WorldWideScience

Sample records for experiment study protocol

  1. Wireless Power Transfer Protocols in Sensor Networks: Experiments and Simulations

    Directory of Open Access Journals (Sweden)

    Sotiris Nikoletseas

    2017-04-01

    Full Text Available Rapid technological advances in the domain of Wireless Power Transfer pave the way for novel methods for power management in systems of wireless devices, and recent research works have already started considering algorithmic solutions for tackling emerging problems. In this paper, we investigate the problem of efficient and balanced Wireless Power Transfer in Wireless Sensor Networks. We employ wireless chargers that replenish the energy of network nodes. We propose two protocols that configure the activity of the chargers. One protocol performs wireless charging focused on the charging efficiency, while the other aims at proper balance of the chargers’ residual energy. We conduct detailed experiments using real devices and we validate the experimental results via larger scale simulations. We observe that, in both the experimental evaluation and the evaluation through detailed simulations, both protocols achieve their main goals. The Charging Oriented protocol achieves good charging efficiency throughout the experiment, while the Energy Balancing protocol achieves a uniform distribution of energy within the chargers.

  2. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    Science.gov (United States)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  3. Study on Cloud Security Based on Trust Spanning Tree Protocol

    Science.gov (United States)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  4. Experiences in the formalisation and verification of medical protocols

    OpenAIRE

    Balser, Michael

    2003-01-01

    Experiences in the formalisation and verification of medical protocols / M. Balser ... - In: Artificial intelligence in medicine : 9th Conference on Artificial Intelligence in Medicine in Europe, AIME 2003, Protaras, Cyprus, October 18 - 22, 2003 ; proceedings / Michel Dojat ... (eds.). - Berlin u.a. : Springer, 2003. - S. 132-141. - (Lecture notes in computer science ; 2780 : Lecture notes in artificial intelligence)

  5. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  6. JNC's experience of complementary accesses provided by the additional protocol

    International Nuclear Information System (INIS)

    Miura, Yasushi

    2001-01-01

    JNC (Japan Nuclear Cycle Development Institute) examined problems on implementation of the Additional Protocol to Japan/IAEA Safeguards Agreement with the Government of Japan and International Atomic Energy Agency through trials performed at Oarai Engineering Center before it entered into force. On December 16th 1999, the Additional Protocol entered into force, and in last January JNC provided the first JNC site information to STA. Then our Government provided it of all Japan to IAEA in last June. Also in this January, we sent the additional information changed from old one to MEXT (Ministry of Education, Culture, Sports, Science and Technology). The first Complementary Access of not only JNC but also Japan was implemented on JNC Ningyo-Toge Environmental Engineering Center on the end of last November. Since then, we have had over 10 times experience of Complementary Accesses for about one year especially on Tokai works and Ningyo-Toge. JNC's experience of Complementary Accesses will be introduced. (author)

  7. The relationship between childhood body weight and dental caries experience: an umbrella systematic review protocol

    Directory of Open Access Journals (Sweden)

    Susan J. Carson

    2017-10-01

    Full Text Available Abstract Background Obesity and dental caries are global public health problems which can impact in childhood and throughout the life course. In simple terms, childhood dental caries and body weight are linked via the common risk factor of diet. An association between dental caries and obesity has been described in a number of studies and reviews. However, similarly, a relationship has also been noted between low body weight and caries experience in children. This protocol will provide the framework for an umbrella review to address the following question: Does the available evidence support a relationship between dental caries experience and body weight in the child population? Methods This review protocol outlines the process to carry out an umbrella systematic review which will synthesise previous reviews of childhood dental caries experience and body weight. An umbrella review methodology will be used to examine the methodological and reporting quality of existing reviews. Discussion The final umbrella review aims to aggregate the available evidence in order to provide a summary for policymakers and to inform healthcare interventions. Systematic review registration PROSPERO CRD42016047304

  8. The relationship between childhood body weight and dental caries experience: an umbrella systematic review protocol.

    Science.gov (United States)

    Carson, Susan J; Abuhaloob, Lamis; Richards, Derek; Hector, Mark P; Freeman, Ruth

    2017-10-25

    Obesity and dental caries are global public health problems which can impact in childhood and throughout the life course. In simple terms, childhood dental caries and body weight are linked via the common risk factor of diet. An association between dental caries and obesity has been described in a number of studies and reviews. However, similarly, a relationship has also been noted between low body weight and caries experience in children. This protocol will provide the framework for an umbrella review to address the following question: Does the available evidence support a relationship between dental caries experience and body weight in the child population? This review protocol outlines the process to carry out an umbrella systematic review which will synthesise previous reviews of childhood dental caries experience and body weight. An umbrella review methodology will be used to examine the methodological and reporting quality of existing reviews. The final umbrella review aims to aggregate the available evidence in order to provide a summary for policymakers and to inform healthcare interventions. PROSPERO CRD42016047304.

  9. [Idiopathic intracranial hypertension: Experience over 25 years and a management protocol].

    Science.gov (United States)

    Monge Galindo, Lorena; Fernando Martínez, Ruth; Fuertes Rodrigo, Cristina; Fustero de Miguel, David; Pueyo Royo, Victoria; García Iñiguez, Juan Pablo; López-Pisón, Javier; Peña-Segura, José Luis

    2017-08-01

    We present our experience on idiopathic intracranial hypertension (IIH), before and after the introduction of a specific diagnosis and management protocol. A descriptive retrospective study was conducted on patients with IIH over a 25year period (1990-2015), comparing the last 7years (after introduction of the protocol) with the previous 18years. Among the 18,865 patients evaluated, there were 54 cases of IIH (29 infants and 25 children). A comparison was made between the two time periods: 32 cases in 1990-2008 -published in An Pediatr (Barc). 2009;71:400-6-, and 23 cases in 2008-2015. In post-protocol period, there were 13 patients aged between 3-10months (62% males) with transient bulging fontanelle, and 10 aged between 2-14years (50% males), with papilloedema. A total of 54% of infants had recently finished corticosteroid treatment for bronchitis. In the older children, there was one case associated with venous thrombosis caused by otomastoiditis, one case on corticosteroid treatment for angioma, and another case treated with growth hormone. Transfontanelle ultrasound was performed on all infants, and CT, MRI and angio-MRI was performed on every child. Lumbar puncture was performed on 2 infants in whom meningitis was suspected, and in all children. All patients progressed favourably, with treatment being started in 3 of them. One patient relapsed. Characteristics and outcomes of patients overlap every year. IIH usually has a favourable outcome, although it may be longer in children than in infants. It can cause serious visual disturbances, so close ophthalmological control is necessary. The protocol is useful to ease diagnostic decisions, monitoring, and treatment. Copyright © 2016 Asociación Española de Pediatría. Publicado por Elsevier España, S.L.U. All rights reserved.

  10. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  11. A protocol for the development of Mediterranean climate services based on the experiences of the CLIM-RUN case studies

    Science.gov (United States)

    Goodess, Clare; Ruti, Paolo; Rousset, Nathalie

    2014-05-01

    During the closing stages of the CLIM-RUN EU FP7 project on Climate Local Information in the Mediterranean region Responding to User Needs, the real-world experiences encountered by the case-study teams are being assessed and synthesised to identify examples of good practice and, in particular, to produce the CLIM-RUN protocol for the development of Mediterranean climate services. The specific case studies have focused on renewable energy (Morocco, Spain, Croatia, Cyprus), tourism (Savoie, Tunisia, Croatia, Cyprus) and wild fires (Greece) as well as one cross-cutting case study (Veneto region). They have been implemented following a common programme of local workshops, questionnaires and interviews, with Climate Expert Team and Stakeholder Expert Team members collaborating to identify and translate user needs and subsequently develop climate products and information. Feedback from stakeholders has been essential in assessing and refining these products. The protocol covers the following issues: the overall process and methodological key stages; identification and selection of stakeholders; communication with stakeholders; identification of user needs; translation of needs; producing products; assessing and refining products; methodologies for evaluating the economic value of climate services; and beyond CLIM-RUN - the lessons learnt. Particular emphasis is given to stakeholder analysis in the context of the participatory, bottom-up approach promoted by CLIM-RUN and to the iterative approach taken in the development of climate products. Recommendations are also made for an envisioned three-tier business model for the development of climate services involving climate, intermediary and stakeholder tiers.

  12. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  13. Why standard brain-computer interface (BCI) training protocols should be changed: an experimental study

    Science.gov (United States)

    Jeunet, Camille; Jahanpour, Emilie; Lotte, Fabien

    2016-06-01

    Objective. While promising, electroencephaloraphy based brain-computer interfaces (BCIs) are barely used due to their lack of reliability: 15% to 30% of users are unable to control a BCI. Standard training protocols may be partly responsible as they do not satisfy recommendations from psychology. Our main objective was to determine in practice to what extent standard training protocols impact users’ motor imagery based BCI (MI-BCI) control performance. Approach. We performed two experiments. The first consisted in evaluating the efficiency of a standard BCI training protocol for the acquisition of non-BCI related skills in a BCI-free context, which enabled us to rule out the possible impact of BCIs on the training outcome. Thus, participants (N = 54) were asked to perform simple motor tasks. The second experiment was aimed at measuring the correlations between motor tasks and MI-BCI performance. The ten best and ten worst performers of the first study were recruited for an MI-BCI experiment during which they had to learn to perform two MI tasks. We also assessed users’ spatial ability and pre-training μ rhythm amplitude, as both have been related to MI-BCI performance in the literature. Main results. Around 17% of the participants were unable to learn to perform the motor tasks, which is close to the BCI illiteracy rate. This suggests that standard training protocols are suboptimal for skill teaching. No correlation was found between motor tasks and MI-BCI performance. However, spatial ability played an important role in MI-BCI performance. In addition, once the spatial ability covariable had been controlled for, using an ANCOVA, it appeared that participants who faced difficulty during the first experiment improved during the second while the others did not. Significance. These studies suggest that (1) standard MI-BCI training protocols are suboptimal for skill teaching, (2) spatial ability is confirmed as impacting on MI-BCI performance, and (3) when faced

  14. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  15. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  16. Optic neuritis in paediatric patients: Experience over 27 years and a management protocol.

    Science.gov (United States)

    Monge Galindo, L; Martínez de Morentín, A L; Pueyo Royo, V; García Iñiguez, J P; Sánchez Marco, S; López-Pisón, J; Peña-Segura, J L

    2018-03-08

    In this article, we present our experience on optic neuritis (ON) and provide a diagnostic/therapeutic protocol, intended to rule out other aetiologies (particularly infection), and a fact sheet for parents. We conducted a descriptive, retrospective study of patients with ON over a 27-year period (1990-2017). A review of the available scientific evidence was performed in order to draft the protocol and fact sheet. Our neuropaediatrics department has assessed 20,744 patients in the last 27 years, of whom 14 were diagnosed with ON: 8 had isolated ON, 1 had multiple sclerosis (MS), 1 had clinically isolated syndrome (CIS), 3 had acute disseminated encephalomyelitis, and 1 had isolated ON and a history of acute disseminated encephalomyelitis one year previously. Patients' age range was 4-13 years; 50% were boys. Eight patients were aged over 10: 7 had isolated ON and 1 had MS. Nine patients had bilateral ON, and 3 had retrobulbar ON. MRI results were normal in 7 patients and showed involvement of the optic nerve only in 2 patients and optic nerve involvement + central nervous system demyelination in 5. Thirteen patients received corticosteroids. One patient had been vaccinated against meningococcus-C the previous month. Progression was favourable, except in the patient with MS. A management protocol and fact sheet are provided. ON usually has a favourable clinical course. In children aged older than 10 years with risk factors for MS or optic neuromyelitis (hyperintensity on brain MRI, oligoclonal bands, anti-NMO antibody positivity, ON recurrence), the initiation of immunomodulatory treatment should be agreed with the neurology department. The protocol is useful for diagnostic decision-making, follow-up, and treatment of this rare disease with potentially major repercussions. The use of protocols and fact sheets is important. Copyright © 2018 Sociedad Española de Neurología. Publicado por Elsevier España, S.L.U. All rights reserved.

  17. Recommended Protocol for Round Robin Studies in Additive Manufacturing

    Science.gov (United States)

    Moylan, Shawn; Brown, Christopher U.; Slotwinski, John

    2016-01-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST’s experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed. PMID:27274602

  18. Conduct of a personal radiofrequency electromagnetic field measurement study: proposed study protocol.

    Science.gov (United States)

    Röösli, Martin; Frei, Patrizia; Bolte, John; Neubauer, Georg; Cardis, Elisabeth; Feychting, Maria; Gajsek, Peter; Heinrich, Sabine; Joseph, Wout; Mann, Simon; Martens, Luc; Mohler, Evelyn; Parslow, Roger C; Poulsen, Aslak Harbo; Radon, Katja; Schüz, Joachim; Thuroczy, György; Viel, Jean-François; Vrijheid, Martine

    2010-05-20

    The development of new wireless communication technologies that emit radio frequency electromagnetic fields (RF-EMF) is ongoing, but little is known about the RF-EMF exposure distribution in the general population. Previous attempts to measure personal exposure to RF-EMF have used different measurement protocols and analysis methods making comparisons between exposure situations across different study populations very difficult. As a result, observed differences in exposure levels between study populations may not reflect real exposure differences but may be in part, or wholly due to methodological differences. The aim of this paper is to develop a study protocol for future personal RF-EMF exposure studies based on experience drawn from previous research. Using the current knowledge base, we propose procedures for the measurement of personal exposure to RF-EMF, data collection, data management and analysis, and methods for the selection and instruction of study participants. We have identified two basic types of personal RF-EMF measurement studies: population surveys and microenvironmental measurements. In the case of a population survey, the unit of observation is the individual and a randomly selected representative sample of the population is needed to obtain reliable results. For microenvironmental measurements, study participants are selected in order to represent typical behaviours in different microenvironments. These two study types require different methods and procedures. Applying our proposed common core procedures in future personal measurement studies will allow direct comparisons of personal RF-EMF exposures in different populations and study areas.

  19. Blunt hepatic and splenic trauma. A single Center experience using a multidisciplinary protocol.

    Science.gov (United States)

    Ruscelli, Paolo; Buccoliero, Farncesco; Mazzocato, Susanna; Belfiori, Giulio; Rabuini, Claudio; Sperti, Pierluigi; Rimini, Massimiliano

    2017-01-01

    The aim of this retrospective study was to describe more than 10 years experience of a single Trauma Center about non operative management of abdominal organ injuries in hemodynamically stable patients MATERIAL OF STUDY: Between January 2001 and December 2014 ,732 consecutive patients were admitted with blunt abdominal trauma, involving liver and/or spleen and/or kidney, at the Bufalini Cesena Hospital .Management of patients included a specific institutional developed protocol :hemodynamic stability was evaluated in shock room according to the patients response to fluid challenge and the patients were classified into three categories A,B,and C. Form 732 Trauma, 356(48.6%) of patients were submitted to a surgical procedure, all the other patient 376(51.4%) underwent an non operative management .Overall mortality was 9.8% (72), mortality in the surgery group was 15.4% eheras in the non operative group was 4.5%; the relative risk of mortality, measured by the odds ratio waith a 95% confidence interval, was 3.417(2.023-5.772) for rhe surgery group; patient over 40 years old has a statistically significant higher mortality. In our series the overall mortality rate of non operative management group was 4.5%, instead in unstable patients, the surgery group, the mortality was 15.3%; the overall mortality mortality rate after the application of our protocol is 9.8%, Although surgery continues to be the standard for hemodically unstable patients with blunt hepatic and splenic trauma. In our experience AAST Organ Injury Scale was useless for the therapeutic decision making process after the CT scan if a source of bleeding was detected and immediate angiography was performed in order to control and solve it. In our experience the AAST Organ Injury Scale was useless for the therapeutic decision making process, The results suggest that the only criteria of choice for therapeutici strategy was the hemodynamic stability, Nonoperative managem,ent can be applied only following

  20. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  1. Human platelet lysate in mesenchymal stromal cell expansion according to a GMP grade protocol: a cell factory experience.

    Science.gov (United States)

    Becherucci, Valentina; Piccini, Luisa; Casamassima, Serena; Bisin, Silvia; Gori, Valentina; Gentile, Francesca; Ceccantini, Riccardo; De Rienzo, Elena; Bindi, Barbara; Pavan, Paola; Cunial, Vanessa; Allegro, Elisa; Ermini, Stefano; Brugnolo, Francesca; Astori, Giuseppe; Bambi, Franco

    2018-05-02

    The use of platelet lysate (PL) for the ex-vivo expansion of mesenchymal stromal/stem cells (MSCs) was initially proposed by Doucet et al. in 2005, as an alternative to animal serum. Moreover, regulatory authorities discourage the use of fetal bovine serum (FBS) or other animal derivatives, to avoid risk of zoonoses and xenogeneic immune reactions. Even if many studies investigated PL composition, there still are some open issues related to its use in ex-vivo MSC expansion, especially according to good manufacturing practice (GMP) grade protocols. As an authorized cell factory, we report our experience using standardized PL produced by Azienda Ospedaliero Universitaria Meyer Transfusion Service for MSC expansion according to a GMP grade clinical protocol. As suggested by other authors, we performed an in-vitro test on MSCs versus MSCs cultured with FBS that still represents the best way to test PL batches. We compared 12 MSC batches cultured with DMEM 5% PL with similar batches cultured with DMEM 10% FBS, focusing on the MSC proliferation rate, MSC surface marker expression, MSC immunomodulatory and differentiation potential, and finally MSC relative telomere length. Results confirmed the literature data as PL increases cell proliferation without affecting the MSC immunophenotype, immunomodulatory potential, differentiation potential and relative telomere length. PL can be considered a safe alternative to FBS for ex-vivo expansion of MSC according to a GMP grade protocol. Our experience confirms the literature data: a large number of MSCs for clinical applications can be obtained by expansion with PL, without affecting the MSC main features. Our experience underlines the benefits of a close collaboration between the PL producers (transfusion service) and the end users (cell factory) in a synergy of skills and experiences that can lead to standardized PL production.

  2. Conduct of a personal radiofrequency electromagnetic field measurement study: proposed study protocol

    Directory of Open Access Journals (Sweden)

    Radon Katja

    2010-05-01

    Full Text Available Abstract Background The development of new wireless communication technologies that emit radio frequency electromagnetic fields (RF-EMF is ongoing, but little is known about the RF-EMF exposure distribution in the general population. Previous attempts to measure personal exposure to RF-EMF have used different measurement protocols and analysis methods making comparisons between exposure situations across different study populations very difficult. As a result, observed differences in exposure levels between study populations may not reflect real exposure differences but may be in part, or wholly due to methodological differences. Methods The aim of this paper is to develop a study protocol for future personal RF-EMF exposure studies based on experience drawn from previous research. Using the current knowledge base, we propose procedures for the measurement of personal exposure to RF-EMF, data collection, data management and analysis, and methods for the selection and instruction of study participants. Results We have identified two basic types of personal RF-EMF measurement studies: population surveys and microenvironmental measurements. In the case of a population survey, the unit of observation is the individual and a randomly selected representative sample of the population is needed to obtain reliable results. For microenvironmental measurements, study participants are selected in order to represent typical behaviours in different microenvironments. These two study types require different methods and procedures. Conclusion Applying our proposed common core procedures in future personal measurement studies will allow direct comparisons of personal RF-EMF exposures in different populations and study areas.

  3. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  4. Prayer Healing: A Case Study Research Protocol.

    Science.gov (United States)

    Kruijthoff, Dirk J; van der Kooi, Cornelis; Glas, Gerrit; Abma, Tineke A

    2017-01-01

    Context • Prayer healing is a common practice in many religious communities around the world. Even in the highly secularized Dutch society, cases of prayer healing are occasionally reported in the media, often generating public attention. There is an ongoing debate regarding whether such miraculous cures do actually occur and how to interpret them. Objective • The aim of the article was to present a research protocol for the investigation of reported cases of remarkable and/or unexplained healing after prayer. Design • The research team developed a method to perform a retrospective, case-based study of prayer healing. Reported prayer healings can be investigated systematically in accordance with a step-by-step methodology. The focus is on understanding the healing by studying it from multiple perspectives, using both medical judgment and patients' narratives collected by qualitative methods Setting • The study occurred at Vrije Universiteit (VU) and VU Medical Center (Amsterdam, Netherlands) as well as the general medical practice of the first author. Participants • Potential participants could be any individuals in the Netherlands or neighboring countries who claim to have been healed through prayer. The reports of healing came from multiple sources, including the research team's medical practices and their direct vicinities, newspaper articles, prayer healers, and medical colleagues. Outcome Measures • Medical data were obtained before and after prayer. Subsequently, a member of a research team and of a medical assessment committee made a standardized judgment that evaluated whether a cure was clinically remarkable or scientifically unexplained. The participants' experiences and insider perspectives were studied, using in-depth interviews in accordance with a qualitative research methodology, to gain insight into the perceptions and explanations of the cures that were offered by participants and by the members of the medical assessment committee. The

  5. Protocol renal biopsy in patients with lupus nephritis: a single center experience.

    Science.gov (United States)

    Singh, Ametashver; Ghosh, Rabindranath; Kaur, Prabhjeet; Golay, Vishal; Pandey, Rajendra; Roychowdhury, Arpita

    2014-07-01

    Renal biopsy plays an indispensable role in the diagnosis and management of patients with lupus nephritis (LN). A number of studies have evaluated the role of a repeat biopsy in case of disease relapse or treatment unresponsiveness. We studied 40 patients with LN with renal biopsies performed at baseline and after six months of therapy. The baseline and protocol biopsies were compared with respect to histological class transformation, crescents, tubular atrophy, interstitial fibrosis and glomerulosclerosis. We also compared serum creatinine, hemoglobin, systemic lupus erythematosus disease activity index (SLEDAI) scores, 24-h urine protein excretion and C3levels as well as activity index (AI) and chronicity index (CI) at baseline and at six months. Comparison of means was made by paired t test, McNemar test and marginal homogeneity test (multinomial data). Histological class transformation was seen in 10 patients (25%). Intra-class progression to greater chronicity was seen in 10 other patients (25%).There was an increase in glomerulosclerosis, tubular atrophy, interstitial fibrosis and a reduction in cellularity, crescent formation and wire loop lesions in the protocol biopsy. A decline in AI (6.05 vs. 2.50, P protocol biopsy. Our study shows a trend toward greater chronicity in protocol biopsies in LN.

  6. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  7. Care for diabetes patients using the Staged Diabetes Management protocol: an experience report - doi:10.5020/18061230.2006.p253

    Directory of Open Access Journals (Sweden)

    Maria Lúcia Zanetti

    2012-01-01

    Full Text Available The work in multi professional health team has been acknowledged as important for the diabetic patient education. This study aimed at describing the implementation of a care assistance program using the Staged Diabetes Management (SDM protocol; also, characterizing the activities performed by the multi professional health team of the Nurse Education Center for Adults and Elderly, from Ribeirão Preto, in the treatment of diabetic patients. The study was developed from April, 2004 to April, 2005 through weakly meetings, combining individual and group activities coordinated by nurses, physicians, nutritionists, psychologists and physical educators. The results showed that the use of the SDM protocol contributed to improve diabetic patient’s metabolic control and consequently, drug cover up for diabetes mellitus, arterial hypertension and dislipidemia; also, increased the adherence to the nutrition program, to physical activity and the knowledge about the disease; and yet, reduced the signs and symptoms referred by the patients. This experience, showed the viability of implanting the referred protocol. The authors believe that the disclosure of this type of study might contribute to the guides commended by World Health Organization for the care of diabetic patients, specially the disease’s self-managed care.

