation strategies and sustainable energy systems. Inventories can also facilitate a number of other local priorities such as air quality management; integrated land-use and transportation planning; infrastructure optimization and planning; and community economic development planning. The British Columbia government's community energy and emissions inventory initiative (CEEI) intends to collect and centralize high-quality geocoded data to generate high-value community inventories for the province's 185 local governments. This report presented strategic guidance for a comprehensive community emissions inventory system based on a high level review of international best practices. The report described the project objective and scope; guiding principles; research methodology; and inventory limitations. The report provided observations, findings and recommendations according to the following four areas: protocols and standards recommendations; data management systems recommendations; community inventory parameters recommendations; and reporting formats and capacity building recommendations. It was recommended that as CEEI progresses, consideration should be given to developing provincial level reports and online reporting of local government activity in order to strengthen awareness, recognize leadership and build support.17 refs., 2 tabs., 11 figs., 2 appendices

  1. Dynamic federations: storage aggregation using open tools and protocols

    CERN Document Server

    Fabrizio Furano, F F; Ricardo Brito da Rocha, R R; Adrien Devresse, A D; Oliver Keeble, O K; Alejandro Alvarez Ayllon, A A

    2012-01-01

    A number of storage elements now offer standard protocol interfaces like NFS 4.1/pNFS and WebDAV, for access to their data repositories, in line with the standardization effort of the European Middleware Initiative (EMI). Also the LCG FileCatalogue (LFC) can offer such features. Here we report on work that seeks to exploit the federation potential of these protocols and build a system that offers a unique view of the storage and metadata ensemble and the possibility of integration of other compatible resources such as those from cloud providers. The challenge, here undertaken by the providers of dCache and DPM, and pragmatically open to other Grid and Cloud storage solutions, is to build such a system while being able to accommodate name translations from existing catalogues (e.g. LFCs), experiment- based metadata catalogues, or stateless algorithmic name translations, also known as ”trivial file catalogues”. Such so-called storage federations of standard protocols-based storage elements give a unique vie...

  2. Data exchange technology based on handshake protocol for industrial automation system

    Science.gov (United States)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  3. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  4. Institutional Context and E-recruitment Practices of Danish Organisations

    OpenAIRE

    Holm, Anna B.

    2014-01-01

    Purpose - Up to now, there has been little research on the impact of the external environment on recruitment practices of organizations, and in part it lags behind practice. This paper attempts to rectify this by studying recent changes in recruitment practices of Danish organizations and the adoption of e-recruitment from a macro organisational perspective.Design/methodology/approach - The study employs new institutional theory as a theoretical lens in order to understand how external pressu...

  5. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  6. Microblogging Practices of Scientists in E-Learning: A Qualitative Approach

    Directory of Open Access Journals (Sweden)

    Barbara Kieslinger

    2011-12-01

    Full Text Available Microblogging services, in particular Twitter, have experienced an explosive uptake in the last few years with a decelerated grown rate since 2010. Apart from celebrities, PR and news agencies, the bulk of user profiles stems form private individuals. Amongst them, individual scientists have started to make use of Twitter for professional purposes. This paper presents a qualitative approach of discovering microblogging practices and obtaining rich descriptions of few cases that give a deeper insight into how Twitter is used by scientists active in the field of e-Learning and how this practice shapes their social networks. The methodological approach is based on online ethnographic studies. Therefore Grabeeter, a tool for collecting all public tweets of a person in various formats, has been adapted in order to obtain the data appropriate for a qualitative analysis following a grounded theory approach. After an analysis of the current state-of-the-art we will outline the methodological approach for our qualitative analysis that focuses on discovering tacit aspects of microblogging practices such as value or purpose. Finally the results of the online ethnographic approach and individual cases will be discussed and compared to similar studies. This work presents the explorative phase of a detailed qualitative approach towards exploring microblogging practices of scientists.

  7. Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state

    International Nuclear Information System (INIS)

    Chen Xiubo; Yang Shuai; Su Yuan; Yang Yixian

    2012-01-01

    Recently, Liu et al (2011 Phys. Scr. 84045015) pointed out that the multiparty quantum secret sharing (MQSS) protocol based on the GHZ state (Hwang et al 2011 Phys. Scr. 83045004) is insecure. They found that an inside participant can deduce half of the sender's secret information directly just by his piece of the secret. In order to resist this attack, an improvement was put forward. However, in this paper, we find that Liu et al's improved protocol is still insecure. We give details of three attack strategies to steal the secret information. It is shown that the eavesdropper can steal half or all of the secret information. Furthermore, a simple and ingenious MQSS protocol is proposed. We perform explicit cryptanalysis to prove that our improved protocol can resist the attacks from both the outside attackers and the inside participants, even the collusion attack.

  8. Exercise-based cardiac rehabilitation for adults after Heart valve surgery (protocol)

    DEFF Research Database (Denmark)

    Lærum Sibilitz, Kristine; Berg, Selina Kikkenborg; Tang, Lars Hermann

    2013-01-01

    This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the benefits and harms of exercise-based intervention programmes (exercise-based interventions alone or in combination with psycho-educational components), compared to no intervention, or treatment...... as usual, in adults who have had heart valve surgery. In this review we will focus on programmes that include an exercise-based intervention with, or without, another rehabilitation component (such as a psycho-educational component)....

  9. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  10. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  11. Yield and Efficiency of Mental Health Screening: A Comparison of Screening Protocols at Intake to Prison.

    Science.gov (United States)

    Martin, Michael S; Potter, Beth K; Crocker, Anne G; Wells, George A; Colman, Ian

    2016-01-01

    The value of screening for mental illness has increasingly been questioned in low prevalence settings due to high false positive rates. However, since false positive rates are related to prevalence, screening may be more effective in higher prevalence settings, including correctional institutions. We compared the yield (i.e. newly detected cases) and efficiency (i.e. false positives) of five screening protocols to detect mental illness in prisons against the use of mental health history taking (the prior approach to detecting mental illness). We estimated the accuracy of the six approaches to detect an Axis I disorder among a sample of 467 newly admitted male inmates (83.1% participation rate). Mental health history taking identified only 41.0% (95% CI 32.1, 50.6) of all inmates with mental illness. Screening protocols identified between 61.9 and 85.7% of all cases, but referred between 2 and 3 additional individuals who did not have a mental illness for every additional case detected compared to the mental health history taking approach. In low prevalence settings (i.e. 10% or less) the screening protocols would have had between 4.6 and 16.2 false positives per true positive. While screening may not be practical in low prevalence settings, it may be beneficial in jails and prisons where the prevalence of mental illness is higher. Further consideration of the context in which screening is being implemented, and of the impacts of policies and clinical practices on the benefits and harms of screening is needed to determine the effectiveness of screening in these settings.

  12. Yield and Efficiency of Mental Health Screening: A Comparison of Screening Protocols at Intake to Prison.

    Directory of Open Access Journals (Sweden)

    Michael S Martin

    Full Text Available The value of screening for mental illness has increasingly been questioned in low prevalence settings due to high false positive rates. However, since false positive rates are related to prevalence, screening may be more effective in higher prevalence settings, including correctional institutions. We compared the yield (i.e. newly detected cases and efficiency (i.e. false positives of five screening protocols to detect mental illness in prisons against the use of mental health history taking (the prior approach to detecting mental illness.We estimated the accuracy of the six approaches to detect an Axis I disorder among a sample of 467 newly admitted male inmates (83.1% participation rate. Mental health history taking identified only 41.0% (95% CI 32.1, 50.6 of all inmates with mental illness. Screening protocols identified between 61.9 and 85.7% of all cases, but referred between 2 and 3 additional individuals who did not have a mental illness for every additional case detected compared to the mental health history taking approach. In low prevalence settings (i.e. 10% or less the screening protocols would have had between 4.6 and 16.2 false positives per true positive.While screening may not be practical in low prevalence settings, it may be beneficial in jails and prisons where the prevalence of mental illness is higher. Further consideration of the context in which screening is being implemented, and of the impacts of policies and clinical practices on the benefits and harms of screening is needed to determine the effectiveness of screening in these settings.

  13. e-Portfolio as reflection tool during teaching practice: The interplay ...

    African Journals Online (AJOL)

    This paper focuses on an e-portfolio pilot initiative at the Faculty of Education ... expectations of an e-portfolio aligns with the current practices and attributes ... will impact the potential success of the integration of e-portfolios as reflective tools.

  14. Optimizing stormwater treatment practices a handbook of assessment and maintenance

    CERN Document Server

    Erickson, Andrew J; Gulliver, John S

    2013-01-01

    Optimizing Stormwater Treatment Practices: A Handbook of Assessment and Maintenance provides the information necessary for developing and operating an effective maintenance program for stormwater treatment. The book offers instructions on how to measure the level of performance of stormwater treatment practices directly and bases proposed maintenance schedules on actual performance and historical maintenance efforts and costs. The inspection methods, which are proven in the field and have been implemented successfully, are necessary as regulatory agencies are demanding evaluations of the performance of stormwater treatment practices. The authors have developed a three-tiered approach that offers readers a standard protocol for how to determine the effectiveness of stormwater treatment practices currently in place. This book also: Provides a standard protocol for how to determine the effectiveness of stormwater treatment practices Assists readers with identifying which assessment techniques to use for stormwa...

  15. Stimulation of the young poor responder: comparison of the luteal estradiol/gonadotropin-releasing hormone antagonist priming protocol versus oral contraceptive microdose leuprolide.

    Science.gov (United States)

    Shastri, Shefali M; Barbieri, Elizabeth; Kligman, Isaac; Schoyer, Katherine D; Davis, Owen K; Rosenwaks, Zev