  8. Study of a scanning HIFU therapy protocol, Part II: Experiment and results

    Science.gov (United States)

    Andrew, Marilee A.; Kaczkowski, Peter; Cunitz, Bryan W.; Brayman, Andrew A.; Kargl, Steven G.

    2003-04-01

    Instrumentation and protocols for creating scanned HIFU lesions in freshly excised bovine liver were developed in order to study the in vitro HIFU dose response and validate models. Computer-control of the HIFU transducer and 3-axis positioning system provided precise spatial placement of the thermal lesions. Scan speeds were selected in the range of 1 to 8 mm/s, and the applied electrical power was varied from 20 to 60 W. These parameters were chosen to hold the thermal dose constant. A total of six valid scans of 15 mm length were created in each sample; a 3.5 MHz single-element, spherically focused transducer was used. Treated samples were frozen, then sliced in 1.27 mm increments. Digital photographs of slices were downloaded to computer for image processing and analysis. Lesion characteristics, including the depth within the tissue, axial length, and radial width, were computed. Results were compared with those generated from modified KZK and BHTE models, and include a comparison of the statistical variation in the across-scan lesion radial width. [Work supported by USAMRMC.

  9. Study protocol for the Cities Changing Diabetes programme

    DEFF Research Database (Denmark)

    Napier, A David; Nolan, John J; Bagger, Malene

    2017-01-01

    and management are improving, complications remain common, and diabetes is among the leading causes of vision loss, amputation, neuropathy and renal and cardiovascular disease worldwide. We present a research protocol for exploring the drivers of type 2 diabetes and its complications in urban settings through...... the Cities Changing Diabetes (CCD) partnership programme. METHODS AND ANALYSIS: A global study protocol is implemented in eight collaborating CCD partner cities. In each city, academic institutions, municipal representatives and local stakeholders collaborate to set research priorities and plan...... Assessment explores the urban context in vulnerability to type 2 diabetes and identifies social factors and cultural determinants relevant to health, well-being and diabetes. ETHICS AND DISSEMINATION: The protocol steers the collection of primary and secondary data across the study sites. Research ethics...

  10. Balancing Opposing Forces—A Nested Process Evaluation Study Protocol for a Stepped Wedge Designed Cluster Randomized Controlled Trial of an Experience Based Codesign Intervention

    Directory of Open Access Journals (Sweden)

    Victoria Jane Palmer

    2016-10-01

    Full Text Available Background: Process evaluations are essential to understand the contextual, relational, and organizational and system factors of complex interventions. The guidance for developing process evaluations for randomized controlled trials (RCTs has until recently however, been fairly limited. Method/Design: A nested process evaluation (NPE was designed and embedded across all stages of a stepped wedge cluster RCT called the CORE study. The aim of the CORE study is to test the effectiveness of an experience-based codesign methodology for improving psychosocial recovery outcomes for people living with severe mental illness (service users. Process evaluation data collection combines qualitative and quantitative methods with four aims: (1 to describe organizational characteristics, service models, policy contexts, and government reforms and examine the interaction of these with the intervention; (2 to understand how the codesign intervention works, the cluster variability in implementation, and if the intervention is or is not sustained in different settings; (3 to assist in the interpretation of the primary and secondary outcomes and determine if the causal assumptions underpinning the codesign interventions are accurate; and (4 to determine the impact of a purposefully designed engagement model on the broader study retention and knowledge transfer in the trial. Discussion: Process evaluations require prespecified study protocols but finding a balance between their iterative nature and the structure offered by protocol development is an important step forward. Taking this step will advance the role of qualitative research within trials research and enable more focused data collection to occur at strategic points within studies.

  11. A pilot experience launching a national dose protocol for vascular and interventional radiology

    International Nuclear Information System (INIS)

    Vano, E.; Segarra, A.; Fernandez, J. M.; Ordiales, J. M.; Simon, R.; Gallego, J. J.; Del Cerro, J.; Casasola, E.; Verdu, J. F.; Ballester, T.; Sotil, J.; Aspiazu, A.; Garcia, M. A.; Moreno, F.; Carreras, F.; Canis, M.; Soler, M. M.; Palmero, J.; Ciudad, J.; Diaz, F.; Hernandez, J.; Gonzalez, M.; Rosales, P.

    2008-01-01

    The design of a national dose protocol for interventional radiology has been one of the tasks during the European SENTINEL Coordination Action. The present paper describes the pilot experience carried out in cooperation with the Spanish Society on Vascular and Interventional Radiology (SERVEI). A prospective sample of procedures was initially agreed. A common quality control of the X-ray systems was carried out, including calibration of the air kerma area product (KAP) meters. Occupational doses of the radiologists involved in the survey were also included in the survey. A total of 10 Spanish hospitals with interventional X-ray units were involved. Six hundred and sixty-four patient dose data were collected from 397 diagnostic and 267 therapeutic procedures. Occupational doses were evaluated in a sample of 635 values. The obtained KAP median/mean values (Gy.cm 2 ) for the gathered procedures were: biliary drainage (30.6/68.9), fistulography (4.5/9.8), lower limb arteriography (52.2/60.7), hepatic chemoembolisation (175.8/218.3), iliac stent (45.9/73.2) and renal arteriography (39.1/59.8). Occupational doses (mean monthly values, in mSv) were 1.9 (over apron); 0.3 (under apron) and 4.5 (on hands). With this National experience, a protocol was agreed among the SENTINEL partners to conduct future similar surveys in other European countries. (authors)

  12. Data-driven CT protocol review and management—experience from a large academic hospital.

    Science.gov (United States)

    Zhang, Da; Savage, Cristy A; Li, Xinhua; Liu, Bob

    2015-03-01

    Protocol review plays a critical role in CT quality assurance, but large numbers of protocols and inconsistent protocol names on scanners and in exam records make thorough protocol review formidable. In this investigation, we report on a data-driven cataloging process that can be used to assist in the reviewing and management of CT protocols. We collected lists of scanner protocols, as well as 18 months of recent exam records, for 10 clinical scanners. We developed computer algorithms to automatically deconstruct the protocol names on the scanner and in the exam records into core names and descriptive components. Based on the core names, we were able to group the scanner protocols into a much smaller set of "core protocols," and to easily link exam records with the scanner protocols. We calculated the percentage of usage for each core protocol, from which the most heavily used protocols were identified. From the percentage-of-usage data, we found that, on average, 18, 33, and 49 core protocols per scanner covered 80%, 90%, and 95%, respectively, of all exams. These numbers are one order of magnitude smaller than the typical numbers of protocols that are loaded on a scanner (200-300, as reported in the literature). Duplicated, outdated, and rarely used protocols on the scanners were easily pinpointed in the cataloging process. The data-driven cataloging process can facilitate the task of protocol review. Copyright © 2015 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  13. Identification of a research protocol to study orthodontic tooth movement

    Directory of Open Access Journals (Sweden)

    Annalisa Dichicco

    2014-06-01

    Full Text Available Aim: The orthodontic movement is associated with a process of tissue remodeling together with the release of several chemical mediators in periodontal tissues. Each mediator is a potential marker of tooth movement and expresses biological processes as: tissue inflammation and bone remodeling. Different amounts of every mediator are present in several tissues and fluids of the oral cavity. Therefore, there are different methods that allow sampling with several degrees of invasiveness. Chemical mediators are also substances of different molecular nature, and multiple kind of analysis methods allow detection. The purpose of this study was to draft the best research protocol for an optimal study on orthodontic movement efficiency. Methods: An analysis of the international literature have been made, to identify the gold standard of each aspect of the protocol: type of mediator, source and method of sampling and analysis method. Results: From the analysis of the international literature was created an original research protocol for the study and the assessment of the orthodontic movement, by using the biomarkers of the tooth movement. Conclusions: The protocol created is based on the choice of the gold standard of every aspect already analyzed in the literature and in existing protocols for the monitoring of orthodontic tooth movement through the markers of tooth movement. Clinical trials re required for the evaluation and validation of the protocol created.

  14. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  15. Protocol of study and pursuit of the radioinduced burns

    International Nuclear Information System (INIS)

    Portas, Mercedes; Glustein, Daniel; Pomerane, Armando; Peragallo, Mabel; Guzman, Alejandra; Ciordia, Irma; Genovese, Jorge; Cymberknoh, Manuel; Dubner, Diana; Michelin, Severino; Perez, Maria del Rosario; Trano, Jose Luis Di; Gisone, Pablo

    2001-01-01

    A study of localized overexposures based on local experience and international criteria is being carried out within the framework of a cooperation agreement between the Buenos Aires Burned Hospital and the Nuclear Regulatory Authority. This protocol was designed considering separately acute and chronic reactions, including the following aspects: patient reception: clinical findings, laboratory tests, photographic recording, and multidisciplinary evaluation; dose reconstruction: evaluation of the dose distribution by biophysical and biological procedures; extension and depth estimation: telethermography, computed tomography, magnetic resonance, radioisotopic procedures, capillaroscopy and percutaneous oxymetry; therapeutic strategies: pain treatment, prevention of infections, systemic administration of pentoxiphyllin and alpha-tocopherol, local application of trolamine and antioxidants, prevention and treatment of radioinduced fibrosis. When it is indicated, surgical treatment includes partial or total excision followed by covering by graft or flap. The application of tissue-engineering techniques will be considered. Study of individual radiosensitivity: evaluation of apoptosis in peripheral lymphocytes and clonogenic assays in dermal fibroblasts 'in vitro' irradiated. (author)

  16. Study and development of a remote biometric authentication protocol

    OpenAIRE

    Bistarelli, Stefano; Claudio, Viti

    2003-01-01

    This paper reports the phases of study and implementation of a remote biometric authentication protocol developed during my internship at the I.i.t. of the C.n.r. in Pisa. Starting from the study of authentication history we had a look from the first system used since the 60ies to the latest technology; this helped us understand how we could realize a demonstration working protocol that could achieve a web remote authentication granting good reliability: to do this we choosed to modify the SS...

  17. Studying protocol-based pain management in the emergency department

    Directory of Open Access Journals (Sweden)

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  18. BioBlocks: Programming Protocols in Biology Made Easier.

    Science.gov (United States)

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-07-21

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  19. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  20. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    Directory of Open Access Journals (Sweden)

    Subhajit Pal

    2010-11-01

    Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  1. Impact of Sleep Telemedicine Protocol in Management of Sleep Apnea: A 5-Year VA Experience.

    Science.gov (United States)

    Baig, Mirza M; Antonescu-Turcu, Andrea; Ratarasarn, Kavita

    2016-05-01

    There is growing evidence that demonstrates an important role for telemedicine technologies in enhancing healthcare delivery. A comprehensive sleep telemedicine protocol was implemented at the Veterans Administration Medical Center (VAMC), Milwaukee, WI, in 2008 in an effort to improve access to sleep specialty care. The telemedicine protocol relied heavily on sleep specialist interventions based on chart review (electronic consult [e-consult]). This was done in response to long wait time for sleep clinic visits as well as delayed sleep study appointments. Since 2008 all consults are screened by sleep service to determine the next step in intervention. Based on chart review, the following steps are undertaken: (1) eligibility for portable versus in-lab sleep study is determined, and a sleep study order is placed accordingly, (2) positive airway pressure (PAP) therapy is prescribed for confirmed sleep apnea, and (3) need for in-person evaluation in the sleep clinic is determined, and the visit is scheduled. This study summarizes the 5-year trend in various aspects of access to sleep care after implementation of sleep telemedicine protocol at the Milwaukee VAMC. This is a retrospective system efficiency study. The electronic medical record was interrogated 5 years after starting the sleep telemedicine protocol to study annual trends in the following outcomes: (1) interval between sleep consult and prescription of PAP equipment, (2) total sleep consults, and (3) sleep clinic wait time. Two part-time sleep physicians provided sleep-related care at the Milwaukee VAMC between 2008 and 2012. During this period, the interval between sleep consult and PAP prescription decreased from ≥60 days to ≤7 days. This occurred in spite of an increase in total sleep consults and sleep studies. There was also a significant increase in data downloads, indicating overall improved follow-up. There was no change in clinic wait time of ≥60 days. Implementation of a sleep telemedicine

  2. Application of the Putting Women First protocol in a study on violence against immigrant women in Spain.

    Science.gov (United States)

    Torrubiano-Domínguez, Jordi; Vives-Cases, Carmen

    2013-01-01

    In this paper, we describe our experience of using the Putting Women First protocol in the design and implementation of a cross-sectional study on violence against women (VAW) among 1607 immigrant women from Morocco, Ecuador and Romania living in Spain in 2011. The Putting Women First protocol is an ethical guideline for VAW research, which includes recommendations to ensure the safety of the women involved in studies on this subject. The response rate in this study was 59.3%. The prevalence of VAW cases last year was 11.7%, of which 15.6% corresponded to Ecuadorian women, 10.9% to Moroccan women and 8.6% to Romanian women. We consider that the most important goal for future research is the use of VAW scales validated in different languages, which would help to overcome the language barriers encountered in this study. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  3. [Palliative sedation in a university hospital: experience after introducing a specific protocol].

    Science.gov (United States)

    Boceta Osuna, J; Nabal Vicuña, M; Martínez Peñalver, F; Blanco Picabia, A; Aguayo Canela, M; Royo Aguado, J L

    2013-01-01

    A descriptive prospective study of palliative sedation (PS) records during a one year period after starting the PS protocol. Patients included in the PS protocol and those who had completed the "data registry form". Registry forms included in the PS protocol as Annex 5 (included as Annex 1 in this study). Personal data, data regarding basal disease, prognosis, level of information. Refractory symptoms: type, time of evolution and treatments employed. Involvement of the patient and/or representatives in decision making. Type of sedation, continuity, depth, employed, duration and results, and readjustment of other therapeutic measures. The SPSS 14.0 was used. For qualitative variables we studied absolute frequencies and proportions. For quantitative variables with normal distribution, we used means and standard deviations, and for non-normal distribution, medians and ranges. In the study period 90 cases of PS were counted. This represented 27.6% of the patients treated in the hospital palliative care support team (PCST), and 7.03% of the total deceased patients in our hospital. Mean age of patients undergoing PS was 59.22 years old, range between 40.86 and 77.58 years, and 68.1% were men. All patients were in an advanced or terminal stage of their condition, and 49.5% in an agonal phase. In 90.4% of the cases, the main pathology was oncological. Regarding PS indication, this was jointly made between the PCST physician and the patient's usual doctor in 60 cases (66.6%). Symptoms leading to sedation were mainly dyspnea, delirium and pain. The Ethics committee was consulted in five cases. Mean time under sedation was 134.02 hours (5.5 days). In 90% of the cases, duration ranged from 50 to 218.04 hours (2-9 days). Depth of PS after induction was registered in 88.8% of the cases. Informed consent (IC) was explicit in 11.2% of the cases,and given prior to the appearance of refractory symptoms and/or agonal phase. In 88.8% of sedation cases, the IC was given by a

  4. Fate of clinical research studies after ethical approval--follow-up of study protocols until publication.

    Directory of Open Access Journals (Sweden)

    Anette Blümle

    Full Text Available Many clinical studies are ultimately not fully published in peer-reviewed journals. Underreporting of clinical research is wasteful and can result in biased estimates of treatment effect or harm, leading to recommendations that are inappropriate or even dangerous.We assembled a cohort of clinical studies approved 2000-2002 by the Research Ethics Committee of the University of Freiburg, Germany. Published full articles were searched in electronic databases and investigators contacted. Data on study characteristics were extracted from protocols and corresponding publications. We characterized the cohort, quantified its publication outcome and compared protocols and publications for selected aspects.Of 917 approved studies, 807 were started and 110 were not, either locally or as a whole. Of the started studies, 576 (71% were completed according to protocol, 128 (16% discontinued and 42 (5% are still ongoing; for 61 (8% there was no information about their course. We identified 782 full publications corresponding to 419 of the 807 initiated studies; the publication proportion was 52% (95% CI: 0.48-0.55. Study design was not significantly associated with subsequent publication. Multicentre status, international collaboration, large sample size and commercial or non-commercial funding were positively associated with subsequent publication. Commercial funding was mentioned in 203 (48% protocols and in 205 (49% of the publications. In most published studies (339; 81% this information corresponded between protocol and publication. Most studies were published in English (367; 88%; some in German (25; 6% or both languages (27; 6%. The local investigators were listed as (co-authors in the publications corresponding to 259 (62% studies.Half of the clinical research conducted at a large German university medical centre remains unpublished; future research is built on an incomplete database. Research resources are likely wasted as neither health care

  5. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    Science.gov (United States)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  6. Using patients' experiences of adverse events to improve health service delivery and practice: protocol of a data linkage study of Australian adults age 45 and above.

    Science.gov (United States)

    Walton, Merrilyn; Jorm, Christine; Smith-Merry, Jennifer; Harrison, Reema; Manias, Elizabeth; Iedema, Rick; Kelly, Patrick

    2014-10-13

    Evidence of patients' experiences is fundamental to creating effective health policy and service responses, yet is missing from our knowledge of adverse events. This protocol describes explorative research redressing this significant deficit; investigating the experiences of a large cohort of recently hospitalised patients aged 45 years and above in hospitals in New South Wales (NSW), Australia. The 45 and Up Study is a cohort of 265,000 adults aged 45 years and above in NSW. Patients who were hospitalised between 1 January and 30 June 2014 will be identified from this cohort using data linkage and a random sample of 20,000 invited to participate. A cross-sectional survey (including qualitative and quantitative components) will capture patients' experiences in hospital and specifically of adverse events. Approximately 25% of respondents are likely to report experiencing an adverse event. Quantitative components will capture the nature and type of events as well as common features of patients' experiences. Qualitative data provide contextual knowledge of their condition and care and the impact of the event on individuals. Respondents who do not report an adverse event will report their experience in hospital and be the control group. Statistical and thematic analysis will be used to present a patient perspective of their experiences in hospital; the characteristics of patients experiencing an adverse event; experiences of information sharing after an event (open disclosure) and the other avenues of redress pursued. Interviews with key policymakers and a document analysis will be used to create a map of the current practice. Dissemination via a one-day workshop, peer-reviewed publications and conference presentations will enable effective clinical responses and service provision and policy responses to adverse events to be developed. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  7. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  8. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  9. The Interface of Clinical Decision-Making With Study Protocols for Knowledge Translation From a Walking Recovery Trial.

    Science.gov (United States)

    Hershberg, Julie A; Rose, Dorian K; Tilson, Julie K; Brutsch, Bettina; Correa, Anita; Gallichio, Joann; McLeod, Molly; Moore, Craig; Wu, Sam; Duncan, Pamela W; Behrman, Andrea L

    2017-01-01

    Despite efforts to translate knowledge into clinical practice, barriers often arise in adapting the strict protocols of a randomized, controlled trial (RCT) to the individual patient. The Locomotor Experience Applied Post-Stroke (LEAPS) RCT demonstrated equal effectiveness of 2 intervention protocols for walking recovery poststroke; both protocols were more effective than usual care physical therapy. The purpose of this article was to provide knowledge-translation tools to facilitate implementation of the LEAPS RCT protocols into clinical practice. Participants from 2 of the trial's intervention arms: (1) early Locomotor Training Program (LTP) and (2) Home Exercise Program (HEP) were chosen for case presentation. The two cases illustrate how the protocols are used in synergy with individual patient presentations and clinical expertise. Decision algorithms and guidelines for progression represent the interface between implementation of an RCT standardized intervention protocol and clinical decision-making. In each case, the participant presents with a distinct clinical challenge that the therapist addresses by integrating the participant's unique presentation with the therapist's expertise while maintaining fidelity to the LEAPS protocol. Both participants progressed through an increasingly challenging intervention despite their own unique presentation. Decision algorithms and exercise progression for the LTP and HEP protocols facilitate translation of the RCT protocol to the real world of clinical practice. The two case examples to facilitate translation of the LEAPS RCT into clinical practice by enhancing understanding of the protocols, their progression, and their application to individual participants.Video Abstract available for more insights from the authors (see Supplemental Digital Content 1, available at: http://links.lww.com/JNPT/A147).

  10. Standardization of a Videofluoroscopic Swallow Study Protocol to Investigate Dysphagia in Dogs.

    Science.gov (United States)

    Harris, R A; Grobman, M E; Allen, M J; Schachtel, J; Rawson, N E; Bennett, B; Ledyayev, J; Hopewell, B; Coates, J R; Reinero, C R; Lever, T E

    2017-03-01

    Videofluoroscopic swallow study (VFSS) is the gold standard for diagnosis of dysphagia in veterinary medicine but lacks standardized protocols that emulate physiologic feeding practices. Age impacts swallow function in humans but has not been evaluated by VFSS in dogs. To develop a protocol with custom kennels designed to allow free-feeding of 3 optimized formulations of contrast media and diets that address limitations of current VFSS protocols. We hypothesized that dogs evaluated by a free-feeding VFSS protocol would show differences in objective swallow metrics based on age. Healthy juvenile, adult, and geriatric dogs (n = 24). Prospective, experimental study. Custom kennels were developed to maintain natural feeding behaviors during VFSS. Three food consistencies (thin liquid, pureed food, and dry kibble) were formulated with either iohexol or barium to maximize palatability and voluntary prehension. Dogs were evaluated by 16 swallow metrics and compared across age groups. Development of a standardized VFSS protocol resulted in successful collection of swallow data in healthy dogs. No significant differences in swallow metrics were observed among age groups. Substantial variability was observed in healthy dogs when evaluated under these physiologic conditions. Features typically attributed to pathologic states, such as gastric reflux, were seen in healthy dogs. Development of a VFSS protocol that reflects natural feeding practices may allow emulation of physiology resulting in clinical signs of dysphagia. Age did not result in significant changes in swallow metrics, but additional studies are needed, particularly in light of substantial normal variation. Copyright © 2017 The Authors. Journal of Veterinary Internal Medicine published by Wiley Periodicals, Inc. on behalf of the American College of Veterinary Internal Medicine.

  11. Evaluation of a biodegradation screening protocol for contaminated soil from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Morgan, D.J.; Battaglia, A.; Smith, J.R.; Middleton, A.C.; Nakles, D.V.; Linz, D.G.