    2011-02-01

    To evaluate in vitro fertilization (IVF) cycle outcomes in young poor responders treated with a luteal estradiol/gonadotropin-releasing hormone antagonist (E(2)/ANT) protocol versus an oral contraceptive pill microdose leuprolide protocol (OCP-MDL). Retrospective cohort. Academic practice. Poor responders: 186 women, aged <35 years undergoing IVF with either E(2)/ANT or OCP-MDL protocols. None. Clinical pregnancies, oocytes retrieved, cancellation rate. Patients in the E(2)/ANT group had a greater gonadotropin requirement (71.9 ± 22.2 vs. 57.6 ± 25.7) and lower E(2) level (1,178.6 ± 668 vs. 1,627 ± 889), yet achieved similar numbers of oocytes retrieved and fertilized, and a greater number of embryos transferred (2.3 ± 0.9 vs. 2.0 ± 1.1) with a better mean grade (2.14 ± .06 vs. 2.7 ± 1.8) compared with the OCP/MDL group. The E2/ANT group exhibited a trend toward improved implantation rates (30.5% vs. 21.1%) and ongoing pregnancy rates per started cycle: 44 out of 117 (37%) versus 17 out of 69 (25%). Poor responders aged <35 years may be treated with the aggressive E(2)/ANT protocol to improve cycle outcomes. Both protocols remain viable options for this group. Adequately powered, randomized clinical comparison appears justified. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  16. SCENARIO-BASED eLEARNING AND STEM EDUCATION: A QUALITATIVE STUDY EXPLORING THE PERSPECTIVES OF EDUCATORS

    Directory of Open Access Journals (Sweden)

    David E. Proudfoot

    2017-06-01

    Full Text Available There are a variety of extra curricular activities and programs that aim to promote Science, Technology, Engineering, and Mathematics (STEM education, but there are limited examples of extending STEM curriculum by employing scenario-based eLearning opportunities in a mobile lab learning environment. Following students participation in a first of its kind STEM Mobile Lab program that uses a scenario-based eLearning approach for instruction, twelve educators from four Title I elementary schools were asked about their perceptions of the influence of the Mobile Lab program on the STEM education of their students. The semi-structured interview protocol contained questions intended to explore participants’ perceptions regarding the influence of a scenario-based eLearning Mobile STEM Lab program on the STEM interest and achievement of students. The study found that a scenario-based eLearning Mobile STEM Lab can influence STEM interest and achievement of elementary students. This promising finding leads to a recommendation for educators to use this approach and similar programs to make students more interested in science and improve their grades. Efforts by educators to design and implement scenario-based eLearning opportunities lead to increased learner engagement.

  17. SU-E-J-07: A Functional MR Protocol for the Pancreatic Tumor Delineation

    International Nuclear Information System (INIS)

    Andreychenko, A; Heerkens, H; Meijer, G; Vulpen, M van; Lagendijk, J; Berg, C van den

    2014-01-01

    Purpose: Pancreatic cancer is one of the cancers with the poorest survival prognosis. At the time of diagnosis most of pancreatic cancers are unresectable and those patients can be treated by radiotherapy. Radiotherapy for pancreatic cancer is limited due to uncertainties in CT-based delineations. MRI provides an excellent soft tissue contrast. Here, an MR protocol is developed to improve delineations for radiotherapy treatment of pancreatic cancer. In a later stage this protocol can also be used for on-line visualization of the pancreas during MRI guided treatments. Methods: Nine pancreatic cancer patients were included. The MR protocol included T2 weighted(T2w), T1 weighted(T1w), diffusion weighted(DWI) and dynamic contrast enhanced(DCE) techniques. The tumor was delineated on T2w and T1w MRI by an experienced radiation oncologist. Healthy pancreas or pancreatitis (assigned by the oncologist based on T2w) areas were also delineated. Apparent diffusion coefficient(ADC), and area under the curve(AUC)/time to peak(TTP) maps were obtained from DWI and DCE scans, respectively. Results: A clear demarcation of tumor area was visible on b800 DWI images in 5 patients. ADC maps of those patients characterized tumor as an area with restricted water diffusion. Tumor delineations based on solely DCE were possible in 7 patients. In 6 of those patients AUC maps demonstrated tumor heterogeneity: a hypointense area with a hyperintense ring. TTP values clearly discriminated the tumor and the healthy pancreas but could not distinguish tumor and the pancreatitis accurately. Conclusion: MR imaging results in a more pronounced tumor contrast than contrast enhanced CT. The addition of quantitative, functional MRI provides valuable, additional information to the radiation oncologist on the spatial tumor extent by discriminating tumor from the healthy pancreas(TTP, DWI) and characterizing the tumor(ADC). Our findings indicate that tumor delineation in pancreatic cancer can greatly

  18. SU-E-J-07: A Functional MR Protocol for the Pancreatic Tumor Delineation

    Energy Technology Data Exchange (ETDEWEB)

    Andreychenko, A; Heerkens, H; Meijer, G; Vulpen, M van; Lagendijk, J; Berg, C van den [UMC Utrecht, Utrecht, Utrecht (Netherlands)

    2014-06-01

    Purpose: Pancreatic cancer is one of the cancers with the poorest survival prognosis. At the time of diagnosis most of pancreatic cancers are unresectable and those patients can be treated by radiotherapy. Radiotherapy for pancreatic cancer is limited due to uncertainties in CT-based delineations. MRI provides an excellent soft tissue contrast. Here, an MR protocol is developed to improve delineations for radiotherapy treatment of pancreatic cancer. In a later stage this protocol can also be used for on-line visualization of the pancreas during MRI guided treatments. Methods: Nine pancreatic cancer patients were included. The MR protocol included T2 weighted(T2w), T1 weighted(T1w), diffusion weighted(DWI) and dynamic contrast enhanced(DCE) techniques. The tumor was delineated on T2w and T1w MRI by an experienced radiation oncologist. Healthy pancreas or pancreatitis (assigned by the oncologist based on T2w) areas were also delineated. Apparent diffusion coefficient(ADC), and area under the curve(AUC)/time to peak(TTP) maps were obtained from DWI and DCE scans, respectively. Results: A clear demarcation of tumor area was visible on b800 DWI images in 5 patients. ADC maps of those patients characterized tumor as an area with restricted water diffusion. Tumor delineations based on solely DCE were possible in 7 patients. In 6 of those patients AUC maps demonstrated tumor heterogeneity: a hypointense area with a hyperintense ring. TTP values clearly discriminated the tumor and the healthy pancreas but could not distinguish tumor and the pancreatitis accurately. Conclusion: MR imaging results in a more pronounced tumor contrast than contrast enhanced CT. The addition of quantitative, functional MRI provides valuable, additional information to the radiation oncologist on the spatial tumor extent by discriminating tumor from the healthy pancreas(TTP, DWI) and characterizing the tumor(ADC). Our findings indicate that tumor delineation in pancreatic cancer can greatly

  19. Reliability and criterion validity of an observation protocol for working technique assessments in cash register work.

    Science.gov (United States)

    Palm, Peter; Josephson, Malin; Mathiassen, Svend Erik; Kjellberg, Katarina

    2016-06-01

    We evaluated the intra- and inter-observer reliability and criterion validity of an observation protocol, developed in an iterative process involving practicing ergonomists, for assessment of working technique during cash register work for the purpose of preventing upper extremity symptoms. Two ergonomists independently assessed 17 15-min videos of cash register work on two occasions each, as a basis for examining reliability. Criterion validity was assessed by comparing these assessments with meticulous video-based analyses by researchers. Intra-observer reliability was acceptable (i.e. proportional agreement >0.7 and kappa >0.4) for 10/10 questions. Inter-observer reliability was acceptable for only 3/10 questions. An acceptable inter-observer reliability combined with an acceptable criterion validity was obtained only for one working technique aspect, 'Quality of movements'. Thus, major elements of the cashiers' working technique could not be assessed with an acceptable accuracy from short periods of observations by one observer, such as often desired by practitioners. Practitioner Summary: We examined an observation protocol for assessing working technique in cash register work. It was feasible in use, but inter-observer reliability and criterion validity were generally not acceptable when working technique aspects were assessed from short periods of work. We recommend the protocol to be used for educational purposes only.

  20. Pediatric Nurses’ Beliefs and Pain Management Practices: An Intervention Pilot

    OpenAIRE

    Vincent, Catherine Van Hulle; Wilkie, Diana J.; Wang, Edward

    2010-01-01

    We evaluated feasibility of the Internet-based Relieve Children's Pain (RCP) protocol to improve nurses’ management of children's pain. RCP is an interactive, content-focused, and Kolb's Experiential Learning Theory-based intervention. Using a one-group, pre/posttest design, we evaluated feasibility of RCP and pre/post difference in scores for nurses’ beliefs, and simulated and actual pain management practices. Twenty-four RNs completed an Internet-based Pain Beliefs and Practices Questionnai...

  1. Video- or text-based e-learning when teaching clinical procedures? A randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Buch SV

    2014-08-01

    Full Text Available Steen Vigh Buch,1 Frederik Philip Treschow,2 Jesper Brink Svendsen,3 Bjarne Skjødt Worm4 1Department of Vascular Surgery, Rigshospitalet, Copenhagen, Denmark; 2Department of Anesthesia and Intensive Care, Herlev Hospital, Copenhagen, Denmark; 3Faculty of Health and Medical Sciences, University of Copenhagen, Copenhagen, Denmark; 4Department of Anesthesia and Intensive Care, Bispebjerg Hospital, Copenhagen, Denmark Background and aims: This study investigated the effectiveness of two different levels of e-learning when teaching clinical skills to medical students. Materials and methods: Sixty medical students were included and randomized into two comparable groups. The groups were given either a video- or text/picture-based e-learning module and subsequently underwent both theoretical and practical examination. A follow-up test was performed 1 month later. Results: The students in the video group performed better than the illustrated text-based group in the practical examination, both in the primary test (P<0.001 and in the follow-up test (P<0.01. Regarding theoretical knowledge, no differences were found between the groups on the primary test, though the video group performed better on the follow-up test (P=0.04. Conclusion: Video-based e-learning is superior to illustrated text-based e-learning when teaching certain practical clinical skills. Keywords: e-learning, video versus text, medicine, clinical skills

  2. Impact of the implementation of electronic guidelines for cardiovascular prevention in primary care: study protocol

    Directory of Open Access Journals (Sweden)

    Eva Comin

    2013-03-01

    Full Text Available Background The electronic medical records software of the Catalan Institute of Health has recently incorporated an electronic version of clinical practice guidelines (e-CPGs. This study aims to assess the impact of the implementation of e-CPGs on the diagnosis, treatment, control and management of hypercholesterolaemia, diabetes mellitus type 2 and hypertension.Methods Eligible study participants are those aged 35–74 years assigned to family practitioners (FPs of the Catalan Institute of Health. Routinely collected data from electronic primary care registries covering 80% of the Catalan population will be analysed using two approaches: (1 a cross-sectional study to describe the characteristics of the sample before e-CPG implementation; (2 a controlled before-and-after study with 1-year follow-up to ascertain the effect of e-CPG implementation. Patients of FPs who regularly use the e-CPGs will constitute the intervention group; the control group will comprise patients assigned to FPs not regularly using the e-CPG. The outcomes are: (1 suspected and confirmed diagnoses, (2 control of clinical variables, (3 requests for tests and (4 proportions of patients with adequate drug prescriptions.Results This protocol should represent a reproducible process to assess the impact of the implementation of e-CPGs. We anticipate reporting results in late 2013.Conclusion This project will assess the effectiveness of e-CPGs to improve clinical decisions and healthcare procedures in the three disorders analysed. The results will shed light on the use of evidence-based medicine to improve clinical practice of FPs.