    1991-01-01

    Bioremediation has been demonstrated to be a viable alternative for treating soils contaminated with PAHs. however, given the variability encountered in soils characteristics and contamination level, their susceptibility to biological treatment must be assessed on a case-by-case basis. This paper discusses a new treatability protocol, the GRI Accelerated Treatability Protocol. The mainstay of the protocol, which is designed to quickly provide treatability data for a given contaminated soil is a bioslurry experiment, in which the contaminated soil is continuously stirred and provided with abundant oxygen, nutrients and water, to maximize biological activity and thus contaminant removal. The results of using such protocol on four soils, widely differing in physical characteristics and contamination levels, are compared to the results of traditional pan studies, and an empirical equation, describing the observed soil concentrations as a function of time in both slurry and pans, is presented. Similarities and differences between achievable endpoints and biodegradation rates are discussed, and the applicability of the GRI Accelerated Treatability Protocol to full-scale engineered systems is addressed. Results to date indicate that, for soils with less than 10% fines slurry and pan experiments yield approximately the same endpoint, so that for those soils the GRI Accelerated Treatability Protocol can be used to assess the viability of an unsaturated bioremediation system. For soils with more than 10% fines, the slurry treatment endpoints are better than the pans. For those soils a traditional pan study experiment should be performed to evaluate the potential capabilities of unsaturated bioremediation

  12. WE-E-304-00: Implementing SBRT Protocols

    International Nuclear Information System (INIS)

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  13. WE-E-304-00: Implementing SBRT Protocols

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  14. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  15. Development of a systematic observation protocol of physical exposure of the back: a preliminary study.

    Science.gov (United States)

    Tousignant, M; Tougas, G; Rossignol, M; Goulet, L

    2002-04-01

    At present there is no systematic observation protocol for the assessment of the multi-factorial aspects of physical exposure related to the back used within the constraints of occupational epidemiological research. In this context, a new preliminary systematic observation protocol is proposed to assess exposure to physical loading of the back using nine categories of physical risk factors: the SOPE back protocol. The objective of this study was to investigate whether the new protocol can correctly identify the level of exposure related to measured physical loading of the back. The subjects of this closed cohort study were 451 manual workers at a natural gas distribution company. The assessment of exposure was made with the protocol using groups with different job titles. The workers were followed for a 2 yr period to establish the risk of a new occurrence of complete disability related to the back (NOCD back injury) in each job grouping. Based on the median of the total scores derived from the protocol, two levels of exposure were identified (high and low). Taking into account the limitations of this study, the protocol in development may be a good tool to establish two levels of exposure to physical loading of the back in large epidemiological studies of occupational low back pain. Further research is needed to replicate these results with larger samples and to test the reliability and predictive validity of the protocol.

  16. The scheduling of repeat cesarean section operations: prospective management protocol experience.

    Science.gov (United States)

    Read, J A

    1985-03-01

    There are benefits to patients and a busy obstetric service if repeat cesarean section operations are performed on a scheduled basis. Optimum management avoids prematurity and reduces the need for amniocentesis. Over a period of 20 months repeat cesarean sections were performed at Tripler Army Medical Center while a protocol with the following elements was used: (1) known last menstrual period; (2) landmarks: positive urine human chorionic gonadotropin test by 6 weeks, Doppler fetal heart tone by 12 weeks, date determination by examination before 10 weeks, fetoscope fetal heart tone by 20 weeks, and date determination by size before 30 weeks; (3) date determination by midtrimester sonogram(s); (4) normal third-trimester glucose screening; (5) biparietal diameter of 9.2 or 9.5 cm before scheduling. With two or more clinical landmarks and one date by sonogram or one landmark and date by two sonograms, elective repeat cesarean section was scheduled at 39 weeks if the biparietal diameter was greater than or equal to 9.2 cm (127). If dates by sonogram were less than dates by last menstrual period but greater than 1 week or if last menstrual period was unknown, dates by sonogram and landmarks corresponding to dates by sonogram were used to electively schedule, with biparietal diameters of 9.2 or 9.5 cm respectively required (28). If protocol criteria were not met or earlier delivery was indicated (e.g., vertical scar or diabetes), amniocentesis was performed (42), except when not possible, advisable, or refused when patients either elected labor (20) or were scheduled if three or more criteria for 40+ weeks were met (18). Of 225 patients (70.5%) scheduled by protocol (173), amniocentesis (34), or medical indication (18), 188 (58.9%) were delivered without labor. In the 147 patients (46.1%) delivered electively by protocol without labor or amniocentesis, there were no cases of respiratory distress syndrome and the mean birth weight was 3517 gm. With early care and better

  17. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  18. Pregnancy outcome of “delayed start” GnRH antagonist protocol versus GnRH antagonist protocol in poor responders: A clinical trial study

    Directory of Open Access Journals (Sweden)

    Abbas Aflatoonian

    2017-08-01

    Full Text Available Background: Management of poor-responding patients is still major challenge in assisted reproductive techniques (ART. Delayed-start GnRH antagonist protocol is recommended to these patients, but little is known in this regards. Objective: The goal of this study was assessment of delayed-start GnRH antagonist protocol in poor responders, and in vitro fertilization (IVF outcomes. Materials and Methods: This randomized clinical trial included sixty infertile women with Bologna criteria for ovarian poor responders who were candidate for IVF. In case group (n=30, delayed-start GnRH antagonist protocol administered estrogen priming followed by early follicular-phase GnRH antagonist treatment for 7 days before ovarian stimulation with gonadotropin. Control group (n=30 treated with estrogen priming antagonist protocol. Finally, endometrial thickness, the rates of oocytes maturation, , embryo formation, and pregnancy were compared between two groups. Results: Rates of implantation, chemical, clinical, and ongoing pregnancy in delayed-start cycles were higher although was not statistically significant. Endometrial thickness was significantly higher in case group. There were no statistically significant differences in the rates of oocyte maturation, embryo formation, and IVF outcomes between two groups. Conclusion: There is no significant difference between delayed-start GnRH antagonist protocol versus GnRH antagonist protocol.

  19. A Performance Study of LEACH and Direct Diffusion Routing Protocols in Wireless Sensor Network

    International Nuclear Information System (INIS)

    Fakher, S.; Sharshar, K.; Moawad, M.I.; Shokair, M.

    2016-01-01

    The Wireless Sensor Network (WSN) is composed of a large number of sensor nodes with limited computation communication, and battery facilities. One of the common applications of this network is environment monitoring through sensing motion, measuring temperature, humidity and radiation. One of the basic activities in WSN is data gathering which represents a great challenge. Many routing protocols are proposed for that network to collect and aggregate the data. The most popular ones are hierarchy and data centric routing protocols. The main goal of this study is to identify the most preferable routing protocol, to be used in each mobility model. This paper studies the performance of LEACH (Low Energy Adaptive Clustering Hierarchy) from hierarchy routing protocol and direct diffusion from data centric routing protocol which is not clarified until now. Moreover, a comparison between LEACH and direct diffusion protocol using NS2 simulator will be made, and an analysis of these protocols will be conducted. The comparison includes packet delivery ratio, throughput, average energy ratio, average delay, network lifetime, and routing overhead. The performance is evaluated by varying the number of sensor nodes under three mobility models Reference Point Group Mobility Model (RPGM), Manhattan and random waypoint mobility model. Simulation results show that LEACH routing protocol has a good performance in RPGM and Manhattan than random waypoint mobility model. Direct diffusion has a good performance in random waypoint mobility model than in RPGM and Manhattan mobility model

  20. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  1. Optimizing life success through residential immersive life skills programs for youth with disabilities: study protocol of a mixed-methods, prospective, comparative cohort study.

    Science.gov (United States)

    McPherson, Amy C; King, Gillian; Rudzik, Alanna; Kingsnorth, Shauna; Gorter, Jan Willem

    2016-09-06

    Young people with disabilities often lag behind their typically developing peers in the achievement of adult roles, which has been attributed to a lack of opportunities to develop critical life skills. Residential Immersive Life Skills (RILS) programs provide situated learning opportunities to develop life skills alongside peers and away from home in real-world settings. Retrospective research suggests that attending RILS programs is a transformative experience that empowers youth, provides parental hope, and increases service provider expertise. However, prospective, comparative research is needed to determine longer term benefits of these programs on youth life trajectories, in addition to exploring the program features and participant experiences that optimize program success. This protocol describes a 5-year, multi-site prospective study examining the effects of RILS programs for youth with disabilities. The study involves RILS programs at three sites in Ontario, Canada. Cohorts of treatment and control groups will receive the study protocol over 3 successive years. Thirty English-speaking participants aged 14-21 years with a child-onset disability and the cognitive capacity to engage in goal setting will be recruited every year for 3 years in the following groups: youth attending a RILS program (Group A); a deferred RILS control group of youth (Group B); a control group of youth attending a non-residential life skills program (Group C); and a control group matched on age, diagnoses, and cognitive capacity not receiving any life skills intervention (Group D). All participants will complete measures of self-determination and self-efficacy at four time points. Program opportunities and experiences will also be assessed in-the-moment at the RILS programs. Qualitative interviews pre-program and at 3- and 12-months post-program will be undertaken with a sub-sample of youth and parents to explore their expectations and experiences. This study will address key gaps

  2. The impact of the Family Communication Coordinator (FCC) Protocol on the role stress of hospital chaplains.

    Science.gov (United States)

    Dodd-McCue, Diane; Tartaglia, Alexander

    2005-01-01

    The Family Communication Coordinator (FCC) Protocol was implemented to provide early family intervention and to facilitate effective communications during potential organ donation cases. Previous studies found the Protocol associated with improved donor outcome measures and with reduced role stress for ICU nurses caring for potential donors. The present study examines the impact of the Protocol on the perceived role stress of hospital chaplains serving as FCCs. All hospital chaplains serving as FCCs at an academic teaching hospital were surveyed. Their perceptions of job dimensions, role stress, job satisfaction, and commitment were measured; interviews and secondary data supplemented the surveys. The findings demonstrate that the FCC Protocol is associated with improved role stress, specifically role ambiguity and role conflict, among hospital chaplains serving as FCCs. Additionally, the findings suggest that satisfaction with the Protocol may be associated with experience with the Protocol.

  3. Implementation of Quality Control Protocol in Mammography: A Serbian Experience

    International Nuclear Information System (INIS)

    Ciraj Bjelac, O.; Kosutic, D.; Arandjic, D.; Kovacevic, M.

    2008-01-01

    Mammography is method of choice for early detection of breast cancer. In Serbia, mammography is performed only clinically, although there is a long term plan to introduce mammography as screening method. Currently there are 60 mammography units in practice in Serbia, resulting with 70 000 mammographies annually. The purpose of this paper is preliminary evaluation of the mammography practice in Serbia, having in mind the annual number of examinations and fact that part of examination is performed on women without any clinical signs. For pilot implementation of Quality Control (QC) protocol in mammography, five hospitals with highest workload have been selected, representing the typical mammography practice in Serbia. Developed QC protocol, based on European guidelines for quality assurance in breast cancer screening and diagnosis, actual practice and resources, includes equipment testing and maintenance, staff training and QC management and allocation of responsibilities. Subsequently, it should be applied on the national scale. The survey demonstrated considerable variations in technical parameters that affect image quality and patients doses. Mean glandular doses ranged from 0.12 to 2.8 mGy, while reference optical density ranged from 1.2 to 2.8. Main problems were associated with film processing, viewing conditions and optical density control. The preliminary survey of mammography practice highlighted the need for optimization of radiation protection and training of operating staff, although the survey itself was very valuable learning process for all participants. Furthermore, systematic implementation of QC protocol should provide reliable performance of mammography units and maintain satisfactory image quality and keep patient doses as low as reasonably practical.(author)

  4. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means...... the statistical principles for trial protocols in terms of design, analysis, and reporting of findings....

  5. Recommendations for Enhancing Implementation of Additional Protocol Declarations

    International Nuclear Information System (INIS)

    Niina, Toshiaki; Nidaira, Kazuo; Aono, Yosuke

    2010-01-01

    Japan signed the Additional Protocol (hereafter, AP) in December 1998. The domestic law and regulation had been revised to implement the initial and annual declarations for the Agency and the Additional Protocol came into force in December 1999. Since initial declaration in 2000, Japan has submitted the annual declaration in every May. Until 2010, Japan has made 10 annual declarations. This paper gives recommendations to enhance implementation of Additional Protocol declarations based on 10-year experience in Japan and addresses the following: Current status of additional protocol declaration in Japan; Outline of processing method; AP Information Management System; Recommendations for improving quality of declaration. Preparation of additional protocol declaration in NMCC has been conducted in the course of contract with Japan Safeguards Office (hereafter, JSGO) for safeguards information treatment. (author)

  6. Isolation of cancer cells by "in situ" microfluidic biofunctionalization protocols

    KAUST Repository

    De Vitis, Stefania; Matarise, Giuseppina; Pardeo, Francesca; Catalano, Rossella; Malara, Natalia Maria; Trunzo, Valentina; Tallerico, Rossana; Gentile, Francesco T.; Candeloro, Patrizio; Coluccio, Maria Laura; Massaro, Alessandro S.; Viglietto, Giuseppe; Carbone, Ennio; Kutter, Jö rg Peter; Perozziello, Gerardo; Di Fabrizio, Enzo M.

    2014-01-01

    The aim of this work is the development of a microfluidic immunosensor for the immobilization of cancer cells and their separation from healthy cells by using "in situ" microfluidic biofunctionalization protocols. These protocols allow to link antibodies on microfluidic device surfaces and can be used to study the interaction between cell membrane and biomolecules. Moreover they allow to perform analysis with high processing speed, small quantity of reagents and samples, short reaction times and low production costs. In this work the developed protocols were used in microfluidic devices for the isolation of cancer cells in heterogeneous blood samples by exploiting the binding of specific antibody to an adhesion protein (EpCAM), overexpressed on the tumor cell membranes. The presented biofunctionalization protocols can be performed right before running the experiment: this allows to have a flexible platform where biomolecules of interest can be linked on the device surface according to the user's needs. © 2014 Elsevier B.V. All rights reserved.

  7. Isolation of cancer cells by "in situ" microfluidic biofunctionalization protocols

    KAUST Repository

    De Vitis, Stefania

    2014-07-01

    The aim of this work is the development of a microfluidic immunosensor for the immobilization of cancer cells and their separation from healthy cells by using "in situ" microfluidic biofunctionalization protocols. These protocols allow to link antibodies on microfluidic device surfaces and can be used to study the interaction between cell membrane and biomolecules. Moreover they allow to perform analysis with high processing speed, small quantity of reagents and samples, short reaction times and low production costs. In this work the developed protocols were used in microfluidic devices for the isolation of cancer cells in heterogeneous blood samples by exploiting the binding of specific antibody to an adhesion protein (EpCAM), overexpressed on the tumor cell membranes. The presented biofunctionalization protocols can be performed right before running the experiment: this allows to have a flexible platform where biomolecules of interest can be linked on the device surface according to the user\\'s needs. © 2014 Elsevier B.V. All rights reserved.

  8. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    International Nuclear Information System (INIS)

    Van Atta, Angela J.; Baskin, Henry J.; Maves, Connie K.; Dansie, David M.; Rollins, Michael D.; Bolte, Robert G.; Mundorff, Michael B.; Andrews, Seth P.

    2015-01-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  9. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Van Atta, Angela J. [University of Utah School of Medicine, Salt Lake City, UT (United States); Baskin, Henry J.; Maves, Connie K.; Dansie, David M. [Primary Children' s Hospital, Department of Radiology, Salt Lake City, UT (United States); Rollins, Michael D. [University of Utah School of Medicine, Department of Surgery, Division of Pediatric Surgery, Salt Lake City, UT (United States); Bolte, Robert G. [University of Utah School of Medicine, Department of Pediatrics, Division of Pediatric Emergency Medicine, Salt Lake City, UT (United States); Mundorff, Michael B.; Andrews, Seth P. [Primary Children' s Hospital, Systems Improvement, Salt Lake City, UT (United States)

    2015-05-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  10. Combined Protocol for Acute Malnutrition Study (ComPAS) in rural South Sudan and urban Kenya

    DEFF Research Database (Denmark)

    Bailey, Jeanette; Lelijveld, Natasha; Marron, Bethany

    2018-01-01

    Background: Acute malnutrition is a continuum condition, but severe and moderate forms are treated separately, with different protocols and therapeutic products, managed by separate United Nations agencies. The Combined Protocol for Acute Malnutrition Study (ComPAS) aims to simplify and unify...... the treatment of uncomplicated severe and moderate acute malnutrition (SAM and MAM) for children 6-59 months into one protocol in order to improve the global coverage, quality, continuity of care and cost-effectiveness of acute malnutrition treatment in resource-constrained settings.  Methods/design: This study...... is a multi-site, cluster randomized non-inferiority trial with 12 clusters in Kenya and 12 clusters in South Sudan. Participants are 3600 children aged 6-59 months with uncomplicated acute malnutrition. This study will evaluate the impact of a simplified and combined protocol for the treatment of SAM and MAM...

  11. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  12. Patients' and therapists' experiences with a new treatment programme for eating disorders that combines physical exercise and dietary therapy: the PED-t trial. A qualitative study protocol.

    Science.gov (United States)

    Pettersen, Gunn; Rosenvinge, Jan H; Bakland, Maria; Wynn, Rolf; Mathisen, Therese Fostervold; Sundgot-Borgen, Jorunn

    2018-01-08

    Women with bulimia nervosa and binge eating disorder often suffer for many years before they seek professional help. Evidence-based treatments like cognitive-behavioural therapy (CBT) might be poorly accessible, and about 50% of those who receive CBT respond to it. Such outcome may reflect the heterogeneous nature of eating disorders, and addressing this heterogeneity calls for expanding the portfolio of treatment options. In particular, it is important to explore such options' acceptability, tolerability and affordability expressed through experiences with the treatment. This protocol outlines the rationale and design of a qualitative study. It captures experiences from patients and therapists who were involved in a randomised controlled trial (RCT) exploring the efficacy of a new group-based treatment programme combining physical exercise and dietary therapy. 15 patients with bulimia nervosa or binge eating disorder, 10 therapists (physical trainers and dietitians) and 6-10 patients who dropped out of the RCT will be semistructurally interviewed. All interviews will be analysed using a systematic text condensation approach. Results will be presented in peer-reviewed international journals, and at relevant international conferences. Key findings will be available to study participants as well as to patient organisations and health authorities. The overall study meets the intent and requirements of the Health Research Act and the Declaration of Helsinki. It is approved by the regional committee for medical research ethics (2013/1871). NCT02079935; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  13. Tongue pressure profile training for dysphagia post stroke (TPPT): study protocol for an exploratory randomized controlled trial.

    Science.gov (United States)

    Steele, Catriona M; Bayley, Mark A; Péladeau-Pigeon, Melanie; Stokely, Shauna L

    2013-05-07

    It is estimated that approximately 50% of stroke survivors will experience swallowing difficulty, or dysphagia. The associated sequelae of dysphagia include dehydration, malnutrition, and aspiration pneumonia, all of which have can have serious medical consequences. To improve swallowing safety and efficiency, alternative nutritional intake methods (for example, a feeding tube) or a modified diet texture (such as pureed foods or thickened liquids) may be recommended but these modifications may negatively affect quality of life. An alternative approach to treating dysphagia has emerged over the past few years, targeting stronger lingual muscles through maximal isometric pressure tasks. Although these studies have shown promising results, thin-liquid bolus control continues to be challenging for patients with dysphagia. Previous work investigating lingual pressures when healthy participants swallow has suggested that greater task specificity in lingual exercises may yield improved results with thin liquids. This is a small, exploratory randomized clinical trial being conducted with post-stroke patients 4 to 20 weeks after onset of dysphagia secondary to impaired lingual control. At enrollment, participants are randomly assigned to one of two treatment protocols, either tongue pressure profile training (TPPT) or the control treatment, tongue pressure strength-and-accuracy training (TPSAT). Each treatment protocol consists of 24 sessions of treatment over 8 to 12 weeks with monitoring of tongue pressure as well as a baseline and outcome videofluoroscopic swallowing study. Tongue pressure measures, videofluoroscopic measures, and functional outcome measures will be obtained following training of 60 participants (30 in each condition), to determine whether TPPT yields better outcomes. This study will continue to explore options beyond tube feeding and modified diets for people with neurogenic dysphagia following stroke. Should the novel protocol, TPPT, prove to be more

  14. Evaluation of video transmission of MAC protocols in wireless sensor network

    Science.gov (United States)

    Maulidin, Mahmuddin, M.; Kamaruddin, L. M.; Elsaikh, Mohamed

    2016-08-01

    Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmission is one of the important applications for the future that can be transmitted with low aspect in side of cost and also power consumption. In this paper, comparison of five different MAC WSN protocol for video transmission namely IEEE 802.11 standard, IEEE 802.15.4 standard, CSMA/CA, Berkeley-MAC, and Lightweight-MAC protocol are studied. Simulation experiment has been conducted in OMNeT++ with INET network simulator software to evaluate the performance. Obtained results indicate that IEEE 802.11 works better than other protocol in term of packet delivery, throughput, and latency.

  15. A quality analysis of clinical anaesthesia study protocols from the Chinese clinical trials registry according to the SPIRIT statement.

    Science.gov (United States)

    Yang, Lei; Chen, Shouming; Yang, Di; Li, Jiajin; Wu, Taixiang; Zuo, Yunxia

    2018-05-15

    To learn about the overall quality of clinical anaesthesia study protocols from the Chinese Clinical Trials Registry and to discuss the way to improve study protocol quality. We defined completeness of each sub-item in SPIRIT as N/A (not applicable) or with a score of 0, 1, or 2. For each protocol, we calculated the proportion of adequately reported items (score = 2 and N/A) and unreported items (score = 0). Protocol quality was determined according to the proportion of reported items, with values >50% indicating high quality. Protocol quality was determined according to the proportion of reported items. For each sub-item in SPIRIT, we calculated the adequately reported rate (percentage of all protocols with score 2 and NA on one sub-item) as well as the unreported rate (percentage of all protocols with score 0 on one sub-item). Total 126 study protocols were available for assessment. Among these, 88.1% were assessed as being of low quality. By comparison, the percentage of low-quality protocols was 88.9% after the publication of the SPIRIT statement. Among the 51 SPIRIT sub-items, 18 sub-items had an unreported rate above 90% while 16 had a higher adequately reported rate than an unreported rate. The overall quality of clinical anaesthesia study protocols registered in the ChiCTR was poor. A mandatory protocol upload and self-check based on the SPIRIT statement during the trial registration process may improve protocol quality in the future.