  3. SU-E-J-214: MR Protocol Development to Visualize Sirius MRI Markers in Prostate Brachytherapy Patients for MR-Based Post-Implant Dosimetry

    Energy Technology Data Exchange (ETDEWEB)

    Lim, T; Wang, J; Frank, S; Stafford, R; Bruno, T; Bathala, T; Mahmood, U; Pugh, T; Ibbott, G; Kudchadker, R [UT MD Anderson Cancer Center, Houston, TX (United States)

    2015-06-15

    Purpose: The current CT-based post-implant dosimetry allows precise seed localization but limited anatomical delineation. Switching to MR-based post-implant dosimetry is confounded by imprecise seed localization. One approach is to place positive-contrast markers (Sirius) adjacent to the negative-contrast seeds. This patient study aims to assess the utility of a 3D fast spoiled gradient-recalled echo (FSPGR) sequence to visualize Sirius markers for post-implant dosimetry. Methods: MRI images were acquired in prostate implant patients (n=10) on Day 0 (day-of-implant) and Day 30. The post-implant MR protocol consisted of 3D T2-weighted fast-spin-echo (FSE), T2-weighted 2D-FSE (axial) and T1-weighted 2D-FSE (axial/sagittal/coronal). We incorporated a 3D-FSPGR sequence into the post-implant MR protocol to visualize the Sirius markers. Patients were scanned with different number-of-excitations (6, 8, 10), field-of-view (10cm, 14cm, 18cm), slice thickness (1mm, 0.8mm), flip angle (14 degrees, 20 degrees), bandwidth (122.070 Hz/pixel, 325.508 Hz/pixel, 390.625 Hz/pixel), phase encoding steps (160, 192, 224, 256), frequency-encoding direction (right/left, anterior/posterior), echo-time type (minimum-full, out-of-phase), field strength (1.5T, 3T), contrast (with, without), scanner vendor (Siemens, GE), coil (endorectal-coil only, endorectal-and-torso-coil, torsocoil only), endorectal-coil filling (30cc, 50cc) and endorectal-coil filling type (air, perfluorocarbon [PFC]). For post-implant dosimetric evaluation with greater anatomical detail, 3D-FSE images were fused with 3D-FSPGR images. For comparison with CT-based post-implant dosimetry, CT images were fused with 3D-FSPGR images. Results: The 3D-FSPGR sequence facilitated visualization of markers in patients. Marker visualization helped distinguish signal voids as seeds versus needle tracks for more definitive MR-based post-implant dosimetry. On the CT-MR fused images, the distance between the seed on CT to MR images was 3

  4. SU-E-J-214: MR Protocol Development to Visualize Sirius MRI Markers in Prostate Brachytherapy Patients for MR-Based Post-Implant Dosimetry

    International Nuclear Information System (INIS)

    Lim, T; Wang, J; Frank, S; Stafford, R; Bruno, T; Bathala, T; Mahmood, U; Pugh, T; Ibbott, G; Kudchadker, R

    2015-01-01

    Purpose: The current CT-based post-implant dosimetry allows precise seed localization but limited anatomical delineation. Switching to MR-based post-implant dosimetry is confounded by imprecise seed localization. One approach is to place positive-contrast markers (Sirius) adjacent to the negative-contrast seeds. This patient study aims to assess the utility of a 3D fast spoiled gradient-recalled echo (FSPGR) sequence to visualize Sirius markers for post-implant dosimetry. Methods: MRI images were acquired in prostate implant patients (n=10) on Day 0 (day-of-implant) and Day 30. The post-implant MR protocol consisted of 3D T2-weighted fast-spin-echo (FSE), T2-weighted 2D-FSE (axial) and T1-weighted 2D-FSE (axial/sagittal/coronal). We incorporated a 3D-FSPGR sequence into the post-implant MR protocol to visualize the Sirius markers. Patients were scanned with different number-of-excitations (6, 8, 10), field-of-view (10cm, 14cm, 18cm), slice thickness (1mm, 0.8mm), flip angle (14 degrees, 20 degrees), bandwidth (122.070 Hz/pixel, 325.508 Hz/pixel, 390.625 Hz/pixel), phase encoding steps (160, 192, 224, 256), frequency-encoding direction (right/left, anterior/posterior), echo-time type (minimum-full, out-of-phase), field strength (1.5T, 3T), contrast (with, without), scanner vendor (Siemens, GE), coil (endorectal-coil only, endorectal-and-torso-coil, torsocoil only), endorectal-coil filling (30cc, 50cc) and endorectal-coil filling type (air, perfluorocarbon [PFC]). For post-implant dosimetric evaluation with greater anatomical detail, 3D-FSE images were fused with 3D-FSPGR images. For comparison with CT-based post-implant dosimetry, CT images were fused with 3D-FSPGR images. Results: The 3D-FSPGR sequence facilitated visualization of markers in patients. Marker visualization helped distinguish signal voids as seeds versus needle tracks for more definitive MR-based post-implant dosimetry. On the CT-MR fused images, the distance between the seed on CT to MR images was 3