  16. Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols

    Science.gov (United States)

    Schoolcraft, Joshua; Wilson, Keith

    2011-01-01

    Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of

  17. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  18. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  19. Constant round group key agreement protocols: A comparative study

    NARCIS (Netherlands)

    Makri, E.; Konstantinou, Elisavet

    2011-01-01

    The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and

  20. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    Science.gov (United States)

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  1. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  2. From traditional lab protocols to a Guided Inquiry Based approach: an experience for Biotechnology students at the European University of Madrid

    Directory of Open Access Journals (Sweden)

    Rocío González Soltero

    2013-11-01

    Full Text Available Current conventional laboratory sessions for science undergraduate students are currently reported to fail in developing research competences. However, authentic research experiences, in and out of the laboratory, are becoming more common in introductory undergraduate science programs after the implantation of The Bologna Process. Project-based learning (PBL experiences based on inquiry-based protocols could be used to help students to identify and analyze the information they need to move into complex problems. Inquiry-based courses have been described in the past, where students participate in semester-long guided research projects focused in specific learning objectives (Hatfull et al. 2006; Call et al., 2007; Lopatto et al., 2008. During this last academic year we have designed a PBL model that provides an active learning laboratory experience based on an inquiry-based protocol for 2nd year Biotechnology students. We have designed a modular molecular genetics course that includes bioinformatics and molecular biology lab sessions. In both modules, students had the opportunity to conduct in collaborative groups different research projects about a central theme in molecular biology: the cell cycle. As they were responsible of their own projects, they becoming practicing scientists by proposing and evaluating biological experiments of their own design mentored by teacher facilitation. Final assessments included a thorough literature review about the central topic of the project and a final written paper resembling established publishing criteria for science research international journals. Students were also encouraged to contact well-known scientists in their research area by email during their bibliography search. From the satisfaction surveys, we conclude that results were positive in terms of student satisfaction (as measured in questionnaires and written reflections. This experience helped students understand the strengths, limitations and

  3. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  4. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  5. A protocol is not enough to implement an enhanced recovery programme for colorectal resection

    DEFF Research Database (Denmark)

    Maessen, J; Dejong, C.H.C.; Hausel, J

    2007-01-01

    BACKGROUND: Single-centre studies have suggested that enhanced recovery can be achieved with multimodal perioperative care protocols. This international observational study evaluated the implementation of an enhanced recovery programme in five European centres and examined the determinants...... with a shorter hospital stay. CONCLUSION: Functional recovery in 3 days after colorectal resection could be achieved in daily practice. A protocol is not enough to enable discharge of patients on the day of functional recovery; more experience and better organization of care may be required. Copyright (c) 2006...

  6. Protocol: using virus-induced gene silencing to study the arbuscular mycorrhizal symbiosis in Pisum sativum

    DEFF Research Database (Denmark)

    Grønlund, Mette; Olsen, Anne; Johansen, Elisabeth

    2010-01-01

    , the available PEBV-VIGS protocols are inadequate for studying genes involved in the symbiosis with arbuscular mycorrhizal fungi (AMF). Here we describe a PEBV-VIGS protocol suitable for reverse genetics studies in pea of genes involved in the symbiosis with AMF and show its effectiveness in silencing genes...... involved in the early and late stages of AMF symbiosis....

  7. Assessing the effectiveness of Australian early childhood education and care experiences: study protocol

    Directory of Open Access Journals (Sweden)

    Collette Tayler

    2016-04-01

    Full Text Available Abstract Background In Australia, 61.5 % of children aged 3–4 attend Early Childhood Education and Care (ECEC programs. Children’s experiences within these programs vary widely and impact directly on educational wellbeing and social development. Research has shown that higher quality programs enhance children’s learning and developmental outcomes, foster social participation and have long-lasting effects on their productivity as adults. Quality matters, yet we do not know what components of ECEC result in a quality program. Effective Early Educational Experiences (E4Kids is a 5-year longitudinal study designed to identify and assess the impact of mainstream ECEC programs and program components on children’s learning, development, social inclusion and well-being. E4Kids sets out to measure quality ECEC; identify components that add value and positively impact children’s outcomes; evaluate the effects of child, family, community and environment characteristics on programs; and provide evidence on how best to invest in ECEC. Methods/design E4Kids follows a sample of 2,494 children who have experienced a variety of approved care programs (long day care, kindergarten, family day care and occasional care, as well as 157 children who have not accessed such programs. Children are tracked to the first point of National Assessment Program – Literacy and Numeracy (NAPLAN testing at Year 3. The study presents a multi-level design in which ECEC programs were sampled from two states – Queensland and Victoria – then randomly sampled from two greater metropolitan regions and two regional and remote locations. Parents, centre directors, educators and carers complete questionnaires to provide information on demographics and children’s progress. Data collected also include the make-up and organisation of ECEC programs and schools children attended. The quality of adult-child interactions is directly assessed using the Classroom Assessment

  8. Assessing the effectiveness of Australian early childhood education and care experiences: study protocol.

    Science.gov (United States)

    Tayler, Collette; Cloney, Daniel; Adams, Ray; Ishimine, Karin; Thorpe, Karen; Nguyen, Thi Kim Cuc

    2016-04-21

    In Australia, 61.5 % of children aged 3-4 attend Early Childhood Education and Care (ECEC) programs. Children's experiences within these programs vary widely and impact directly on educational wellbeing and social development. Research has shown that higher quality programs enhance children's learning and developmental outcomes, foster social participation and have long-lasting effects on their productivity as adults. Quality matters, yet we do not know what components of ECEC result in a quality program. Effective Early Educational Experiences (E4Kids) is a 5-year longitudinal study designed to identify and assess the impact of mainstream ECEC programs and program components on children's learning, development, social inclusion and well-being. E4Kids sets out to measure quality ECEC; identify components that add value and positively impact children's outcomes; evaluate the effects of child, family, community and environment characteristics on programs; and provide evidence on how best to invest in ECEC. E4Kids follows a sample of 2,494 children who have experienced a variety of approved care programs (long day care, kindergarten, family day care and occasional care), as well as 157 children who have not accessed such programs. Children are tracked to the first point of National Assessment Program - Literacy and Numeracy (NAPLAN) testing at Year 3. The study presents a multi-level design in which ECEC programs were sampled from two states - Queensland and Victoria - then randomly sampled from two greater metropolitan regions and two regional and remote locations. Parents, centre directors, educators and carers complete questionnaires to provide information on demographics and children's progress. Data collected also include the make-up and organisation of ECEC programs and schools children attended. The quality of adult-child interactions is directly assessed using the Classroom Assessment Scoring System (CLASS) and direct testing of children's cognitive abilities

  9. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  10. Colon cleansing protocol in children: research conditions vs. clinical practice.

    Science.gov (United States)

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  11. Interaction Control Protocols for Distributed Multi-user Multi-camera Environments

    Directory of Open Access Journals (Sweden)

    Gareth W Daniel

    2003-10-01

    Full Text Available Video-centred communication (e.g., video conferencing, multimedia online learning, traffic monitoring, and surveillance is becoming a customary activity in our lives. The management of interactions in such an environment is a complicated HCI issue. In this paper, we present our study on a collection of interaction control protocols for distributed multiuser multi-camera environments. These protocols facilitate different approaches to managing a user's entitlement for controlling a particular camera. We describe a web-based system that allows multiple users to manipulate multiple cameras in varying remote locations. The system was developed using the Java framework, and all protocols discussed have been incorporated into the system. Experiments were designed and conducted to evaluate the effectiveness of these protocols, and to enable the identification of various human factors in a distributed multi-user and multi-camera environment. This work provides an insight into the complexity associated with the interaction management in video-centred communication. It can also serve as a conceptual and experimental framework for further research in this area.

  12. Protocol adherence for continuously titrated interventions in randomized trials: an overview of the current methodology and case study.

    Science.gov (United States)

    Lauzier, F; Adhikari, N K; Seely, A; Koo, K K Y; Belley-Côté, E P; Burns, K E A; Cook, D J; D'Aragon, F; Rochwerg, B; Kho, M E; Oczkowksi, S J W; Duan, E H; Meade, M O; Day, A G; Lamontagne, F

    2017-07-17

    The standard definition for protocol adherence is the proportion of all scheduled doses that are delivered. In clinical research, this definition has several limitations when evaluating protocol adherence in trials that study interventions requiring continuous titration. Building upon a specific case study, we analyzed a recent trial of a continuously titrated intervention to assess the impact of different definitions of protocol deviations on the interpretation of protocol adherence. The OVATION pilot trial was an open-label randomized controlled trial of higher (75-80 mmHg) versus lower (60-65 mmHg) mean arterial pressure (MAP) targets for vasopressor therapy in shock. In this trial, potential protocol deviations were defined as MAP values outside the targeted range for >4 consecutive hours during vasopressor therapy without synchronous and consistent adjustments of vasopressor doses. An adjudication committee reviewed each potential deviation to determine if it was clinically-justified or not. There are four reasons for this contextual measurement and reporting of protocol adherence. First, between-arm separation is a robust measure of adherence to complex protocols. Second, adherence assessed by protocol deviations varies in function of the definition of deviations and the frequency of measurements. Third, distinguishing clinically-justified vs. not clinically-justified protocol deviations acknowledges clinically sensible bedside decision-making and offers a clear terminology before the trial begins. Finally, multiple metrics exist to report protocol deviations, which provides different information but complementary information on protocol adherence. In trials of interventions requiring continuous titration, metrics used for defining protocol deviations have a considerable impact on the interpretation of protocol adherence. Definitions for protocol deviations should be prespecified and correlated with between-arm separation, if it can be measured.

  13. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    Science.gov (United States)

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  14. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  15. A qualitative study of institutional review board members' experience reviewing research proposals using emergency exception from informed consent.

    Science.gov (United States)

    McClure, Katie B; Delorio, Nicole M; Schmidt, Terri A; Chiodo, Gary; Gorman, Paul

    2007-05-01

    Emergency exception to informed consent regulation was introduced to provide a venue to perform research on subjects in emergency situations before obtaining informed consent. For a study to proceed, institutional review boards (IRBs) need to determine if the regulations have been met. To determine IRB members' experience reviewing research protocols using emergency exception to informed consent. This qualitative research used semistructured telephone interviews of 10 selected IRB members from around the US in the fall of 2003. IRB members were chosen as little is known about their views of exception to consent, and part of their mandate is the protection of human subjects in research. Interview questions focused on the length of review process, ethical and legal considerations, training provided to IRB members on the regulations, and experience using community consultation and notification. Content analysis was performed on the transcripts of interviews. To ensure validity, data analysis was performed by individuals with varying backgrounds: three emergency physicians, an IRB member and a layperson. Respondents noted that: (1) emergency exception to informed consent studies require lengthy review; (2) community consultation and notification regulations are vague and hard to implement; (3) current regulations, if applied correctly, protect human subjects; (4) legal counsel is an important aspect of reviewing exception to informed-consent protocols; and (5) IRB members have had little or no formal training in these regulations, but are able to access materials needed to review such protocols. This preliminary study suggests that IRB members find emergency exception to informed consent studies take longer to review than other protocols, and that community consultation and community notification are the most difficult aspect of the regulations with which to comply but that they adequately protect human subjects.

  16. Protocols and guidelines for mobile chest radiography in Irish public hospitals

    International Nuclear Information System (INIS)

    Kelly, Amanda; Toomey, Rachel

    2015-01-01

    Background: The mobile chest radiograph is a highly variable examination, in both technique and setting. Protocols and guidelines are one method by which examinations can be standardised, and provide information when one is unsure how to proceed. This study was undertaken to investigate the existence of protocols and guidelines available for the mobile chest radiograph, to establish their nature and compare them under a variety of headings. Methodology: A postal survey was administered to the Radiography Service Managers in the public hospitals under the governance of the Health Service Executive (HSE) in Ireland. The survey contained questions regarding hospital demographics, contents of existing protocols or guidelines, and why a protocol or guideline was not in place, if this was the case. Results: The response rate to the survey was 62% (n = 24). Those that had a specific protocol in place amounted to 63% (n = 15), 71% (n = 17) had a specific guideline, and 63% (n = 15) had both. Twenty nine percent (n = 7) had no specific protocol/guideline in place. Scientific research (88%, n = 15) and radiographer experience (82%, n = 14) were the most common sources used to inform protocols and guidelines. Conclusions: There are protocols and guidelines available to radiographers for mobile chest radiography in the majority of public hospitals in Ireland. The nature of the protocols and guidelines generally coincides with the HSE guidance regarding what sources of information should be used and how often they should be updated

  17. Comparison between stress myocardial perfusion SPECT recorded with cadmium-zinc-telluride and Anger cameras in various study protocols

    International Nuclear Information System (INIS)

    Verger, Antoine; Karcher, Gilles; Djaballah, Wassila; Fourquet, Nicolas; Rouzet, Francois; Le Guludec, Dominique; Koehl, Gregoire; Roch, Veronique; Imbert, Laetitia; Poussier, Sylvain; Fay, Renaud; Marie, Pierre-Yves

    2013-01-01

    The results of stress myocardial perfusion SPECT could be enhanced by new cadmium-zinc-telluride (CZT) cameras, although differences compared to the results with conventional Anger cameras remain poorly known for most study protocols. This study was aimed at comparing the results of CZT and Anger SPECT according to various study protocols while taking into account the influence of obesity. The study population, which was from three different institutions equipped with identical CZT cameras, comprised 276 patients referred for study using protocols involving 201 Tl (n = 120) or 99m Tc-sestamibi injected at low dose at stress ( 99m Tc-Low; stress/rest 1-day protocol; n = 110) or at high dose at stress ( 99m Tc-High; rest/stress 1-day or 2-day protocol; n = 46). Each Anger SPECT scan was followed by a high-speed CZT SPECT scan (2 to 4 min). Agreement rates between CZT and Anger SPECT were good irrespective of the study protocol (for abnormal SPECT, 201 Tl 92 %, 99m Tc-Low 86 %, 99m Tc-High 98 %), although quality scores were much higher for CZT SPECT with all study protocols. Overall correlations were high for the extent of myocardial infarction (r = 0.80) and a little lower for ischaemic areas (r = 0.72), the latter being larger on Anger SPECT (p 201 Tl or 99m Tc-Low group and in whom stress myocardial counts were particularly low with Anger SPECT (228 ± 101 kcounts) and dramatically enhanced with CZT SPECT (+279 ± 251 %). Concordance between the results of CZT and Anger SPECT is good regardless of study protocol and especially when excluding obese patients who have low-count Anger SPECT and for whom myocardial counts are dramatically enhanced on CZT SPECT. (orig.)

  18. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  19. Protocol adherence for continuously titrated interventions in randomized trials: an overview of the current methodology and case study

    Directory of Open Access Journals (Sweden)

    F. Lauzier

    2017-07-01

    Full Text Available Abstract Background The standard definition for protocol adherence is the proportion of all scheduled doses that are delivered. In clinical research, this definition has several limitations when evaluating protocol adherence in trials that study interventions requiring continuous titration. Discussion Building upon a specific case study, we analyzed a recent trial of a continuously titrated intervention to assess the impact of different definitions of protocol deviations on the interpretation of protocol adherence. The OVATION pilot trial was an open-label randomized controlled trial of higher (75–80 mmHg versus lower (60–65 mmHg mean arterial pressure (MAP targets for vasopressor therapy in shock. In this trial, potential protocol deviations were defined as MAP values outside the targeted range for >4 consecutive hours during vasopressor therapy without synchronous and consistent adjustments of vasopressor doses. An adjudication committee reviewed each potential deviation to determine if it was clinically-justified or not. There are four reasons for this contextual measurement and reporting of protocol adherence. First, between-arm separation is a robust measure of adherence to complex protocols. Second, adherence assessed by protocol deviations varies in function of the definition of deviations and the frequency of measurements. Third, distinguishing clinically-justified vs. not clinically-justified protocol deviations acknowledges clinically sensible bedside decision-making and offers a clear terminology before the trial begins. Finally, multiple metrics exist to report protocol deviations, which provides different information but complementary information on protocol adherence. Conclusions In trials of interventions requiring continuous titration, metrics used for defining protocol deviations have a considerable impact on the interpretation of protocol adherence. Definitions for protocol deviations should be prespecified and correlated

  20. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  1. Biocoder: A programming language for standardizing and automating biology protocols.

    Science.gov (United States)

    Ananthanarayanan, Vaishnavi; Thies, William

    2010-11-08

    Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains.

  2. Developing experimental protocols for chronic irradiation studies: the application of a good practice guide framework

    International Nuclear Information System (INIS)

    Wood, M.D.; Knowles, J.D.; Whittaker, J.H.; Copplestone, D.; Malcolm, H.M.; Bielby, S.; Zinger, I.

    2004-01-01

    The EC-funded FASSET (Framework for Assessment of Environmental Impact) project collated information on the transfer, dosimetry, and effects of ionising radiation on wildlife. A major output from the project is the FASSET Radiation Effects Database (FRED). A review of the information contained within FRED highlighted that information on the effects of low-dose, chronic exposure was, at best, fragmentary. However, these data are required to define the dose effect relationships needed to underpin the assessment tools that are being developed. To address this requirement, a series of four Good Practice Guides (GPGs) has been produced as part of a protocol development framework. This framework aims to harmonise experimental approaches, with a view to ensuring that all necessary data on appropriate endpoints are collected, so that dose effect relationships can be determined. The GPGs cover test species selection, endpoint selection, radiation exposure and experimental design considerations. A key is used to guide researchers through the GPGs and the decisions made are recorded on an output pro-forma. The completed pro-forma forms the basis of the experimental protocol. The pro-forma also indicates the information that should be included when presenting the results of the experiment. Standardising approaches ensures that results are comparable between experiments and that they are suitable for determining dose effect relationships. This protocol development framework has been adopted by the UK Environment Agency as a document upon which future Agency-funded experimental work on the effects of chronic, low-level exposure to ionising radiation will be based. It is hoped that the framework will gain acceptance in the wider scientific community and facilitate addressing the knowledge gaps that have been identified in order that successful protection of non-human biota can be demonstrated. (author)

  3. Stream Control Transmission Protocol as a Transport for SIP: a case study

    Directory of Open Access Journals (Sweden)

    Giuseppe De Marco

    2004-06-01

    Full Text Available The dominant signalling protocol both in future wireless and wired networks will be the Session Initiation Protocol (SIP, as pointed out in the 3G IP-based mobile networks specifications, entailing a fully Internet integrated network. The use of SIP in the IP Multimedia Subsytem (IMS of Release 5 involves the development of servers capable to handle a large number of call requests. The signaling traffic associated to such requests could explode, if an intelligent congestion control were not introduced. Stream Control Transmission Protocol (SCTP was born to support transport of SS7 signaling messages. However, many of the SCTP features are also useful for transport of SIP messages, as: congestion control mechanism, good separation among independent messages, multihoming. Indeed, adoption of SCTP as transport of SIP signaling might prove useful in some situations where usual transport protocols, like TCP and UDP, suffer performance degradation. In this paper, we analyse the general framework wherein SIP operates and we discuss the benefits of using SCTP as a transport for SIP, toward fair sharing of network resources. This study is carried on in the context of the implementation of an high-performance SIP Proxy Server. We also present some preliminar results of an implementation of SIP over SCTP/UDP in a real LAN environment.

  4. Introduction of an Oral Fluid Challenge Protocol in the Management of Children with Acute Gastroenteritis: A Regional Hospital Experience.

    LENUS (Irish Health Repository)

    Umana, E

    2018-06-01

    Oral rehydration therapy (ORT) remains the ideal first line therapy for acute gastroenteritis (AGE). Our aim was to assess the impact of introducing an Oral Fluid Challenge (OFC) protocol on outcomes such as intravenous fluid use and documentation in our institution. A single centre study with data collected retrospectively pre-implementation (April 2015) of the OFC protocol and post implementation (April 2016). Consecutive sampling of the first 55 patients presenting with GE like symptoms and underwent OFC were recruited. One hundred and ten patients were included in this study with 55 patients per cycle. The rates of IVF use decreased from 22% (12) in cycle one to 18% (10) in cycle two. There was an improvement in documentation by 26% (14) for level of dehydration and 52% (31) for OFC volume from cycle one to two. Overall, the addition of the OFC protocol to the management of patients with uncomplicated AGE would help streamline and improve care.

  5. Patterned feeding experience for preterm infants: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Pickler, Rita H; Wetzel, Paul A; Meinzen-Derr, Jareen; Tubbs-Cooley, Heather L; Moore, Margo

    2015-06-04

    Neurobehavioral disabilities occur in 5-15% of preterm infants with an estimated 50-70% of very low birth weight preterm infants experiencing later dysfunction, including cognitive, behavioral, and social delays that often persist into adulthood. Factors implicated in poor neurobehavioral and developmental outcomes are hospitalization in the neonatal intensive care unit (NICU) and inconsistent caregiving patterns. Although much underlying brain damage occurs in utero or shortly after birth, neuroprotective strategies can stop lesions from progressing, particularly when these strategies are used during the most sensitive periods of neural plasticity occurring months before term age. The purpose of this randomized trial is to test the effect of a patterned feeding experience on preterm infants' neurobehavioral organization and development, cognitive function, and clinical outcomes. This trial uses an experimental, longitudinal, 2-group design with 120 preterm infants. Infants are enrolled within the first week of life and randomized to an experimental group receiving a patterned feeding experience from the first gavage feeding through discharge or to a control group receiving usual feeding care experience. The intervention involves a continuity of tactile experiences associated with feeding to train and build neuronal networks supportive of normal infant feeding experience. Primary outcomes are neurobehavioral organization as measured by Neurobehavioral Assessment of the Preterm Infant at 3 time points: the transition to oral feedings, NICU discharge, and 2 months corrected age. Secondary aims are cognitive function measured using the Bayley Scales of Infant and Toddler Development, Third Edition at 6 months corrected age, neurobehavioral development (sucking organization, feeding performance, and heart rate variability), and clinical outcomes (length of NICU stay and time to full oral feeding). The potential effects of demographic and biobehavioral factors

  6. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study.

    Science.gov (United States)

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Satıroğlu, Hakan

    2010-01-01

    To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI.

  7. Multiprocessor Real-Time Locking Protocols for Replicated Resources

    Science.gov (United States)

    2016-07-01

    assignment problem, the ac- tual identities of the allocated replicas must be known. When locking protocols are used, tasks may experience delays due to both...Multiprocessor Real-Time Locking Protocols for Replicated Resources ∗ Catherine E. Jarrett1, Kecheng Yang1, Ming Yang1, Pontus Ekberg2, and James H...replicas to execute. In prior work on replicated resources, k-exclusion locks have been used, but this restricts tasks to lock only one replica at a time. To

  8. Protocols to Study Growth and Metabolism in Drosophila.

    Science.gov (United States)

    Strassburger, Katrin; Teleman, Aurelio A

    2016-01-01

    Signaling pathways such as the insulin/insulin-like growth factor pathway concurrently regulate organismal growth and metabolism. Drosophila has become a popular model system for studying both organismal growth and metabolic regulation. Care must be taken, however, when assessing such phenotypes because they are quantitative in nature, and influenced by environment. This chapter first describes how to control animal age and nutrient availability, since growth and metabolism are sensitive to these parameters. It then provides protocols for measuring tissue growth, cell size, and metabolic parameters such as stored lipids and glycogen, and circulating sugars.

  9. Improving post-stroke dysphagia outcomes through a standardized and multidisciplinary protocol: an exploratory cohort study.

    Science.gov (United States)

    Gandolfi, Marialuisa; Smania, Nicola; Bisoffi, Giulia; Squaquara, Teresa; Zuccher, Paola; Mazzucco, Sara

    2014-12-01

    Stroke is a major cause of dysphagia. Few studies to date have reported on standardized multidisciplinary protocolized approaches to the management of post-stroke dysphagia. The aim of this retrospective cohort study was to evaluate the impact of a standardized multidisciplinary protocol on clinical outcomes in patients with post-stroke dysphagia. We performed retrospective chart reviews of patients with post-stroke dysphagia admitted to the neurological ward of Verona University Hospital from 2004 to 2008. Outcomes after usual treatment for dysphagia (T- group) were compared versus outcomes after treatment under a standardized diagnostic and rehabilitative multidisciplinary protocol (T+ group). Outcome measures were death, pneumonia on X-ray, need for respiratory support, and proportion of patients on tube feeding at discharge. Of the 378 patients admitted with stroke, 84 had dysphagia and were enrolled in the study. A significantly lower risk of in-hospital death (odds ratio [OR] 0.20 [0.53-0.78]), pneumonia (OR 0.33 [0.10-1.03]), need for respiratory support (OR 0.48 [0.14-1.66]), and tube feeding at discharge (OR 0.30 [0.09-0.91]) was recorded for the T+ group (N = 39) as compared to the T- group (N = 45). The adjusted OR showed no difference between the two groups for in-hospital death and tube feeding at discharge. Use of a standardized multidisciplinary protocolized approach to the management of post-stroke dysphagia may significantly reduce rates of aspiration pneumonia, in-hospital mortality, and tube feeding in dysphagic stroke survivors. Consistent with the study's exploratory purposes, our findings suggest that the multidisciplinary protocol applied in this study offers an effective model of management of post-stroke dysphagia.

  10. Comparison between stress myocardial perfusion SPECT recorded with cadmium-zinc-telluride and Anger cameras in various study protocols

    Energy Technology Data Exchange (ETDEWEB)

    Verger, Antoine; Karcher, Gilles [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); INSERM U947, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); Djaballah, Wassila [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); INSERM U947, Nancy (France); Fourquet, Nicolas [Clinique Pasteur, Toulouse (France); Rouzet, Francois; Le Guludec, Dominique [AP-HP, Hopital Bichat, Department of Nuclear Medicine, Paris (France); INSERM U 773 Inserm and Denis Diderot University, Paris (France); Koehl, Gregoire; Roch, Veronique [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); Imbert, Laetitia [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); Centre Alexis Vautrin, Department of Radiotherapy, Vandoeuvre (France); Poussier, Sylvain [INSERM U947, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); Fay, Renaud [INSERM, Centre d' Investigation Clinique CIC-P 9501, Nancy (France); Marie, Pierre-Yves [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); INSERM U961, Nancy (France); Hopital de Brabois, CHU-Nancy, Medecine Nucleaire, Vandoeuvre-les-Nancy (France)

    2013-03-15

    The results of stress myocardial perfusion SPECT could be enhanced by new cadmium-zinc-telluride (CZT) cameras, although differences compared to the results with conventional Anger cameras remain poorly known for most study protocols. This study was aimed at comparing the results of CZT and Anger SPECT according to various study protocols while taking into account the influence of obesity. The study population, which was from three different institutions equipped with identical CZT cameras, comprised 276 patients referred for study using protocols involving {sup 201}Tl (n = 120) or {sup 99m}Tc-sestamibi injected at low dose at stress ({sup 99m}Tc-Low; stress/rest 1-day protocol; n = 110) or at high dose at stress ({sup 99m}Tc-High; rest/stress 1-day or 2-day protocol; n = 46). Each Anger SPECT scan was followed by a high-speed CZT SPECT scan (2 to 4 min). Agreement rates between CZT and Anger SPECT were good irrespective of the study protocol (for abnormal SPECT, {sup 201}Tl 92 %, {sup 99m}Tc-Low 86 %, {sup 99m}Tc-High 98 %), although quality scores were much higher for CZT SPECT with all study protocols. Overall correlations were high for the extent of myocardial infarction (r = 0.80) and a little lower for ischaemic areas (r = 0.72), the latter being larger on Anger SPECT (p < 0.001). This larger extent was mainly observed in 50 obese patients who were in the {sup 201}Tl or {sup 99m}Tc-Low group and in whom stress myocardial counts were particularly low with Anger SPECT (228 {+-} 101 kcounts) and dramatically enhanced with CZT SPECT (+279 {+-} 251 %). Concordance between the results of CZT and Anger SPECT is good regardless of study protocol and especially when excluding obese patients who have low-count Anger SPECT and for whom myocardial counts are dramatically enhanced on CZT SPECT. (orig.)

  11. Evaluation of a protocol for the non-operative management of perforated peptic ulcer.

    Science.gov (United States)

    Marshall, C; Ramaswamy, P; Bergin, F G; Rosenberg, I L; Leaper, D J

    1999-01-01

    The non-operative management of perforated peptic ulcer has previously been shown to be both safe and effective although it remains controversial. A protocol for non-operative management was set up in this hospital in 1989. Adherence to the guidelines in the protocol has been audited over a 6-year period with a review of outcome. The case-notes of patients with a diagnosis of perforated peptic ulcer were reviewed. Twelve guidelines from the protocol were selected for evaluation of compliance to the protocol. Forty-nine patients underwent non-operative treatment initially. Eight patients failed to respond and underwent operation. Complications included abscess formation (seven patients), renal failure (one), gastric ileus (one), chest infection (two), and cardiac failure and stroke (one). Four deaths occurred in this group. Adherence to certain protocol guidelines was poor, notably those concerning prevention of thromboembolism, use of antibiotics, use of contrast examination to confirm the diagnosis and referral for follow-up endoscopy. Two gastric cancers were detected on subsequent endoscopy. This experience demonstrates that non-operative treatment can be used successfully in a general hospital. Adherence to protocol guidelines was found to be variable and the protocol has therefore been simplified. This study highlights the need for an accurate diagnosis and the importance of follow-up endoscopy.

  12. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  13. Nationwide cross-sectional survey of schistosomiasis and soil-transmitted helminthiasis in Sudan: study protocol.

    Science.gov (United States)

    Cha, Seungman; Hong, Sung-Tae; Lee, Young-Ha; Lee, Keon Hoon; Cho, Dae Seong; Lee, Jinmoo; Chai, Jong-Yil; Elhag, Mousab Siddig; Khaled, Soheir Gabralla Ahmad; Elnimeiri, Mustafa Khidir Mustafa; Siddig, Nahid Abdelgadeir Ali; Abdelrazig, Hana; Awadelkareem, Sarah; Elshafie, Azza Tag Eldin; Ismail, Hassan Ahmed Hassan Ahmed; Amin, Mutamad

    2017-09-12

    Schistosomiasis and soil-transmitted helminthiasis (STHs) are target neglected tropical diseases (NTDs) of preventive chemotherapy, but the control and elimination of these diseases have been impeded due to resource constraints. Few reports have described study protocol to draw on when conducting a nationwide survey. We present a detailed methodological description of the integrated mapping of schistosomiasis and STHs on the basis of our experiences, hoping that this protocol can be applied to future surveys in similar settings. In addition to determining the ecological zones requiring mass drug administration interventions, we aim to provide precise estimates of the prevalence of these diseases. A school-based cross-sectional design will be applied for the nationwide survey across Sudan. The survey is designed to cover all districts in every state. We have divided each district into 3 different ecological zones depending on proximity to bodies of water. We will employ a probability-proportional-to-size sampling method for schools and systematic sampling for student selection to provide adequate data regarding the prevalence for schistosomiasis and STHs in Sudan at the state level. A total of 108,660 students will be selected from 1811 schools across Sudan. After the survey is completed, 391 ecological zones will be mapped out. To carry out the survey, 655 staff members were recruited. The feces and urine samples are microscopically examined by the Kato-Katz method and the sediment smears for helminth eggs respectively. For quality control, a minimum of 10% of the slides will be rechecked by the federal supervisors in each state and also 5% of the smears are validated again within one day by independent supervisors. This nationwide mapping is expected to generate important epidemiological information and indicators about schistosomiasis and STHs that will be useful for monitoring and evaluating the control program. The mapping data will also be used for overviewing

  14. Consumer preferences for sustainable aquaculture products: Evidence from in-depth interviews, think aloud protocols and choice experiments.

    Science.gov (United States)

    Risius, Antje; Janssen, Meike; Hamm, Ulrich

    2017-06-01

    Fish from aquaculture is becoming more important for human consumption. Sustainable aquaculture procedures were developed as an alternative to overcome the negative environmental impacts of conventional aquaculture procedures and wild fisheries. The objective of this contribution is to determine what consumers expect from sustainable aquaculture and whether they prefer sustainable aquaculture products. A combination of qualitative research methods, with think aloud protocols and in-depth interviews, as well as quantitative methods, using choice experiments and face-to-face interviews, was applied. Data was collected in three different cities of Germany. Results revealed that sustainable aquaculture was associated with natural, traditional, local, and small scale production systems with high animal welfare standards. Overall, participants paid a lot of attention to the declaration of origin; in particular fish products from Germany and Denmark were preferred along with local products. Frequently used sustainability claims for aquaculture products were mostly criticized as being imprecise by the participants of the qualitative study; even though two claims tested in the choice experiments had a significant positive impact on the choice of purchase. Similarly, existing aquaculture-specific labels for certified sustainable aquaculture had an impact on the buying decision, but were not well recognized and even less trusted. Overall, consumers had a positive attitude towards sustainable aquaculture. However, communication measures and labelling schemes should be improved to increase consumer acceptance and make a decisive impact on consumers' buying behavior. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Reduction of cancer risk by optimization of Computed Tomography head protocols: far eastern Cuban experience

    International Nuclear Information System (INIS)

    Miller Clemente, R.; Adame Brooks, D.; Lores Guevara, M.; Perez Diaz, M.; Arias Garlobo, M. L.; Ortega Rodriguez, O.; Nepite Haber, R.; Grinnan Hernandez, O.; Guillama Llosas, A.

    2015-01-01

    The cancer risk estimation constitutes one way for the evaluation of the public health, regarding computed tomography (CT) exposures. Starting from the hypothesis that the optimization of CT protocols would reduce significantly the added cancer risk, the purpose of this research was the application of optimization strategies regarding head CT protocols, in order to reduce the factors affecting the risk of induced cancer. The applied systemic approach included technological and human components, represented by quantitative physical factors. the volumetric kerma indexes, compared with respect to standard, optimized and reference values, were evaluated with multiple means comparison method. The added cancer risk resulted from the application of the methodology for biological effects evaluation, at low doses with low Linear Energy Transfer. Human observers in all scenarios evaluated the image quality. the reduced dose was significantly lower than for standard head protocols and reference levels, where: (1) for pediatric patients, by using an Automatic Exposure Control system, a reduction of 31% compared with standard protocol and ages range of 10-14, and (2) adults, using a Bilateral Filter for images obtained at low doses of 62% from those of standard head protocol. The risk reduction was higher than 25%. The systemic approach used allows the effective identification of factors involved on cancer risk related with exposures to CT. The combination of dose modulation and image restoration with Bilateral Filter, provide a significantly reduction of cancer risk, with acceptable diagnostic image quality. (Author)

  16. Compositional mining of multiple object API protocols through state abstraction.

    Science.gov (United States)

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  17. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  18. Analysis of the new code stroke protocol in Asturias after one year. Experience at one hospital.

    Science.gov (United States)

    García-Cabo, C; Benavente, L; Martínez-Ramos, J; Pérez-Álvarez, Á; Trigo, A; Calleja, S

    2018-03-01

    Prehospital code stroke (CS) systems have been proved effective for improving access to specialised medical care in acute stroke cases. They also improve the prognosis of this disease, which is one of the leading causes of death and disability in our setting. The aim of this study is to analyse results one year after implementation of the new code stroke protocol at one hospital in Asturias. We prospectively included patients who were admitted to our tertiary care centre as per the code stroke protocol for the period of one year. We analysed 363 patients. Mean age was 69 years and 54% of the cases were men. During the same period in the previous year, there were 236 non-hospital CS activations. One hundred forty-seven recanalisation treatments were performed (66 fibrinolysis and 81 mechanical thrombectomies or combined treatments), representing a 25% increase with regard to the previous year. Recent advances in the management of acute stroke call for coordinated code stroke protocols that are adapted to the needs of each specific region. This may result in an increased number of patients receiving early care, as well as revascularisation treatments. Copyright © 2016 Sociedad Española de Neurología. Publicado por Elsevier España, S.L.U. All rights reserved.

  19. Shortened protocol in practical [11C]SA4503-PET studies for sigma1 receptor quantification

    International Nuclear Information System (INIS)

    Sakata, Muneyuki; Kimura, Yuichi; Ishikawa, Masatomo; Oda, Keiichi; Ishii, Kenji; Ishiwata, Kiichi; Naganawa, Mika; Hashimoto, Kenji; Chihara, Kunihiro

    2008-01-01

    In practical positron emission tomography (PET) diagnosis, a shortened protocol is preferred for patients with brain disorders. In this study, the applicability of a shortened protocol as an alternative to the 90-min PET scan with [ 11 C]SA4503 for quantitative sigma 1 receptor measurement was investigated. Tissue time-activity curves of 288 regions of interest in the brain from 32 [ 11 C]SA4503-PET scans of 16 healthy subjects prior to and following administration of a selective serotonin reuptake inhibitor (fluvoxamine or paroxetine) were applied to two algorithms of quantitative analysis; binding potential (BP) was derived from compartmental analysis based on nonlinear estimation, and total distribution volume (tDV) was derived from Logan plot analysis. As a result, although both BP and tDV tended to be underestimated by the shortened method, the estimates from the shortened protocol had good linear relationships with those of the full-length protocol. In conclusion, if approximately 10% differences in the estimated results are acceptable for a specific purpose, then a 60-min measurement protocol is capable of providing reliable results. (author)

  20. Wind Tunnel Experiments to Study Chaparral Crown Fires.

    Science.gov (United States)

    Cobian-Iñiguez, Jeanette; Aminfar, AmirHessam; Chong, Joey; Burke, Gloria; Zuniga, Albertina; Weise, David R; Princevac, Marko

    2017-11-14

    The present protocol presents a laboratory technique designed to study chaparral crown fire ignition and spread. Experiments were conducted in a low velocity fire wind tunnel where two distinct layers of fuel were constructed to represent surface and crown fuels in chaparral. Chamise, a common chaparral shrub, comprised the live crown layer. The dead fuel surface layer was constructed with excelsior (shredded wood). We developed a methodology to measure mass loss, temperature, and flame height for both fuel layers. Thermocouples placed in each layer estimated temperature. A video camera captured the visible flame. Post-processing of digital imagery yielded flame characteristics including height and flame tilt. A custom crown mass loss instrument developed in-house measured the evolution of the mass of the crown layer during the burn. Mass loss and temperature trends obtained using the technique matched theory and other empirical studies. In this study, we present detailed experimental procedures and information about the instrumentation used. The representative results for the fuel mass loss rate and temperature filed within the fuel bed are also included and discussed.

  1. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  2. Challenges of maintaining research protocol fidelity in a clinical care setting: A qualitative study of the experiences and views of patients and staff participating in a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Farmer Andrew J

    2011-05-01

    Full Text Available Abstract Background Trial research has predominantly focused on patient and staff understandings of trial concepts and/or motivations for taking part, rather than why treatment recommendations may or may not be followed during trial delivery. This study sought to understand why there was limited attainment of the glycaemic target (HbA1c ≤6.5% among patients who participated in the Treating to Target in Type 2 Diabetes Trial (4-T. The objective was to inform interpretation of trial outcomes and provide recommendations for future trial delivery. Methods In-depth interviews were conducted with 45 patients and 21 health professionals recruited from 11 of 58 trial centres in the UK. Patients were broadly representative of those in the main trial in terms of treatment allocation, demographics and glycaemic control. Both physicians and research nurses were interviewed. Results Most patients were committed to taking insulin as recommended by 4-T staff. To avoid hypoglycaemia, patients occasionally altered or skipped insulin doses, normally in consultation with staff. Patients were usually unaware of the trial's glycaemic target. Positive staff feedback could lead patients to believe they had been 'successful' trial participants even when their HbA1c exceeded 6.5%. While some staff felt that the 4-T automated insulin dose adjustment algorithm had increased their confidence to prescribe larger insulin doses than in routine clinical practice, all described situations where they had not followed its recommendations. Staff regarded the application of a 'one size fits all' glycaemic target during the trial as contradicting routine clinical practice where they would tailor treatments to individuals. Staff also expressed concerns that 'tight' glycaemic control might impose an unacceptably high risk of hypoglycaemia, thus compromising trust and safety, especially amongst older patients. To address these concerns, staff tended to adapt the trial protocol to

  3. Clinical Experience With Image-Guided Radiotherapy in an Accelerated Partial Breast Intensity-Modulated Radiotherapy Protocol

    International Nuclear Information System (INIS)

    Leonard, Charles E.; Tallhamer, Michael M.S.; Johnson, Tim; Hunter, Kari C.M.D.; Howell, Kathryn; Kercher, Jane; Widener, Jodi; Kaske, Terese; Paul, Devchand; Sedlacek, Scot; Carter, Dennis L.

    2010-01-01

    Purpose: To explore the feasibility of fiducial markers for the use of image-guided radiotherapy (IGRT) in an accelerated partial breast intensity modulated radiotherapy protocol. Methods and Materials: Nineteen patients consented to an institutional review board approved protocol of accelerated partial breast intensity-modulated radiotherapy with fiducial marker placement and treatment with IGRT. Patients (1 patient with bilateral breast cancer; 20 total breasts) underwent ultrasound guided implantation of three 1.2- x 3-mm gold markers placed around the surgical cavity. For each patient, table shifts (inferior/superior, right/left lateral, and anterior/posterior) and minimum, maximum, mean error with standard deviation were recorded for each of the 10 BID treatments. The dose contribution of daily orthogonal films was also examined. Results: All IGRT patients underwent successful marker placement. In all, 200 IGRT treatment sessions were performed. The average vector displacement was 4 mm (range, 2-7 mm). The average superior/inferior shift was 2 mm (range, 0-5 mm), the average lateral shift was 2 mm (range, 1-4 mm), and the average anterior/posterior shift was 3 mm (range, 1 5 mm). Conclusions: This study shows that the use of IGRT can be successfully used in an accelerated partial breast intensity-modulated radiotherapy protocol. The authors believe that this technique has increased daily treatment accuracy and permitted reduction in the margin added to the clinical target volume to form the planning target volume.

  4. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  5. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    International Nuclear Information System (INIS)

    Xiao, Y.

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  6. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Y. [Thomas Jefferson University, Philadelphia, PA (United States)

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  7. Formal Test Automation: The Conference protocol with TGV/TorX

    NARCIS (Netherlands)

    Ural, Hasan; Du Bousquet, Lydie; Ramangalahy, Solofo; Probert, Robert L.; von Bochmann, Gregor; Simon, Severine; Viho, Cesar; Belinfante, Axel; de Vries, R.G.

    We present an experiment of automated formal conformance testing of the Conference Protocol Entity as reported in [2]. Our approach differs from other experiments, since it investigates the combination of the tools TGV for abstract test generation and TorX for test execution.

  8. Management of minor head injury in patients receiving oral anticoagulant therapy: a prospective study of a 24-hour observation protocol.

    Science.gov (United States)

    Menditto, Vincenzo G; Lucci, Moira; Polonara, Stefano; Pomponio, Giovanni; Gabrielli, Armando

    2012-06-01

    Patients receiving warfarin who experience minor head injury are at risk of intracranial hemorrhage, and optimal management after a single head computed tomography (CT) scan is unclear. We evaluate a protocol of 24-hour observation followed by a second head CT scan. In this prospective case series, we enrolled consecutive patients receiving warfarin and showing no intracranial lesions on a first CT scan after minor head injury treated at a Level II trauma center. We implemented a structured clinical pathway, including 24-hour observation and a CT scan performed before discharge. We then evaluated the frequency of death, admission, neurosurgery, and delayed intracranial hemorrhage. We enrolled and observed 97 consecutive patients. Ten refused the second CT scan and were well during 30-day follow-up. Repeated CT scanning in the remaining 87 patients revealed a new hemorrhage lesion in 5 (6%), with 3 subsequently hospitalized and 1 receiving craniotomy. Two patients discharged after completing the study protocol with 2 negative CT scan results were admitted 2 and 8 days later with symptomatic subdural hematomas; neither received surgery. Two of the 5 patients with delayed bleeding at 24 hours had an initial international normalized ratio greater than 3.0, as did both patients with delayed bleeding beyond 24 hours. The relative risk of delayed hemorrhage with an initial international normalized ratio greater than 3.0 was 14 (95% confidence interval 4 to 49). For patients receiving warfarin who experience minor head injury and have a negative initial head CT scan result, a protocol of 24-hour observation followed by a second CT scan will identify most occurrences of delayed bleeding. An initial international normalized ratio greater than 3 suggests higher risk. Copyright © 2011 American College of Emergency Physicians. Published by Mosby, Inc. All rights reserved.

  9. Treatment Protocol for High Velocity/High Energy Gunshot Injuries to the Face

    Science.gov (United States)

    Peled, Micha; Leiser, Yoav; Emodi, Omri; Krausz, Amir

    2011-01-01

    Major causes of facial combat injuries include blasts, high-velocity/high-energy missiles, and low-velocity missiles. High-velocity bullets fired from assault rifles encompass special ballistic properties, creating a transient cavitation space with a small entrance wound and a much larger exit wound. There is no dispute regarding the fact that primary emergency treatment of ballistic injuries to the face commences in accordance with the current advanced trauma life support (ATLS) recommendations; the main areas in which disputes do exist concern the question of the timing, sequence, and modes of surgical treatment. The aim of the present study is to present the treatment outcome of high-velocity/high-energy gunshot injuries to the face, using a protocol based on the experience of a single level I trauma center. A group of 23 injured combat soldiers who sustained bullet and shrapnel injuries to the maxillofacial region during a 3-week regional military conflict were evaluated in this study. Nine patients met the inclusion criteria (high-velocity/high-energy injuries) and were included in the study. According to our protocol, upon arrival patients underwent endotracheal intubation and were hemodynamically stabilized in the shock-trauma unit and underwent total-body computed tomography with 3-D reconstruction of the head and neck and computed tomography angiography. All patients underwent maxillofacial surgery upon the day of arrival according to the protocol we present. In view of our treatment outcomes, results, and low complication rates, we conclude that strict adherence to a well-founded and structured treatment protocol based on clinical experience is mandatory in providing efficient, appropriate, and successful treatment to a relatively large group of patients who sustain various degrees of maxillofacial injuries during a short period of time. PMID:23449809

  10. Prenatal diagnosis and prevention of toxoplasmosis in pregnant women in Northern Vietnam: study protocol.

    Science.gov (United States)

    Smit, G Suzanne A; Vu, Thi Lam Binh; Do, Trung Dung; Speybroeck, Niko; Devleesschauwer, Brecht; Padalko, Elizaveta; Roets, Ellen; Dorny, Pierre

    2017-05-25

    In Vietnam, no systematic prenatal toxoplasmosis screening is in place, and only few studies have assessed the prevalence and importance of this zoonotic parasite infection. In addition, no studies have been conducted to assess the risk factors associated with toxoplasmosis. This study protocol was developed to determine the seroprevalence of toxoplasmosis in pregnant women in Hanoi and Thai Binh, Northern Vietnam, and to evaluate the association with risk factors and congenital toxoplasmosis. The protocol was developed in a way that it could potentially evolve into a countrywide prenatal diagnosis and prevention program, with the main focus on primary prevention. The collaborating gynaecologists will invite eligible pregnant women attending antenatal care for the first time to participate in the study. At first consult, information about toxoplasmosis and its prevention will be provided. All participants will be asked to fill in a questionnaire, which is designed to analyse socio-demographic and biologically plausible risk factors associated with toxoplasmosis, and blood samples will be collected to determine the seroprevalence of toxoplasmosis in pregnant women. In case there is suspicion of a primary infection during pregnancy, the concerned women will be followed-up by the gynaecologists according to a predefined protocol. Every participant will be informed on her serological status, risk factors and prevention measures and is offered appropriate medical information and medical follow-up if required. The hypothesis is that congenital toxoplasmosis is an important but currently under-diagnosed public health problem in Vietnam. This study can strengthen sustainable control of toxoplasmosis in Vietnam, provide a protocol for prenatal diagnosis, boost overall awareness, improve the knowledge about toxoplasmosis prevention and can be essential for evidence-based health policy.