  5. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  6. Personalized E- learning System Based on Intelligent Agent

    Science.gov (United States)

    Duo, Sun; Ying, Zhou Cai

    Lack of personalized learning is the key shortcoming of traditional e-Learning system. This paper analyzes the personal characters in e-Learning activity. In order to meet the personalized e-learning, a personalized e-learning system based on intelligent agent was proposed and realized in the paper. The structure of system, work process, the design of intelligent agent and the realization of intelligent agent were introduced in the paper. After the test use of the system by certain network school, we found that the system could improve the learner's initiative participation, which can provide learners with personalized knowledge service. Thus, we thought it might be a practical solution to realize self- learning and self-promotion in the lifelong education age.

  7. Which strengths-based practice? Reconciling strengths-based practice and mandated authority in child protection work.

    Science.gov (United States)

    Oliver, Carolyn; Charles, Grant

    2015-04-01

    The recent application of strengths-based practice in child protection settings has been accompanied by evidence of inconsistent implementation and concerns that the approach is incompatible with statutory work. Few studies have moved beyond asking whether child protection workers are implementing strengths-based practice to explore why the approach is enacted as it is. This article describes a mixed methods study using an online survey and interviews to elicit from 225 statutory child protection workers in a large Canadian agency how they applied strengths-based ideas and why they did what they did. The authors found that although strengths-based practice was popular, 70 percent of participants believed that it was not always applicable to child protection work. Participants described five distinct versions of the approach, only one of which was fully congruent with their mandated role. The study suggests that the common conflation of strengths-based and solution-focused approaches ignores important differences in the conceptualization of practitioner authority and leaves practitioners attempting to implement versions ofstrengths-based practice that do not fit statutory child protection work. Only when practitioners choose solution-focused models that support their use of mandated authority is consistent implementation a reasonable expectation.

  8. The development of standard operating protocols for paediatric radiology

    International Nuclear Information System (INIS)

    Hardwick, J.; Mencik, C.; McLaren, C.; Young, C.; Scadden, S.; Mashford, P.; McHugh, K.; Beckett, M.; Calvert, M.; Marsden, P.J.

    2001-01-01

    This paper describes how the requirement for operating protocols for standard radiological practice was expanded to provide a comprehensive aide to the operator conducting a medical exposure. The protocols adopted now include justification criteria, patient preparation, radiographic technique, standard exposure charts, diagnostic reference levels and image quality criteria. In total, the protocols have been welcomed as a tool for ensuring that medical exposures are properly optimised. (author)

  9. Alcohol e-Help: study protocol for a web-based self-help program to reduce alcohol use in adults with drinking patterns considered harmful, hazardous or suggestive of dependence in middle-income countries.

    Science.gov (United States)

    Schaub, Michael P; Tiburcio, Marcela; Martinez, Nora; Ambekar, Atul; Balhara, Yatan Pal Singh; Wenger, Andreas; Monezi Andrade, André Luiz; Padruchny, Dzianis; Osipchik, Sergey; Gehring, Elise; Poznyak, Vladimir; Rekve, Dag; Souza-Formigoni, Maria Lucia Oliveira

    2018-02-01

    Given the scarcity of alcohol prevention and alcohol use disorder treatments in many low and middle-income countries, the World Health Organization launched an e-health portal on alcohol and health that includes a Web-based self-help program. This paper presents the protocol for a multicentre randomized controlled trial (RCT) to test the efficacy of the internet-based self-help intervention to reduce alcohol use. Two-arm randomized controlled trial (RCT) with follow-up 6 months after randomization. Community samples in middle-income countries. People aged 18+, with Alcohol Use Disorders Identification Test (AUDIT) scores of 8+ indicating hazardous alcohol consumption. Offer of an internet-based self-help intervention, 'Alcohol e-Health', compared with a 'waiting list' control group. The intervention, adapted from a previous program with evidence of effectiveness in a high-income country, consists of modules to reduce or entirely stop drinking. The primary outcome measure is change in the Alcohol Use Disorders Identification Test (AUDIT) score assessed at 6-month follow-up. Secondary outcomes include self-reported the numbers of standard drinks and alcohol-free days in a typical week during the past 6 months, and cessation of harmful or hazardous drinking (AUDIT world-wide is considerable. © 2017 Society for the Study of Addiction.

  10. Pengembangan Sistem Keamanan untuk E-Commerce

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Indra Saputra

    2017-07-01

    Full Text Available E-commerce is a remote goods or services transaction activity between two company (business to business or between company with customers (business to consumer. Ecommerce was simplifying the transaction process between producers and consumers, butthere is a risk of security issue if doing transactions on e-commerce. A common e-commercesecurity system using another protocol security e.g. SSL (Secure Socket Layer so these ecommerce security system is very dependent with these security protocol. The e-commercesecurity problem was fixed by developed security system that using security system directly onthe web page. The system is designed to securing transaction data using RC6 encryption, RC6encryption key is secured by RSA encryption, and encrypted data is encoded by Base64. Theresulting security system is blocking transaction data when users clicking submit transactionbutton, then these transaction data encrypted using applied algorithm before send it into serverso transaction data was secured without aid of another security protocol e.g. SSL (SecureSocket Layer.

  11. Learning With E-books and Project-based Strategy in a Community Health Nursing Course.

    Science.gov (United States)

    Sung, Tien-Wen; Wu, Ting-Ting

    2018-03-01

    With advances in information technology, "information-assisted instruction" has been gradually introduced to nursing education curricula. Specifically, the integration of an e-book system can effectively enhance nursing students' attention and interest. Most studies on nursing education that incorporated e-books have focused on the advantages of convenience and assistance provided by e-books. Few studies have addressed community health nursing and off-campus practice activities in relation to suitable teaching strategies for learning activities. This study involved designing and planning a multimedia e-book learning system with a project-based learning activity that conforms to the curriculum and practical requirements of a community health nursing course. The purpose was to reduce the gap between theory and practice and realize an effective learning process. For learning evaluations, a final examination analysis with an independent sample t test; a scoring scheme with intrateam, interteam, and expert ratings; and Bloom's taxonomy-based analysis were conducted. The evaluation results indicated that the comprehension and learning abilities of the experimental group using the e-book system with a mobile device were effectively improved. In addition, the exploratory process involved in project-based learning can develop multiple cognitive skills and problem-solving ability, thereby realizing effective learning.

  12. CHIP: Commodity based Hazard Identification Protocol for emerging diseases in plants and animals

    NARCIS (Netherlands)

    Bremmer, J.; Swanenburg, M.; Galen, van M.A.; Hoek, Maarten; Rau, M.L.; Hennen, W.H.G.J.; Benninga, J.; Ge, L.; Breukers, M.L.H.

    2012-01-01

    This project comprised the development of a commodity-based hazard identification protocol for biological hazards in plants and animals as a decision support tree programmed in Excel. The content of the decision tree is based on the results of a systematic review of pest and pathogen

  13. A best practice fall prevention exercise program to improve balance, strength / power, and psychosocial health in older adults: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Gschwind, Yves J; Kressig, Reto W; Lacroix, Andre; Muehlbauer, Thomas; Pfenninger, Barbara; Granacher, Urs

    2013-10-09

    With increasing age neuromuscular deficits (e.g., sarcopenia) may result in impaired physical performance and an increased risk for falls. Prominent intrinsic fall-risk factors are age-related decreases in balance and strength / power performance as well as cognitive decline. Additional studies are needed to develop specifically tailored exercise programs for older adults that can easily be implemented into clinical practice. Thus, the objective of the present trial is to assess the effects of a fall prevention program that was developed by an interdisciplinary expert panel on measures of balance, strength / power, body composition, cognition, psychosocial well-being, and falls self-efficacy in healthy older adults. Additionally, the time-related effects of detraining are tested. Healthy old people (n = 54) between the age of 65 to 80 years will participate in this trial. The testing protocol comprises tests for the assessment of static / dynamic steady-state balance (i.e., Sharpened Romberg Test, instrumented gait analysis), proactive balance (i.e., Functional Reach Test; Timed Up and Go Test), reactive balance (i.e., perturbation test during bipedal stance; Push and Release Test), strength (i.e., hand grip strength test; Chair Stand Test), and power (i.e., Stair Climb Power Test; countermovement jump). Further, body composition will be analysed using a bioelectrical impedance analysis system. In addition, questionnaires for the assessment of psychosocial (i.e., World Health Organisation Quality of Life Assessment-Bref), cognitive (i.e., Mini Mental State Examination), and fall risk determinants (i.e., Fall Efficacy Scale - International) will be included in the study protocol. Participants will be randomized into two intervention groups or the control / waiting group. After baseline measures, participants in the intervention groups will conduct a 12-week balance and strength / power exercise intervention 3 times per week, with each training session lasting 30 min

  14. Inter-assessor reliability of practice based biomechanical assessment of the foot and ankle

    Directory of Open Access Journals (Sweden)

    Jarvis Hannah L

    2012-06-01

    Full Text Available Abstract Background There is no consensus on which protocols should be used to assess foot and lower limb biomechanics in clinical practice. The reliability of many assessments has been questioned by previous research. The aim of this investigation was to (i identify (through consensus what biomechanical examinations are used in clinical practice and (ii evaluate the inter-assessor reliability of some of these examinations. Methods Part1: Using a modified Delphi technique 12 podiatrists derived consensus on the biomechanical examinations used in clinical practice. Part 2: Eleven podiatrists assessed 6 participants using a subset of the assessment protocol derived in Part 1. Examinations were compared between assessors. Results Clinicians choose to estimate rather than quantitatively measure foot position and motion. Poor inter-assessor reliability was recorded for all examinations. Intra-class correlation coefficient values (ICC for relaxed calcaneal stance position were less than 0.23 and were less than 0.14 for neutral calcaneal stance position. For the examination of ankle joint dorsiflexion, ICC values suggest moderate reliability (less than 0.61. The results of a random effects ANOVA highlight that participant (up to 5.7°, assessor (up to 5.8° and random (up to 5.7° error all contribute to the total error (up to 9.5° for relaxed calcaneal stance position, up to 10.7° for the examination of ankle joint dorsiflexion. Kappa Fleiss values for categorisation of first ray position and mobility were less than 0.05 and for limb length assessment less than 0.02, indicating slight agreement. Conclusion Static biomechanical assessment of the foot, leg and lower limb is an important protocol in clinical practice, but the key examinations used to make inferences about dynamic foot function and to determine orthotic prescription are unreliable.