  11. Studying frequency processing of the brain to enhance long-term memory and develop a human brain protocol.

    Science.gov (United States)

    Friedrich, Wernher; Du, Shengzhi; Balt, Karlien

    2015-01-01

    The temporal lobe in conjunction with the hippocampus is responsible for memory processing. The gamma wave is involved with this process. To develop a human brain protocol, a better understanding of the relationship between gamma and long-term memory is vital. A more comprehensive understanding of the human brain and specific analogue waves it uses will support the development of a human brain protocol. Fifty-eight participants aged between 6 and 60 years participated in long-term memory experiments. It is envisaged that the brain could be stimulated through binaural beats (sound frequency) at 40 Hz (gamma) to enhance long-term memory capacity. EEG recordings have been transformed to sound and then to an information standard, namely ASCII. Statistical analysis showed a proportional relationship between long-term memory and gamma activity. Results from EEG recordings indicate a pattern. The pattern was obtained through the de-codification of an EEG recording to sound and then to ASCII. Stimulation of gamma should enhance long term memory capacity. More research is required to unlock the human brains' protocol key. This key will enable the processing of information directly to and from human memory via gamma, the hippocampus and the temporal lobe.

  12. The impact of protocol on nurses' role stress: a longitudinal perspective.

    Science.gov (United States)

    Dodd-McCue, Diane; Tartaglia, Alexander; Veazey, Kenneth W; Streetman, Pamela S

    2005-04-01

    The study examined the impact of a protocol directed at increasing organ donation on the role stress and work attitudes of critical care nurses involved in potential organ donation cases. The research examined whether the protocol could positively affect nurses' perceptions of role stress, and if so, could the work environment improvements be sustained over time. The Family Communication Coordinator (FCC) protocol promotes effective communication during potential organ donation cases using a multidisciplinary team approach. Previous research found it associated with improved donation outcomes and with improved perceptions of role stress by critical care nurses. However, the previous study lacked methodological rigor necessary to determine causality and sustainability over time. The study used a quasi-experimental prospective longitudinal design. The sample included critical care nurses who had experience with potential organ donation cases with the protocol. Survey data were collected at 4 points over 2 years. Surveys used previously validated and reliable measures of role stress (role ambiguity, role conflict, role overload) and work attitudes (commitment, satisfaction). Interviews supplemented these data. The nurses' perceptions of role stress associated with potential organ donation cases dramatically dropped after the protocol was implemented. All measures of role stress, particularly role ambiguity and role conflict, showed statistically significant and sustained improvement. Nurses' professional, unit, and hospital commitment and satisfaction reflect an increasingly positive workplace. The results demonstrate that the FCC protocol positively influenced the workplace through its impact on role stress over the first 2 years following its implementation. The findings suggest that similar protocols may be appropriate in improving the critical care environment by reducing the stress and uncertainty of professionals involved in other end-of-life situations. However

  13. A Generic Communication Protocol for Remote Laboratories: an Implementation on e-lab

    Energy Technology Data Exchange (ETDEWEB)

    Henriques, Rafael B.; Fernandes, H.; Duarte, Andre S.; Pereira, Tiago; Fortunato, Joao [Instituto de Plasmas e Fusao Nuclear, Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Pereira, Jose [Linkare TI - Tecnologias de Informacao Lda, Lisboa (Portugal); Dias, Francisco [Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal)

    2015-07-01

    The remote laboratories at IST (Instituto Superior Tecnico), e-lab, serve as a valuable tool for education and training based on remote control technologies. Due to the high number and increase of remotely operated experiments a generic protocol was developed to perform the communication between the software driver and the respective experimental setup in an easier and more unified way. The training in these fields of students and personnel can take advantage of such infrastructure with the purpose of deploying new experiments in a faster way. More than 10 experiments using the generic protocol are available on-line in a 24 x 7 way. (authors)

  14. Regional gastrointestinal transit and pH studied in 215 healthy volunteers using the wireless motility capsule: influence of age, gender, study country and testing protocol.

    Science.gov (United States)

    Wang, Y T; Mohammed, S D; Farmer, A D; Wang, D; Zarate, N; Hobson, A R; Hellström, P M; Semler, J R; Kuo, B; Rao, S S; Hasler, W L; Camilleri, M; Scott, S M

    2015-09-01

    The wireless motility capsule (WMC) offers the ability to investigate luminal gastrointestinal (GI) physiology in a minimally invasive manner. To investigate the effect of testing protocol, gender, age and study country on regional GI transit times and associated pH values using the WMC. Regional GI transit times and pH values were determined in 215 healthy volunteers from USA and Sweden studied using the WMC over a 6.5-year period. The effects of test protocol, gender, age and study country were examined. For GI transit times, testing protocol was associated with differences in gastric emptying time (GET; shorter with protocol 2 (motility capsule ingested immediately after meal) vs. protocol 1 (motility capsule immediately before): median difference: 52 min, P = 0.0063) and colonic transit time (CTT; longer with protocol 2: median 140 min, P = 0.0189), but had no overall effect on whole gut transit time. Females had longer GET (by median 17 min, P = 0.0307), and also longer CTT by (104 min, P = 0.0285) and whole gut transit time by (263 min, P = 0.0077). Increasing age was associated with shorter small bowel transit time (P = 0.002), and study country also influenced small bowel and CTTs. Whole gut and CTTs showed clustering of data at values separated by 24 h, suggesting that describing these measures as continuous variables is invalid. Testing protocol, gender and study country also significantly influenced pH values. Regional GI transit times and pH values, delineated using the wireless motility capsule (WMC), vary based on testing protocol, gender, age and country. Standardisation of testing is crucial for cross-referencing in clinical practice and future research. © 2015 John Wiley & Sons Ltd.

  15. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  16. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  17. Outcomes of Optimized over Standard Protocol of Rabbit Antithymocyte Globulin for Severe Aplastic Anemia: A Single-Center Experience

    Science.gov (United States)

    Ge, Meili; Shao, Yingqi; Huang, Jinbo; Huang, Zhendong; Zhang, Jing; Nie, Neng; Zheng, Yizhou

    2013-01-01

    Background Previous reports showed that outcome of rabbit antithymocyte globulin (rATG) was not satisfactory as the first-line therapy for severe aplastic anemia (SAA). We explored a modifying schedule of administration of rATG. Design and Methods Outcomes of a cohort of 175 SAA patients, including 51 patients administered with standard protocol (3.55 mg/kg/d for 5 days) and 124 cases with optimized protocol (1.97 mg/kg/d for 9 days) of rATG plus cyclosporine (CSA), were analyzed retrospectively. Results Of all 175 patients, response rates at 3 and 6 months were 36.6% and 56.0%, respectively. 51 cases received standard protocol had poor responses at 3 (25.5%) and 6 months (41.2%). However, 124 patients received optimized protocol had better responses at 3 (41.1%, P = 0.14) and 6 (62.1%, P = 0.01). Higher incidences of infection (57.1% versus 37.9%, P = 0.02) and early mortality (17.9% versus 0.8%, P<0.001) occurred in patients received standard protocol compared with optimized protocol. The 5-year overall survival in favor of the optimized over standard rATG protocol (76.0% versus. 50.3%, P<0.001) was observed. By multivariate analysis, optimized protocol (RR = 2.21, P = 0.04), response at 3 months (RR = 10.31, P = 0.03) and shorter interval (<23 days) between diagnosis and initial dose of rATG (RR = 5.35, P = 0.002) were independent favorable predictors of overall survival. Conclusions Optimized instead of standard rATG protocol in combination with CSA remained efficacious as a first-line immunosuppressive regimen for SAA. PMID:23554855

  18. Marked improvement in the success rate of medical management of early pregnancy failure following the implementation of a novel institutional protocol and treatment guidelines: a follow-up study.

    Science.gov (United States)

    Colleselli, V; Nell, T; Bartosik, T; Brunner, C; Ciresa-Koenig, A; Wildt, L; Marth, C; Seeber, B

    2016-11-01

    To analyze the success rate, time to passage of tissue and subjective patient experience of a newly implemented protocol for medical management of early pregnancy failure (EPF) over a 2-year period. A retrospective chart review of all patients with early pregnancy failure primarily opting for medical management was performed. 200 mg mifepristone were administered orally, followed by a single vaginal dose of 800 mcg misoprostol after 36-48 h. We followed-up with our patients using a written questionnaire. 167 women were included in the present study. We observed an overall success rate of 92 %, defined as no need for surgical management after medication administration. We could not identify predictive values for success in a multivariate regression analysis. Most patients (84 %) passed tissue within 6 h after misoprostol administration. The protocol was well tolerated with a low incidence of side effects. Pain was managed well with sufficient analgesics. Responders to the questionnaire felt adequately informed prior to treatment and rated their overall experience as positive. The adaption of the institutional medical protocol resulted in a marked improvement of success rate when compared to the previously used protocol (92 vs. 61 %). We credit this increase to the adjusted medication schema as well as to targeted physician education on the expected course and interpretation of outcome measures. Our results underscore that the medical management of EPF is a safe and effective alternative to surgical evacuation in the clinical setting.

  19. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  20. Factors influencing ambulance nurses' adherence to a national protocol ambulance care: an implementation study in the Netherlands

    NARCIS (Netherlands)

    Ebben, R.H.; Vloet, L.C.M.; Grunsven, P.M. van; Breeman, W.; Goosselink, B.; Lichtveld, R.A.; Groot, J. de; Achterberg, T. van

    2015-01-01

    OBJECTIVES: Adherence to prehospital guidelines and protocols is suboptimal. Insight into influencing factors is necessary to improve adherence. The aim of this study was to identify factors that influence ambulance nurses' adherence to a National Protocol Ambulance Care (NPAC). METHODS: A

  1. The Comparative Study Some of Reactive and Proactive Routing Protocols in The Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Anas Ali Hussien

    2018-02-01

    Full Text Available The wireless sensor network (WSN consists mostly of a large number of nodes in a large area where not all nodes are directly connected. The applications of comprise a wide variety of scenarios.The mobile nodes are free to move because this network has selfــstructured topology. Routing protocols are responsible for detecting and maintaining paths in the network, and it classified into reactive (OnـــDemand, proactive (Table driven, and hybrid. In this paper represents a performance study of some WSN routing protocols: the Dynamic Source Routing (DSR, Ad hoc On-Demand Distance Vector (AODV, and Destination-Sequenced Distance-Vector (DSDV. The comparison made according to important metrics like packet delivery ratio (PDR, total packets dropped, Average end-to-end delay (Avg EED, and normalized routing load under the Transmission Control Protocol (TCP and User Datagram Protocol (UDP traffic connection and with varying number of nodes, pause time; and  varying speed. In this work used (NSــ2.35 that installed on (Ubuntu 14.04 operating system to implementing the scenario. Conclude that the DSR has better performance in TCP connection; while the DSDV has better performance in UDP protocol.

  2. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  3. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience.

    Science.gov (United States)

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang

    2017-01-01

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80 each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. • Automatic spectral imaging protocol selection provides appropriate scan protocols. • Abdominal CT is feasible using spectral imaging and 300 mgI/kg contrast agent. • 50-keV monochromatic images with 50 % ASIR provide optimal image quality.

  4. Study protocol for the Cities Changing Diabetes programme: a global mixed-methods approach.

    Science.gov (United States)

    Napier, A David; Nolan, John J; Bagger, Malene; Hesseldal, Louise; Volkmann, Anna-Maria

    2017-11-08

    Urban living has been shown to affect health in various ways. As the world is becoming more urbanised and almost two-thirds of people with diabetes now live in cities, research into the relationship between urban living, health and diabetes is key to improving the lives of many. The majority of people with diabetes have type 2 diabetes, a subset linked to overweight and obesity, decreased physical activity and unhealthy diets. Diabetes has significant consequences for those living with the condition as well as their families, relationships and wider society. Although care and management are improving, complications remain common, and diabetes is among the leading causes of vision loss, amputation, neuropathy and renal and cardiovascular disease worldwide. We present a research protocol for exploring the drivers of type 2 diabetes and its complications in urban settings through the Cities Changing Diabetes (CCD) partnership programme. A global study protocol is implemented in eight collaborating CCD partner cities. In each city, academic institutions, municipal representatives and local stakeholders collaborate to set research priorities and plan implementation of findings. Local academic teams execute the study following the global study protocol presented here. A quantitative Rule of Halves analysis obtains measures of the magnitude of the diabetes burden, the diagnosis rates in each city and the outcomes of care. A qualitative Diabetes Vulnerability Assessment explores the urban context in vulnerability to type 2 diabetes and identifies social factors and cultural determinants relevant to health, well-being and diabetes. The protocol steers the collection of primary and secondary data across the study sites. Research ethics board approval has been sought and obtained in each site. Findings from each of the local studies as well as the result from combined multisite (global) analyses will be reported in a series of core scientific journal papers. © Article author

  5. Treatment influencing down-staging in EORTC Melanoma Group sentinel node histological protocol compared with complete step-sectioning: a national multicentre study.

    Science.gov (United States)

    Riber-Hansen, Rikke; Hastrup, Nina; Clemmensen, Ole; Behrendt, Nille; Klausen, Siri; Ramsing, Mette; Spaun, Eva; Hamilton-Dutoit, Stephen Jacques; Steiniche, Torben

    2012-02-01

    Metastasis size in melanoma sentinel lymph nodes (SLNs) is an emerging prognostic factor. Two European melanoma treatment trials include SLN metastasis diameters as inclusion criteria. Whilst diameter estimates are sensitive to the number of sections examined, the level of this bias is largely unknown. We performed a prospective multicentre study to compare the European Organisation for Research and Treatment of Cancer (EORTC) recommended protocol with a protocol of complete step-sectioning. One hundred and thirty-three consecutive SLNs from seven SLN centres were analysed by five central sections 50μm apart (EORTC Protocol) followed by complete 250μm step-sectioning. Overall, 29 patients (21.8%) were SLN-positive. The EORTC Protocol missed eight of these metastases (28%), one metastasis measuring less than 0.1mm in diameter, seven measuring between 0.1 and 1mm. Complete step-sectioning at 250μm intervals (Extensive Protocol) missed one metastasis (3%) that measured less than 0.1mm. Thirteen treatment courses (34%) performed if inclusion was based on the Combined Protocol would not be performed if assessed by the EORTC Protocol. Thus, 10 patients would be without completion lymph node dissection (EORTC MINITUB study), whilst three patients would not be eligible for anti-CTLA4 trial (EORTC protocol 18071). The corresponding number with the Extensive Protocol would be three; one patient for the MINITUB registration study and two patients for the anti-CTLA4 study. Examining SLNs by close central sectioning alone (EORTC Protocol) misses a substantial number of metastases and underestimates the maximum metastasis diameter, leading to important changes in patient eligibility for various treatment protocols. Copyright © 2011 Elsevier Ltd. All rights reserved.

  6. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol.

    Science.gov (United States)

    Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-06-27

    Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.

  7. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  8. Interreality for the management and training of psychological stress: study protocol for a randomized controlled trial

    Science.gov (United States)

    2013-01-01

    Background Psychological stress occurs when an individual perceives that environmental demands tax or exceed his or her adaptive capacity. Its association with severe health and emotional diseases, points out the necessity to find new efficient strategies to treat it. Moreover, psychological stress is a very personal problem and requires training focused on the specific needs of individuals. To overcome the above limitations, the INTERSTRESS project suggests the adoption of a new paradigm for e-health - Interreality - that integrates contextualized assessment and treatment within a hybrid environment, bridging the physical and the virtual worlds. According to this premise, the aim of this study is to investigate the advantages of using advanced technologies, in combination with cognitive behavioral therapy (CBT), based on a protocol for reducing psychological stress. Methods/Design The study is designed as a randomized controlled trial. It includes three groups of approximately 50 subjects each who suffer from psychological stress: (1) the experimental group, (2) the control group, (3) the waiting list group. Participants included in the experimental group will receive a treatment based on cognitive behavioral techniques combined with virtual reality, biofeedback and mobile phone, while the control group will receive traditional stress management CBT-based training, without the use of new technologies. The wait-list group will be reassessed and compared with the two other groups five weeks after the initial evaluation. After the reassessment, the wait-list patients will randomly receive one of the two other treatments. Psychometric and physiological outcomes will serve as quantitative dependent variables, while subjective reports of participants will be used as the qualitative dependent variable. Discussion What we would like to show with the present trial is that bridging virtual experiences, used to learn coping skills and emotional regulation, with real

  9. Desorption isotherms of cementitious materials: study of an accelerated protocol and estimation of RVE

    International Nuclear Information System (INIS)

    Wu, Qier

    2014-01-01

    In the framework of French radioactive waste management and storage, the durability evaluation and prediction of concrete structures requires the knowledge of desorption isotherm of concrete. The aim of the present study is to develop an accelerated experimental method to obtain desorption isotherm of cementitious materials more quickly and to estimate the Representative Volume Element (RVE) size related to the desorption isotherm of concrete. In order to ensure that experimental results can be statistically considered representative, a great amount of sliced samples of cementitious materials with three different thicknesses (1 mm, 2 mm and 3 mm) have been de-saturated. The effect of slice thickness and the saturation condition on the mass variation kinetics and the desorption isotherms is analyzed. The influence of the aggregate distribution on the water content and the water saturation degree is also analyzed. A method based on statistical analysis of water content and water saturation degree is proposed to estimate the RVE for water desorption experiment of concrete. The evolution of shrinkage with relative humidity is also followed for each material during the water desorption experiment. A protocol of cycle of rapid desaturation-re-saturation is applied and shows the existence of hysteresis between desorption and adsorption. (author)

  10. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication......’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture...

  11. An evaluation of two large scale demand side financing programs for maternal health in India: the MATIND study protocol

    Directory of Open Access Journals (Sweden)

    Sidney Kristi

    2012-08-01

    Full Text Available Abstract Background High maternal mortality in India is a serious public health challenge. Demand side financing interventions have emerged as a strategy to promote access to emergency obstetric care. Two such state run programs, Janani Suraksha Yojana (JSYand Chiranjeevi Yojana (CY, were designed and implemented to reduce financial access barriers that preclude women from obtaining emergency obstetric care. JSY, a conditional cash transfer, awards money directly to a woman who delivers in a public health facility. This will be studied in Madhya Pradesh province. CY, a voucher based program, empanels private obstetricians in Gujarat province, who are reimbursed by the government to perform deliveries of socioeconomically disadvantaged women. The programs have been in operation for the last seven years. Methods/designs The study outlined in this protocol will assess and compare the influence of the two programs on various aspects of maternal health care including trends in program uptake, institutional delivery rates, maternal and neonatal outcomes, quality of care, experiences of service providers and users, and cost effectiveness. The study will collect primary data using a combination of qualitative and quantitative methods, including facility level questionnaires, observations, a population based survey, in-depth interviews, and focus group discussions. Primary data will be collected in three districts of each province. The research will take place at three levels: the state health departments, obstetric facilities in the districts and among recently delivered mothers in the community. Discussion The protocol is a comprehensive assessment of the performance and impact of the programs and an economic analysis. It will fill existing evidence gaps in the scientific literature including access and quality to services, utilization, coverage and impact. The implementation of the protocol will also generate evidence to facilitate decision making

  12. An evaluation of two large scale demand side financing programs for maternal health in India: the MATIND study protocol.

    Science.gov (United States)

    Sidney, Kristi; de Costa, Ayesha; Diwan, Vishal; Mavalankar, Dileep V; Smith, Helen

    2012-08-27

    High maternal mortality in India is a serious public health challenge. Demand side financing interventions have emerged as a strategy to promote access to emergency obstetric care. Two such state run programs, Janani Suraksha Yojana (JSY)and Chiranjeevi Yojana (CY), were designed and implemented to reduce financial access barriers that preclude women from obtaining emergency obstetric care. JSY, a conditional cash transfer, awards money directly to a woman who delivers in a public health facility. This will be studied in Madhya Pradesh province. CY, a voucher based program, empanels private obstetricians in Gujarat province, who are reimbursed by the government to perform deliveries of socioeconomically disadvantaged women. The programs have been in operation for the last seven years. The study outlined in this protocol will assess and compare the influence of the two programs on various aspects of maternal health care including trends in program uptake, institutional delivery rates, maternal and neonatal outcomes, quality of care, experiences of service providers and users, and cost effectiveness. The study will collect primary data using a combination of qualitative and quantitative methods, including facility level questionnaires, observations, a population based survey, in-depth interviews, and focus group discussions. Primary data will be collected in three districts of each province. The research will take place at three levels: the state health departments, obstetric facilities in the districts and among recently delivered mothers in the community. The protocol is a comprehensive assessment of the performance and impact of the programs and an economic analysis. It will fill existing evidence gaps in the scientific literature including access and quality to services, utilization, coverage and impact. The implementation of the protocol will also generate evidence to facilitate decision making among policy makers and program managers who currently work with or

  13. A novel protocol for dispatcher assisted CPR improves CPR quality and motivation among rescuers-A randomized controlled simulation study.

    Science.gov (United States)

    Rasmussen, Stinne Eika; Nebsbjerg, Mette Amalie; Krogh, Lise Qvirin; Bjørnshave, Katrine; Krogh, Kristian; Povlsen, Jonas Agerlund; Riddervold, Ingunn Skogstad; Grøfte, Thorbjørn; Kirkegaard, Hans; Løfgren, Bo

    2017-01-01

    Emergency dispatchers use protocols to instruct bystanders in cardiopulmonary resuscitation (CPR). Studies changing one element in the dispatcher's protocol report improved CPR quality. Whether several changes interact is unknown and the effect of combining multiple changes previously reported to improve CPR quality into one protocol remains to be investigated. We hypothesize that a novel dispatch protocol, combining multiple beneficial elements improves CPR quality compared with a standard protocol. A novel dispatch protocol was designed including wording on chest compressions, using a metronome, regular encouragements and a 10-s rest each minute. In a simulated cardiac arrest scenario, laypersons were randomized to perform single-rescuer CPR guided with the novel or the standard protocol. a composite endpoint of time to first compression, hand position, compression depth and rate and hands-off time (maximum score: 22 points). Afterwards participants answered a questionnaire evaluating the dispatcher assistance. The novel protocol (n=61) improved CPR quality score compared with the standard protocol (n=64) (mean (SD): 18.6 (1.4)) points vs. 17.5 (1.7) points, pCPR. A novel bundle of care protocol improved CPR quality score and motivation among rescuers. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. Updating the U.S. SMART dispersant efficacy monitoring protocol

    International Nuclear Information System (INIS)

    Trudel, K.; Belore, R.; VanHaverbeke, M.; Mullin, J.