  15. An Agent-Based Auction Protocol on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Yu-Fang Chung

    2014-01-01

    Full Text Available This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. The protocol consists of four participants, namely, registration manager, agent house, auction house, and bidder.

  16. Sujeito, intersubjetividade e práticas de saúde Subject, intersubjectivity, and health practices

    Directory of Open Access Journals (Sweden)

    José Ricardo de Carvalho Mesquita Ayres

    2001-01-01

    Full Text Available Neste artigo se discute o conceito de sujeito utilizado nas práticas de saúde. Parte-se da tese de que a concepção de sujeito predominante no pensamento sanitário não está em sintonia com valores e pressupostos que orientam as principais propostas de renovação de conceitos e práticas de saúde na atualidade. Defende-se o caráter relacional, pragmático e reconstrutivo das identidades subjetivas, contra o caráter individualista, apriorístico e objetificado prevalente nas práticas do setor. Desdobra-se desta reflexão a defesa de transformações das práticas de saúde, com base em "giros" teórico-filosóficos, relacionados entre si: a secundarização da idéia de sujeito em favor da idéia de contextos de intersubjetividade, na construção de categorias para o conhecimento e intervenção; b subsunção do interesse pelo controle técnico das doenças na idéia mais abrangente de sucesso prático de projetos de felicidade humana, na definição das finalidades da intervenção; c transformação do cuidado, na atitude orientadora do conjunto das ações voltadas para a saúde das pessoas.This article discusses the concept of subject as used in health practices. The underlying thesis is that the predominant concept of subject in the health field is not in keeping with the values and premises currently orienting the renewal of health concepts and practices, which defend the relational, pragmatic, and reconstructive nature of subjective identities as opposed to the individualistic, a priori, and objectified approach prevailing in practice in the health sector. This reflection leads to the defense of changes in health practices, based on interrelated theoretical/philosophical twists: a as a priority, replace the notion of subject with that of contexts of intersubjectivity, in the construction of categories for knowledge and intervention; b subsume the interest in the technical control of diseases within the broader idea of practical

  17. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  18. Feasibility and effect of home-based therapy programmes for children with cerebral palsy: a protocol for a systematic review.

    Science.gov (United States)

    Beckers, L W M E; Schnackers, M L A P; Janssen-Potten, Y J; Kleijnen, J; Steenbergen, B

    2017-02-24

    Given the promising advantages of upper extremity home-based programmes in children with cerebral palsy (CP), a systematic review of the available literature on this topic is warranted. The purpose of the systematic review described in this protocol is to investigate currently available home-based occupational therapy and physiotherapy programmes regarding both their feasibility and effect. This protocol describes a systematic review, developed in accordance with the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P) 2015. Studies will be included in which primary data are collected, participants are children aged physiotherapy intervention. Comparators of interest are: no therapy, care as usual, centre-based occupational therapy or physiotherapy, an alternative home-based programme and a medical intervention. Studies will be included that report either on feasibility (ie, acceptability, demand, implementation, practicality, adaptation, expansion or integration) or on efficacy/effectiveness (ie, child-related upper extremity outcomes within all International Classification of Functioning, Disability and Health levels or parent-related/caregiver-related outcomes on the psychological and social domain). Relevant studies will be identified by searching the databases MEDLINE, EMBASE, CINAHL, PsycINFO, PEDro, OTSeeker and CPCI-S as well as the trial registers ICTRP and CENTRAL, the reference lists of included records and by circulating a bibliography of the included records to authors of included studies. There will be no restrictions on language or year of publication. The search strategy consists of terms related to the population and intervention. Data will be extracted in duplicate using a digital data extraction form. The proposed study does not involve collection of primary data. Accordingly, no ethical approval is required. The authors will disseminate the findings of this systematic review through publication in a peer

  19. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    Science.gov (United States)

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P open heart surgery.

  20. A Transcription and Translation Protocol for Sensitive Cross-Cultural Team Research.

    Science.gov (United States)

    Clark, Lauren; Birkhead, Ana Sanchez; Fernandez, Cecilia; Egger, Marlene J

    2017-10-01

    Assurance of transcript accuracy and quality in interview-based qualitative research is foundational for data accuracy and study validity. Based on our experience in a cross-cultural ethnographic study of women's pelvic organ prolapse, we provide practical guidance to set up step-by-step interview transcription and translation protocols for team-based research on sensitive topics. Beginning with team decisions about level of detail in transcription, completeness, and accuracy, we operationalize the process of securing vendors to deliver the required quality of transcription and translation. We also share rubrics for assessing transcript quality and the team protocol for managing transcripts (assuring consistency of format, insertion of metadata, anonymization, and file labeling conventions) and procuring an acceptable initial translation of Spanish-language interviews. Accurate, complete, and systematically constructed transcripts in both source and target languages respond to the call for more transparency and reproducibility of scientific methods.