    2009-01-01

    The Special Monitoring of Applied Response Technologies (SMART) is a written dispersant effectiveness monitoring protocol developed in the United States in the mid 1990s. It has been the subject of considerable review and research since its development. This paper reported on the 2007-2008 review of the SMART dispersant effectiveness monitoring protocol which involved the following 3 tasks: (1) stakeholders reviewed their experience with SMART and identified the key deficiencies in the current protocol, (2) the SMART monitoring experience gathered during dispersant effectiveness testing at the Ohmsett National Oil Spill Response Test Facility was reviewed to evaluate the usefulness of existing SMART decision criteria, (3) available commercial off-the-shelf instruments (COTS) were surveyed to identify the instruments that might be more effective or simpler to use than those presently in use. The review concluded that the three-tiered approach in SMART was appropriate, but better guidance was needed for users. In addition, the fluorometer historically used for monitoring of dispersed oil was found to have several operating challenges and should be replaced with more modern equipment. It was recommended that all U.S. government sponsored monitoring teams work with identical instruments and operating protocols. The COTS survey identified 6 potentially suitable submersible and field-portable fluorometers and three particle-size analyzers. 26 refs., 5 tabs., 1 fig

  15. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  16. Designing protocols for the human teeth biobank of the Universidad Nacional de Colombia

    Directory of Open Access Journals (Sweden)

    Lina Constanza Gonzáles-Pita

    2014-07-01

    Full Text Available Protocols in a Tooth Bank are essential in order to assure smooth operation, reproducibility and standardization that minimize cross contamination, maintain original characteristics and physicochemical properties of teeth, fulll ethical and legal regulations and a proper disposal of residues. Objective: to propose the disinfection, storing and transportation protocols for the UNTB. Methods: A literature search was conducted using the words “teeth, human, tooth bank, disinfection, sterilization, storage, organization, biosecurity, biobank, protocol, prevention” in the Pubmed, Science Direct and Scielo databases. 37 papers ranging from 1988 up to 2014 were selected. International and Colombian ethical and legal regulations for organ donation, handling and investigation were taken into account as well as laboratory observations and chemical basic principles gained through several undergraduate and graduate thesis. All this input was carefully studied, analysed and critically modied for setting the recommended processes for the conversion of donated teeth into organs suitable for research. Results: Collection, transportation, cleaning/disinfection and storing protocols were planned and elaborated. Conclusions: Based on scientic literature, national and international regulations and experimental experience, several protocols for the UNTB were presented.

  17. Efficacy and cost effectiveness of telemedicine for improving access to care in the Paris region: study protocols for eight trials.

    Science.gov (United States)

    Charrier, Nathanael; Zarca, Kevin; Durand-Zaleski, Isabelle; Calinaud, Christine

    2016-02-08

    With the development of information and communication technologies, telemedicine has been proposed as a way to improve patient management by facilitating access to appropriate diagnosis and treatment. The Paris Ile de France Regional Health Agency is currently funding a comprehensive program of telemedicine experiments. This article describes the protocols for the evaluation of the implementation of telemedicine in the Paris region. Over 2,500 patients have been included in eight studies addressing the use of telemedicine in the context of specific diseases or settings. Two projects are randomized controlled trials, while the six other projects are based on before-after designs (differences in differences studies). Based on the MAST model and the French national framework, we identified endpoints to assess the impact of telemedicine on five dimensions: clinical effectiveness, cost-effectiveness, security of the application, patient satisfaction and quality of life and perception of professionals. Telemedicine encompasses a wide range of services and stakeholders, and thus study protocols must be tailored to the specific constraints and interests of the users. NCT02110433 (03/07/2014), NCT02157740 (05/27/2014), NCT02374697 (02/05/2015), NCT02157727 (05/27/2014), NCT02229279 (08/28/2014), NCT02368769 (02/05/2015), NCT02164747 (NCT02164747), NCT02309905 (11/27/2014).

  18. EVA Human Health and Performance Benchmarking Study Overview and Development of a Microgravity Protocol

    Science.gov (United States)

    Norcross, Jason; Jarvis, Sarah; Bekdash, Omar; Cupples, Scott; Abercromby, Andrew

    2017-01-01

    The primary objective of this study is to develop a protocol to reliably characterize human health and performance metrics for individuals working inside various EVA suits under realistic spaceflight conditions. Expected results and methodologies developed during this study will provide the baseline benchmarking data and protocols with which future EVA suits and suit configurations (e.g., varied pressure, mass, center of gravity [CG]) and different test subject populations (e.g., deconditioned crewmembers) may be reliably assessed and compared. Results may also be used, in conjunction with subsequent testing, to inform fitness-for-duty standards, as well as design requirements and operations concepts for future EVA suits and other exploration systems.

  19. Protocol for quantitative tracing of surface water with synthetic DNA

    Science.gov (United States)

    Foppen, J. W.; Bogaard, T. A.

    2012-04-01

    , the field tests were performed with salt and deuterium as tracer. To study possible decay by sunlight and/or microbial activity for synthetic DNA, immediately in the field and for the duration of the entire experiment, we carried out batch experiments. All samples were stored in a 1.5 ml Eppendorf vial in a cool-box in dry ice (-80°C). Quantitative PCR on a Mini Opticon (Bio Rad, Hercules, CA, USA) was carried out to determine DNA concentrations in the samples. Results showed the importance of a strict protocol for working with ssDNA as a tracer for quantitative tracing, since ssDNA interacts with surface areas of glass and plastic, depending on water quality and ionic strength. Interaction with the sediment and decay due to sunlight and/or microbial activity was negligible in most cases. The ssDNA protocol was then tested in natural streams. Promising results were obtained using ssDNA as quantitative tracer. The breakthrough curves using ssDNA were similar to the ones of salt or deuterium. We will present the revised protocol to use ssDNA for multi-tracing experiments in natural streams and discuss the opportunities and limitations.

  20. Lessons Learned from Decontamination Experiences

    Energy Technology Data Exchange (ETDEWEB)

    Sorensen, JH

    2000-11-16

    This interim report describes a DOE project currently underway to establish what is known about decontamination of buildings and people and the procedures and protocols used to determine when and how people or buildings are considered ''clean'' following decontamination. To fulfill this objective, the study systematically examined reported decontamination experiences to determine what procedures and protocols are currently employed for decontamination, the timeframe involved to initiate and complete the decontamination process, how the contaminants were identified, the problems encountered during the decontamination process, how response efforts of agencies were coordinated, and the perceived social psychological effects on people who were decontaminated or who participated in the decontamination process. Findings and recommendations from the study are intended to aid decision-making and to improve the basis for determining appropriate decontamination protocols for recovery planners and policy makers for responding to chemical and biological events.

  1. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  2. Development of a standard communication protocol for an emergency situation management in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Man Cheol, E-mail: charleskim@kaeri.re.k [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Park, Jinkyun; Jung, Wondea [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Kim, Hanjeom; Kim, Yoon Joong [YGN Nuclear Power Division Training Center, Korea Hydro and Nuclear Power Company, 517 Kyemari, Hongnong-eup, Yeongkwang-gun, Chonnam 513-880 (Korea, Republic of)

    2010-06-15

    Correct communication between main control room (MCR) operators is an important factor in the management of emergency situations in nuclear power plants (NPPs). For this reason, a standard communication protocol for the management of emergency situations in NPPs has been developed, with the basic direction of enhancing the safety of NPPs and the standardization of communication protocols. To validate the newly developed standard communication protocol, validation experiments with 10 licensed NPP MCR operator teams was performed. From the validation experiments, it was found that the use of the standard communication protocol required more time, but it can contribute to the enhancement of the safety of NPPs by an operators' better grasp of the safety-related parameters and a more efficient and clearer communication between NPP operators, while imposing little additional workloads on the NPP MCR operators. The standard communication protocol is expected to be used to train existing NPP MCR operators without much aversion, as well as new operators.

  3. Who needs inpatient detox? Development and implementation of a hospitalist protocol for the evaluation of patients for alcohol detoxification.

    Science.gov (United States)

    Stephens, John R; Liles, E Allen; Dancel, Ria; Gilchrist, Michael; Kirsch, Jonathan; DeWalt, Darren A

    2014-04-01

    Clinicians caring for patients seeking alcohol detoxification face many challenges, including lack of evidence-based guidelines for treatment and high recidivism rates. To develop a standardized protocol for determining which alcohol dependent patients seeking detoxification need inpatient versus outpatient treatment, and to study the protocol's implementation. Review of best evidence by ad hoc task force and subsequent creation of standardized protocol. Prospective observational evaluation of initial protocol implementation. Patients presenting for alcohol detoxification. Development and implementation of a protocol for evaluation and treatment of patients requesting alcohol detoxification. Number of admissions per month with primary alcohol related diagnosis (DRG), 30-day readmission rate, and length of stay, all measured before and after protocol implementation. We identified one randomized clinical trial and three cohort studies to inform the choice of inpatient versus outpatient detoxification, along with one prior protocol in this population, and combined that data with clinical experience to create an institutional protocol. After implementation, the average number of alcohol related admissions was 15.9 per month, compared with 18.9 per month before implementation (p = 0.037). There was no difference in readmission rate or length of stay. Creation and utilization of a protocol led to standardization of care for patients requesting detoxification from alcohol. Initial evaluation of protocol implementation showed a decrease in number of admissions.

  4. On the use of personalization to enhance compliance in experience sampling

    NARCIS (Netherlands)

    Markopoulos, P.; Batalas, N.; Timmermans, A.

    2015-01-01

    This paper argues that allowing personalization can increase respondent adherence in experience sampling studies. We report a one week long field experiment (N=36), which compared response rates when respondents select the times at which they are prompted to report in an experience sampling protocol

  5. [Colombia 2015 National Mental Health Survey. Study Protocol].

    Science.gov (United States)

    Gómez-Restrepo, Carlos; de Santacruz, Cecilia; Rodriguez, María Nelcy; Rodriguez, Viviana; Tamayo Martínez, Nathalie; Matallana, Diana; Gonzalez, Lina M

    2016-12-01

    The 2015 National Mental Health Survey (NMHS) is the fourth mental survey conducted in Colombia, and is part of the National System of Surveys and Population Studies for health. A narrative description is used to explain the background, references, the preparation, and characteristics of the 2015 NMHS. The 2015 NMHS and its protocol emerge from the requirements that support the national and international policies related to mental health. Together with the Ministry of Health and Social Protection, the objectives, the collection tools, the sample, and the operational plan are defined. The main objective was to obtain updated information about the mental health, mental problems and disorders, accessibility to health services, and an evaluation of health conditions. Participants were inhabitants from both urban and rural areas, over 7 years old, and in whom the comprehension of social determinants and equity were privileged. An observational cross-sectional design with national, regional and age group representativity, was used. The age groups selected were 7-11, 12-17, and over 18 years old. The regions considered were Central, Orient, Atlantic, Pacific, and Bogota. The calculated sample had a minimum of 12,080 and a maximum of 14,496 participants. A brief summary of the protocol of the 2015 NMHS is presented. The full document with all the collection tools can be consulted on the Health Ministry webpage. Copyright © 2016. Publicado por Elsevier España.

  6. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  7. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  8. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  9. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience

    Energy Technology Data Exchange (ETDEWEB)

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang [The First Affiliated Hospital of Zhengzhou University, Department of Radiology, Zhengzhou, Henan Province (China)

    2017-01-15

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80) each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. (orig.)

  10. Automatic spectral imaging protocol selection and iterative reconstruction in abdominal CT with reduced contrast agent dose: initial experience

    International Nuclear Information System (INIS)

    Lv, Peijie; Liu, Jie; Chai, Yaru; Yan, Xiaopeng; Gao, Jianbo; Dong, Junqiang

    2017-01-01

    To evaluate the feasibility, image quality, and radiation dose of automatic spectral imaging protocol selection (ASIS) and adaptive statistical iterative reconstruction (ASIR) with reduced contrast agent dose in abdominal multiphase CT. One hundred and sixty patients were randomly divided into two scan protocols (n = 80) each; protocol A, 120 kVp/450 mgI/kg, filtered back projection algorithm (FBP); protocol B, spectral CT imaging with ASIS and 40 to 70 keV monochromatic images generated per 300 mgI/kg, ASIR algorithm. Quantitative parameters (image noise and contrast-to-noise ratios [CNRs]) and qualitative visual parameters (image noise, small structures, organ enhancement, and overall image quality) were compared. Monochromatic images at 50 keV and 60 keV provided similar or lower image noise, but higher contrast and overall image quality as compared with 120-kVp images. Despite the higher image noise, 40-keV images showed similar overall image quality compared to 120-kVp images. Radiation dose did not differ between the two protocols, while contrast agent dose in protocol B was reduced by 33 %. Application of ASIR and ASIS to monochromatic imaging from 40 to 60 keV allowed contrast agent dose reduction with adequate image quality and without increasing radiation dose compared to 120 kVp with FBP. (orig.)

  11. New Communication Network Protocol for a Data Acquisition System

    Science.gov (United States)

    Uchida, T.; Fujii, H.; Nagasaka, Y.; Tanaka, M.

    2006-02-01

    An event builder based on communication networks has been used in high-energy physics experiments, and various networks have been adopted, for example, IEEE 802.3 (Ethernet), asynchronous transfer mode (ATM), and so on. In particular, Ethernet is widely used because its infrastructure is very cost effective. Many systems adopt standard protocols that are designed for a general network. However, in the case of an event builder, the communication pattern between stations is different from that in a general network. The unique communication pattern causes congestion, and thus makes it difficulty to quantitatively design the network. To solve this problem, we have developed a simple network protocol for a data acquisition (DAQ) system. The protocol is designed to keep the sequence of senders so that no congestion occurs. We implemented the protocol on a small hardware component [a field programmable gate array (FPGA)] and measured the performance, so that it will be ready for a generic DAQ system

  12. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Science.gov (United States)

    Reveiz, Ludovic; Haby, Michelle M; Martínez-Vega, Ruth; Pinzón-Flores, Carlos E; Elias, Vanessa; Smith, Emma; Pinart, Mariona; Broutet, Nathalie; Becerra-Posada, Francisco; Aldighieri, Sylvain; Van Kerkhove, Maria D

    2017-01-01

    Given the severity and impact of the current Zika virus (ZIKV) outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE) and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV. We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols. Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome). Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design. Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to minimize bias at

  13. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Directory of Open Access Journals (Sweden)

    Ludovic Reveiz

    Full Text Available Given the severity and impact of the current Zika virus (ZIKV outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV.We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols.Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome. Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design.Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to

  14. Systematic Review Protocol to Assess the Effectiveness of Usability Questionnaires in mHealth App Studies.

    Science.gov (United States)

    Zhou, Leming; Bao, Jie; Parmanto, Bambang

    2017-08-01

    Usability questionnaires have a wide use in mobile health (mHealth) app usability studies. However, no systematic review has been conducted for assessing the effectiveness of these questionnaires. This paper describes a protocol for conducting a systematic review of published questionnaire-based mHealth app usability studies. In this systematic review, we will select recently published (2008-2017) articles from peer-reviewed journals and conferences that describe mHealth app usability studies and implement at least one usability questionnaire. The search strategy will include terms such as "mobile app" and "usability." Multiple databases such as PubMed, CINAHL, IEEE Xplore, ACM Digital Library, and INSPEC will be searched. There will be 2 independent reviewers in charge of screening titles and abstracts as well as determining those articles that should be included for a full-text review. The third reviewer will act as a mediator between the other 2 reviewers. Moreover, a data extraction form will be created and used during the full article data analysis. Notably, the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P) guidelines will be followed in reporting this protocol. A preliminary search produced 1271 articles, 40 of which are duplicate records. The inclusion-exclusion criteria are being strictly followed in performing the ongoing study selection. Usability questionnaires are an important tool in mHealth app usability studies. This review will summarize the usability questionnaires used in published research articles while assessing the efficacy of these questionnaires in determining the usability of mHealth apps. ©Leming Zhou, Jie Bao, Bambang Parmanto. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 01.08.2017.

  15. The Emergency Public Relations Protocol: How to Work Effectively on Controversial Projects in an Academic Health Setting

    Science.gov (United States)

    Rosser, B. R. Simon; Kilian, Gunna; West, William G.

    2012-01-01

    Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted. PMID:23565067

  16. The Emergency Public Relations Protocol: How to Work Effectively on Controversial Projects in an Academic Health Setting.

    Science.gov (United States)

    Rosser, B R Simon; Kilian, Gunna; West, William G

    2013-03-01

    Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted.

  17. A protocol for hit and control synchronous transfer for the front-end electronics at the CBM experiment

    Energy Technology Data Exchange (ETDEWEB)

    Kasinski, K., E-mail: kasinski@agh.edu.pl [AGH University of Science and Technology, Department of Measurement and Electronics, Av. Mickiewicza 30, 30-059 Cracow (Poland); Szczygiel, R. [AGH University of Science and Technology, Department of Measurement and Electronics, Av. Mickiewicza 30, 30-059 Cracow (Poland); Zabolotny, W. [Institute of Electronic Systems, Warsaw University of Technology, ul. Nowowiejska 15/19, 00-665 Warsaw (Poland); Lehnert, J.; Schmidt, C.J. [GSI Helmholtzzentrum für Schwerionenforschung GmbH, Planckstrasse 1, 64-291 Darmstadt (Germany); Müller, W.F.J. [FAIR Facility for Antiproton and Ion Research in Europe GmbH, Planckstrasse 1, 64-291 Darmstadt (Germany)

    2016-11-01

    The Silicon Tracking System, Muon Chamber, Transition Radiation Detector and Time-Of-Flight among others are the detector systems of the Compressed Baryonic Matter (CBM) experiment at the FAIR facility. These detector systems will be built with tens of thousands of front-end ASICs exposed to high radiation doses and difficult environmental and interference conditions. A CERN's GBTx-based solution was chosen for combining data from multiple front-end ASICs into an optical link before further concentration and preprocessing in the common Data Processing Board data hub. This paper presents the protocol design addressing the DAQ system requirements, simplifying the ASIC's back-end design and presents its adaptation for the STS and MUCH detector's conditions. A specific link synchronization technique, hit data bandwidth optimization and time synchronization method for the self-triggered front-end chip are presented.

  18. A protocol for hit and control synchronous transfer for the front-end electronics at the CBM experiment

    International Nuclear Information System (INIS)

    Kasinski, K.; Szczygiel, R.; Zabolotny, W.; Lehnert, J.; Schmidt, C.J.; Müller, W.F.J.

    2016-01-01

    The Silicon Tracking System, Muon Chamber, Transition Radiation Detector and Time-Of-Flight among others are the detector systems of the Compressed Baryonic Matter (CBM) experiment at the FAIR facility. These detector systems will be built with tens of thousands of front-end ASICs exposed to high radiation doses and difficult environmental and interference conditions. A CERN's GBTx-based solution was chosen for combining data from multiple front-end ASICs into an optical link before further concentration and preprocessing in the common Data Processing Board data hub. This paper presents the protocol design addressing the DAQ system requirements, simplifying the ASIC's back-end design and presents its adaptation for the STS and MUCH detector's conditions. A specific link synchronization technique, hit data bandwidth optimization and time synchronization method for the self-triggered front-end chip are presented.

  19. Bank robberies: A psychological protocol of intervention in financial institutions and principal effects.

    Science.gov (United States)

    Tabanelli, Maria Carla; Bonfiglioli, Roberta; Violante, Francesco S

    2013-03-26

    BACKGROUND: Robbery in workplaces represents a potentially traumatic experience for workers. OBJECTIVES: This article describes the set up and evaluation of a comprehensive psychological intervention designed to help to reduce the adverse consequences of bank robberies. PARTICIPANTS: The study population was selected among the employees of two Italian banks.METHODS: The psychological protocol was designed according to the results of a comprehensive non-systematic review of the scientific literature and it was evaluated at work site. RESULTS: The protocol consists of a "pre-event" formative intervention and "post-event" psychological support. The qualitative data collected allowed us to understand that the reactions after a robbery can differ depending on the phase during which the workers were exposed to the robbery. We noted that the main consequences can be classified in emotional/sentimental reactions, behavioral reactions, physiological reactions and experiences during the event; emotions/feelings following the robbery and psycho/physical state and emotions/feelings in the following days.CONCLUSIONS: In a working environment, the chance to take advantage of a specific protocol for the traumatic event of a bank robbery offers both the company and the workers important tools for well-being, including post-robbery psychological support and classroom instructions.

  20. RESTORE: REcovery after Serious Trauma--Outcomes, Resource use and patient Experiences study protocol.

    Science.gov (United States)

    Gabbe, Belinda J; Braaf, Sandra; Fitzgerald, Mark; Judson, Rodney; Harrison, James E; Lyons, Ronan A; Ponsford, Jennie; Collie, Alex; Ameratunga, Shanthi; Attwood, David; Christie, Nicola; Nunn, Andrew; Cameron, Peter A

    2015-10-01

    Traumatic injury is a leading contributor to the overall global burden of disease. However, there is a worldwide shortage of population data to inform understanding of non-fatal injury burden. An improved understanding of the pattern of recovery following trauma is needed to better estimate the burden of injury, guide provision of rehabilitation services and care to injured people, and inform guidelines for the monitoring and evaluation of disability outcomes. To provide a comprehensive overview of patient outcomes and experiences in the first 5 years after serious injury. This is a population-based, nested prospective cohort study using quantitative data methods, supplemented by a qualitative study of a seriously injured participant sample. All 2547 paediatric and adult major trauma patients captured by the Victorian State Trauma Registry with a date of injury from 1 July 2011 to 30 June 2012 who survived to hospital discharge and did not opt-off from the registry. To analyse the quantitative data and identify factors that predict poor or good outcome, whether there is change over time, differences in rates of recovery and change between key participant subgroups, multilevel mixed effects regression models will be fitted. To analyse the qualitative data, thematic analysis will be used to identify important themes and the relationships between themes. The results of this project have the potential to inform clinical decisions and public health policy, which can reduce the burden of non-fatal injury and improve the lives of people living with the consequences of severe injury. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  1. A.A.P.M. protocol: The American experience

    International Nuclear Information System (INIS)

    Lanzl, Lawrence H.

    1987-01-01

    The success or failure of radiation therapy depends upon the accuracy with which a dose prescription is fulfilled. The first step in determining the dose for a patient's treatment is the measurement of the output of the beam by means of an exposure-calibrated ionization chamber. The second step is the conversion of the exposure to dose within a water phantom. The third step is the selection and implementation of a treatment plan for a given patient. My purpose in this paper is to review the world-wide system of laboratories for step one and to review briefly some protocols, both in the United States (US) and elsewhere, for step two for X-ray beams with maximum energies in the range of 2 to 50 MV, and for electron beams with mean incident energies in the range of 5 to 50 MeV. The reason for limiting the topic to X-ray and electrons of these energies is that, at present, the vast majority of radiation treatments other than brachytherapy in the US are confined to these radiations at these energies

  2. Quality of dispatch-assisted cardiopulmonary resuscitation by lay rescuers following a standard protocol in Japan: an observational simulation study.

    Science.gov (United States)

    Asai, Hideki; Fukushima, Hidetada; Bolstad, Francesco; Okuchi, Kazuo

    2018-04-01

    Bystander cardiopulmonary resuscitation (CPR) is essential for improving the outcomes of sudden cardiac arrest patients. It has been reported that dispatch-assisted CPR (DACPR) accounts for more than half of the incidence of CPR undertaken by bystanders. Its quality, however, can be suboptimal. We aimed to measure the quality of DACPR using a simulation study. We recruited laypersons at a shopping mall and measured the quality of CPR carried out in our simulation. Dispatchers provided instruction in accordance with the standard DACPR protocol in Japan. Twenty-three laypersons (13 with CPR training experience within the past 2 years and 10 with no training experience) participated in this study. The median chest compression rate and depth were 106/min and 33 mm, respectively. The median time interval from placing the 119 call to the start of chest compressions was 119 s. No significant difference was found between the groups with and without training experience. However, subjects with training experience more frequently placed their hands correctly on the manikin (84.6% versus 40.0%; P = 0.026). Twelve participants (52.2%, seven in trained and five in untrained group) interrupted chest compressions for 3-18 s, because dispatchers asked if the patient started breathing or moving. This current simulation study showed that the quality of DACPR carried out by lay rescuers can be less than optimal in terms of depth, hand placement, and minimization of pauses. Further studies are required to explore better DACPR instruction methods to help lay rescuers perform CPR with optimal quality.

  3. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  4. Artery-only fingertip replantations using a controlled nailbed bleeding protocol.

    Science.gov (United States)

    Erken, H Yener; Takka, Semih; Akmaz, Ibrahim

    2013-11-01

    We report our experience, treatment protocol, and 2-year follow-up results of 24 fingertip replantations treated using the artery-only technique without vein or nerve repair. We performed a retrospective review of 24 patients who had undergone fingertip replantation at the same center between 2005 and 2011. All patients in this study had complete fingertip amputation at or distal to the distal interphalangeal joint of the fingers or interphalangeal joint of the thumb. Patients with incomplete and complete amputations who had undergone vein and/or nerve repair along with artery repair were excluded. All patients received the same protocol including removal of the nail at the surgery and intravenous heparin 70 U/kg administered at the time of arterial anastomosis. After surgery, the nailbed was mechanically made to bleed with a sterile needle and mechanically scrubbed with a heparin-saline gauze. All patients received the same postoperative medical treatment protocol until physiological outflow was restored. Successful replantation was confirmed with clinical observation. Twenty-one of the 24 fingertip replantations (88%) were successful. The mean length of hospital stay was 7 days (range, 4-9 d). Fifteen of 22 patients required blood transfusion. The average amount of blood transfusion was 1.2 U (range, 0-3 U). This study shows that the described technique and protocol reconstructed circulation without vein anastomosis and with a high success rate. Furthermore, adequate sensory recovery without any nerve repair had occurred by the 2-year follow-up. Therapeutic IV. Copyright © 2013 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  5. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Aladsair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil Gup [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Schoenwald, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rosewater, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-04-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol, this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.

  6. A Transcription and Translation Protocol for Sensitive Cross-Cultural Team Research.

    Science.gov (United States)

    Clark, Lauren; Birkhead, Ana Sanchez; Fernandez, Cecilia; Egger, Marlene J

    2017-10-01

    Assurance of transcript accuracy and quality in interview-based qualitative research is foundational for data accuracy and study validity. Based on our experience in a cross-cultural ethnographic study of women's pelvic organ prolapse, we provide practical guidance to set up step-by-step interview transcription and translation protocols for team-based research on sensitive topics. Beginning with team decisions about level of detail in transcription, completeness, and accuracy, we operationalize the process of securing vendors to deliver the required quality of transcription and translation. We also share rubrics for assessing transcript quality and the team protocol for managing transcripts (assuring consistency of format, insertion of metadata, anonymization, and file labeling conventions) and procuring an acceptable initial translation of Spanish-language interviews. Accurate, complete, and systematically constructed transcripts in both source and target languages respond to the call for more transparency and reproducibility of scientific methods.

  7. Implementing the Kyoto Protocol. The role of environmental agreements

    Energy Technology Data Exchange (ETDEWEB)

    Torvanger, Asbjoern; Skodvin, Tora

    1999-09-01

    This report examines under what circumstances voluntary agreements to curb greenhouse gas emissions could be an attractive policy option from the government`s perspective. The report begins by defining the term Environmental Agreement (EA) and then explores EAs in three steps: (1) Advantages and disadvantages of EAs compared to other policy tools (direct regulation, taxes and tradable permits), based on theoretical studies and experience from practical use, (2) The potential of EAs as an international policy tool, either in a bilateral or regional setting, (3) The attractiveness of EAs to implement the Kyoto Protocol, and the relation to joint implementation and international emissions trading. The main conclusions are: (1) Experience from OECD countries suggests that EAs are most attractive as a supplement to traditional command and control, or to market-based policy tools. (2) Skillful design of EAs can improve their efficiency. (3) Bilateral EAs is an interesting policy option to regulate pollution from other countries. (4) Regional EAs are rare but could have important advantages. (5) EAs can play a role in a soft transition stage from traditional command and control to domestic emission trading, and further on to a Kyoto Protocol regime of emission trading and joint implementation. 52 refs., 2 figs., 2 tabs.

  8. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    mechanisms, which are used to control active route and reduce the traffic amount in the route discovery procedure. Finial, the numerical experiments are given to show the effectiveness of IRP routing protocol.

  9. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  10. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  11. Split bolus technique in polytrauma: a prospective study on scan protocols for trauma analysis

    NARCIS (Netherlands)

    Beenen, Ludo F. M.; Sierink, Joanne C.; Kolkman, Saskia; Nio, C. Yung; Saltzherr, Teun Peter; Dijkgraaf, Marcel G. W.; Goslings, J. Carel

    2015-01-01

    For the evaluation of severely injured trauma patients a variety of total body computed tomography (CT) scanning protocols exist. Frequently multiple pass protocols are used. A split bolus contrast protocol can reduce the number of passes through the body, and thereby radiation exposure, in this

  12. Testing protocols for evaluating monolithic waste forms containing mixed wastes

    International Nuclear Information System (INIS)

    Gilliam, T.M.; Sams, T.L.; Pitt, W.W.

    1986-01-01

    Test protocols have been presented which can be used as a guide in cement-based grout formulation development studies. Based on experience at ORNL, these six tests are generally sufficient to develop a grout product which will meet all applicable DOE, NRC, and EPA performance criteria. As such, these tests can be used to minimize the time required to tailor a grout to be compatible with both the waste stream and the process disposal scenario. 9 refs

  13. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  14. An Outcomes Study on the Effects of the Singapore General Hospital Burns Protocol.

    Science.gov (United States)

    Liang, Weihao; Kok, Yee Onn; Tan, Bien Keem; Chong, Si Jack

    2018-01-01

    The Singapore General Hospital Burns Protocol was implemented in May 2014 to standardize treatment for all burns patients, incorporate new techniques and materials, and streamline the processes and workflow of burns management. This study aims to analyze the effects of the Burns Protocol 2 years after its implementation. Using a REDCap electronic database, all burns patients admitted from May 2013 to April 2016 were included in the study. The historical preimplementation control group composed of patients admitted from May 2013 to April 2014 (n = 96). The postimplementation prospective study cohort consisted of patients admitted from May 2014 to April 2016 (n = 243). Details of the patients collected included age, sex, comorbidities, total body surface area (TBSA) burns, time until surgery, number of surgeries, number of positive tissue and blood cultures, and length of hospital stay. There was no statistically significant difference in the demographics of both groups. The study group had a statistically significant shorter time to surgery compared with the control group (20.8 vs 38.1, P burns, was statistically significant (number of surgeries/TBSA, 0.324 vs 0.506; P = 0.0499). The study group also had significantly shorter length of stay (12.5 vs 16.8, P = 0.0273), a shorter length of stay/TBSA burns (0.874 vs 1.342, P = 0.0101), and fewer positive tissue cultures (0.6 vs 1.3, P = 0.0003). The study group also trended toward fewer positive blood culture results (0.09 vs 0.35, P = 0.0593), although the difference was just shy of statistical significance. The new Singapore General Hospital Burns Protocol had revolutionized Singapore burns care by introducing a streamlined, multidisciplinary burns management, resulting in improved patient outcomes, lowered health care costs, and improved system resource use.

  15. Tools for Performance Assessment of OLSR Protocol

    Directory of Open Access Journals (Sweden)

    Makoto Ikeda

    2009-01-01

    Full Text Available In this paper, we evaluate the performance of Optimized Link State Routing (OLSR protocol by experimental and simulation results. The experiments are carried out by using our implemented testbed and the simulations by using ns-2 simulator. We also designed and implemented a new interface for the ad-hoc network testbed in order to make more easier the experiments. The comparison between experimental and simulation results shows that for the same parameters set, in the simulation we did not notice any packet loss. On the other hand, in the experiments we experienced packet loss because of the environment effects and traffic interference.

  16. Biomass to energy : GHG reduction quantification protocols and case study

    Energy Technology Data Exchange (ETDEWEB)

    Reusing, G.; Taylor, C. [Conestoga - Rovers and Associates, Waterloo, ON (Canada); Nolan, W. [Liberty Energy, Hamilton, ON (Canada); Kerr, G. [Index Energy, Ajax, ON (Canada)

    2009-07-01

    With the growing concerns over greenhouses gases and their contribution to climate change, it is necessary to find ways of reducing environmental impacts by diversifying energy sources to include non-fossil fuel energy sources. Among the fastest growing green energy sources is energy from waste facilities that use biomass that would otherwise be landfilled or stockpiled. The quantification of greenhouse gas reductions through the use of biomass to energy systems can be calculated using various protocols and methodologies. This paper described each of these methodologies and presented a case study comparing some of these quantification methodologies. A summary and comparison of biomass to energy greenhouse gas reduction protocols in use or under development by the United Nations, the European Union, the Province of Alberta and Environment Canada was presented. It was concluded that regulatory, environmental pressures, and public policy will continue to impact the practices associated with biomass processing or landfill operations, such as composting, or in the case of landfills, gas collection systems, thus reducing the amount of potential credit available for biomass to energy facility offset projects. 10 refs., 2 tabs., 6 figs.

  17. Biomass to energy : GHG reduction quantification protocols and case study

    International Nuclear Information System (INIS)

    Reusing, G.; Taylor, C.; Nolan, W.; Kerr, G.

    2009-01-01

    With the growing concerns over greenhouses gases and their contribution to climate change, it is necessary to find ways of reducing environmental impacts by diversifying energy sources to include non-fossil fuel energy sources. Among the fastest growing green energy sources is energy from waste facilities that use biomass that would otherwise be landfilled or stockpiled. The quantification of greenhouse gas reductions through the use of biomass to energy systems can be calculated using various protocols and methodologies. This paper described each of these methodologies and presented a case study comparing some of these quantification methodologies. A summary and comparison of biomass to energy greenhouse gas reduction protocols in use or under development by the United Nations, the European Union, the Province of Alberta and Environment Canada was presented. It was concluded that regulatory, environmental pressures, and public policy will continue to impact the practices associated with biomass processing or landfill operations, such as composting, or in the case of landfills, gas collection systems, thus reducing the amount of potential credit available for biomass to energy facility offset projects. 10 refs., 2 tabs., 6 figs

  18. Atlas-based analysis of cardiac shape and function: correction of regional shape bias due to imaging protocol for population studies.

    Science.gov (United States)

    Medrano-Gracia, Pau; Cowan, Brett R; Bluemke, David A; Finn, J Paul; Kadish, Alan H; Lee, Daniel C; Lima, Joao A C; Suinesiaputra, Avan; Young, Alistair A

    2013-09-13

    Cardiovascular imaging studies generate a wealth of data which is typically used only for individual study endpoints. By pooling data from multiple sources, quantitative comparisons can be made of regional wall motion abnormalities between different cohorts, enabling reuse of valuable data. Atlas-based analysis provides precise quantification of shape and motion differences between disease groups and normal subjects. However, subtle shape differences may arise due to differences in imaging protocol between studies. A mathematical model describing regional wall motion and shape was used to establish a coordinate system registered to the cardiac anatomy. The atlas was applied to data contributed to the Cardiac Atlas Project from two independent studies which used different imaging protocols: steady state free precession (SSFP) and gradient recalled echo (GRE) cardiovascular magnetic resonance (CMR). Shape bias due to imaging protocol was corrected using an atlas-based transformation which was generated from a set of 46 volunteers who were imaged with both protocols. Shape bias between GRE and SSFP was regionally variable, and was effectively removed using the atlas-based transformation. Global mass and volume bias was also corrected by this method. Regional shape differences between cohorts were more statistically significant after removing regional artifacts due to imaging protocol bias. Bias arising from imaging protocol can be both global and regional in nature, and is effectively corrected using an atlas-based transformation, enabling direct comparison of regional wall motion abnormalities between cohorts acquired in separate studies.

  19. Inhibition of angiotensin-converting enzyme increases oestradiol production in ewes submitted to oestrous synchronization protocol.

    Science.gov (United States)

    Costa, A s; Junior, A S; Viana, G E N; Muratori, M C S; Reis, A M; Costa, A P R

    2014-10-01

    This study aimed at evaluating the effects of angiotensin-converting enzyme inhibitor (enalapril) and angiotensin II antagonist (valsartan) on the oestradiol and progesterone production in ewes submitted to oestrous synchronization protocol. The animals were weighed and randomly divided into three groups (n = 7). A pre-experiment conducted to verify the effectiveness and toxicity of enalapril (0.5 mg/kg LW) and valsartan (2.2 mg/kg LW) showed that, in the doses used, these drugs were effective in reducing blood pressure without producing toxic effects. In the experiment, all animals were subjected to oestrous synchronization protocol during 12 days. On D10, D11 and D12, animals received saline, enalapril or valsartan (same doses of the pre-experiment), according to the group randomly divided. The hormonal analysis showed an increase in oestradiol on the last day of the protocol (D12) in animals that received enalapril (p progesterone in any of the treatments. It is concluded that valsartan and enalapril are safe and effective subcutaneously for use in sheep and that the angiotensin-converting enzyme (ACE) inhibition with enalapril leads to an increase in oestradiol production near ovulation without changing the concentration of progesterone. This shows that ACE inhibition may be a useful tool in reproductive biotechnologies involving induction and synchronization of oestrus and ovulation in sheep. © 2014 Blackwell Verlag GmbH.

  20. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  1. The Study of MSADQ/CDMA Protocol in Voice/Data Integration Packet Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new packet medium access protocol, namely, minislot signalingaccess based on distributed queues(MSADQ/CDMA), is proposed in voice and data intergration CDMA networks. The MSADQ protocol is based on distributed queues and collision resolution algorithm. Through proper management of the PN codes, the number of random competition collision reduces greatly, the multiple access interference (MAI) decreases. It has several special access signaling channels to carry the voice and data access request. Each slot is devided into several control minislots (CMSs), in which the Data Terminals (DT) or Voice Terminals (VT) transmit their request. According to the voice and data traffic character, the signaling access structure is proposed. The code assign rules and queue managing rules are also proposed to ensure the QoS requirement of each traffic. Comparisions with other three protocol are developed by simulation, which shows that MSADQ/CDMA protocol occupies less PN codes, but still has very good performance.

  2. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  3. Histomorphometric assessment of bone necrosis produced by two cryosurgery protocols using liquid nitrogen: an experimental study on rat femurs.

    Science.gov (United States)

    Costa, Fábio Wildson Gurgel; Brito, Gerly Anne de Castro; Pessoa, Rosana Maria Andrade; Studart-Soares, Eduardo Costa

    2011-01-01

    The aim of this study was to evaluate the effects of liquid nitrogen cryosurgery on the femoral diaphysis of rats. The femoral diaphyses of 42 Wistar rats were exposed to three local and sequential applications of liquid nitrogen for 1 or 2 min, intercalated with periods of 5 min of passive thawing. The animals were sacrificed after 1, 2, 4 and 12 weeks and the specimens obtained were processed and analyzed histomorphometrically. The depth and extent of peak bone necrosis were 124.509 µm and 2087.094 µm for the 1-min protocol, respectively, and 436.424 µm and 12046.426 µm for the 2-min protocol. Peak necrosis was observed in the second experimental week with both cryotherapy protocols. The present results indicate that the 2-min protocol produced more marked bone necrosis than the 1-min protocol. Although our results cannot be entirely extrapolated to clinical practice, they contribute to the understanding of the behavior of bone tissue submitted to different cycles of liquid nitrogen freezing and may serve as a basis for new studies.

  4. Combination Protocol of Low-Frequency rTMS and Intensive Occupational Therapy for Post-stroke Upper Limb Hemiparesis: a 6-year Experience of More Than 1700 Japanese Patients.

    Science.gov (United States)

    Kakuda, Wataru; Abo, Masahiro; Sasanuma, Jinichi; Shimizu, Masato; Okamoto, Takatsugu; Kimura, Chikou; Kakita, Kiyohito; Hara, Hiroyoshi

    2016-06-01

    Several years ago, we proposed a combination protocol of repetitive transcranial magnetic stimulation (rTMS) and intensive occupational therapy (OT) for upper limb hemiparesis after stroke. Subsequently, the number of patients treated with the protocol has increased in Japan. We aimed to present the latest data on our proposed combination protocol for post-stroke upper limb hemiparesis as a result of a multi-institutional study. After confirming that a patient met the inclusion criteria for the protocol, they were scheduled to receive the 15-day inpatient protocol. In the protocol, two sessions of 20-min rTMS and 120-min occupational therapy were provided daily, except for Sundays and the days of admission/discharge. Motor function of the affected upper limb was evaluated by the Fugl-Meyer assessment (FMA) and Wolf motor function test (WMFT) at admission/discharge and at 4 weeks after discharge if possible. A total of 1725 post-stroke patients were studied (mean age at admission 61.4 ± 13.0 years). The scheduled 15-day protocol was completed by all patients. At discharge, the increase in FMA score, shortening in performance time of WMFT, and increase in functional ability scale (FAS) score of WMFT were significant (FMA score 46.8 ± 12.2 to 50.9 ± 11.4 points, p hemiparesis after stroke, although its efficacy should be confirmed in a randomized controlled study.

  5. The Sports-Related Injuries and Illnesses in Paralympic Sport Study (SRIIPSS): a study protocol for a prospective longitudinal study.

    Science.gov (United States)

    Fagher, Kristina; Jacobsson, Jenny; Timpka, Toomas; Dahlström, Örjan; Lexell, Jan

    2016-01-01

    Paralympic sport provides sporting opportunities for athletes with a disability, with the Paralympic Games as the main event. Participation in sport is, however, associated with a significant risk for sustaining injuries and illnesses. Our knowledge of sports-related injuries and illnesses in Paralympic sport is very limited and there are no large-scale epidemiological cohort studies. The purpose here is to present a protocol for a prospective longitudinal study: The Sports-Related Injuries and Illnesses in Paralympic Sport Study (SRIIPSS). An argument-based method for investigation of design problems was used to structure the study protocol. The primary requirement of the protocol is to allow prospective studies over time and include exposure to both training and competition. To reflect the complexity of Paralympic sport with athletes' pre-existing impairments, use of assistive equipment, pain and other and medical issues, it is required that the data collection system is specifically adapted to Paralympic sport. To allow the collection of data, at the same time as there is limited access to coaches and medical personnel, it is advantageous that data can be collected online directly from the athletes. Based on this a self-report athlete monitoring system will be developed, where the athletes can enter data weekly via their mobile phones or lap-tops. Data will be collected from around 100 Swedish Paralympic athletes for approximately 1 year, which will allow us to i) prospectively estimate the annual incidence of sports-related injuries and illnesses and ii) explore risk factors and mechanisms for sustaining sports-related injuries and illnesses based on athlete exposure and training loads. For effective implementation of injury and illness prevention measures, comprehensive epidemiological knowledge is required. This study will be the first prospective longitudinal self-report study of sports-related injuries and illnesses in Paralympic sport over a longer period

  6. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  7. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  8. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  9. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  10. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    Science.gov (United States)

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been

  11. Longitudinal measurement of cortisol in association with mental health and experience of domestic violence and abuse: study protocol

    OpenAIRE

    Lokhmatkina, Natalia V; Feder, Gene; Blake, Sarah; Morris, Richard; Powers, Victoria; Lightman, Stafford

    2013-01-01

    Background Domestic violence and abuse is threatening behavior, violence/abuse used by one person to control the other within an intimate or family-type relationship. Women experience more severe physical and sexual domestic violence and abuse and more mental health consequences than men. The current study aims at exploring of the role of hypothalamic-pituitary-adrenocortical axis activity in abuse impact on women's mental health. Study objectives: 1) To evaluate diurnal cortisol slope, corti...

  12. Optimal Scanning Protocols for Dual-Energy CT Angiography in Peripheral Arterial Stents: An in Vitro Phantom Study

    Directory of Open Access Journals (Sweden)

    Abdulrahman Almutairi

    2015-05-01

    Full Text Available Objective: To identify the optimal dual-energy computed tomography (DECT scanning protocol for peripheral arterial stents while achieving a low radiation dose, while still maintaining diagnostic image quality, as determined by an in vitro phantom study. Methods: Dual-energy scans in monochromatic spectral imaging mode were performed on a peripheral arterial phantom with use of three gemstone spectral imaging (GSI protocols, three pitch values, and four kiloelectron volts (keV ranges. A total of 15 stents of different sizes, materials, and designs were deployed in the phantom. Image noise, the signal-to-noise ratio (SNR, different levels of adaptive statistical iterative reconstruction (ASIR, and the four levels of monochromatic energy for DECT imaging of peripheral arterial stents were measured and compared to determine the optimal protocols. Results: A total of 36 scans with 180 datasets were reconstructed from a combination of different protocols. There was a significant reduction of image noise with a higher SNR from monochromatic energy images between 65 and 70 keV in all investigated preset GSI protocols (p < 0.05. In addition, significant effects were found from the main effect analysis for these factors: GSI, pitch, and keV (p = 0.001. In contrast, there was significant interaction on the unstented area between GSI and ASIR (p = 0.015 and a very high significant difference between keV and ASIR (p < 0.001. A radiation dose reduction of 50% was achieved. Conclusions: The optimal scanning protocol and energy level in the phantom study were GSI-48, pitch value 0.984, and 65 keV, which resulted in lower image noise and a lower radiation dose, but with acceptable diagnostic images.

  13. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  14. Early signaling, referral, and treatment of adolescent chronic pain: a study protocol

    Directory of Open Access Journals (Sweden)

    Voerman Jessica S

    2012-06-01

    Full Text Available Abstract Background Chronic pain is prevalent among young people and negatively influences their quality of life. Furthermore, chronic pain in adolescence may persist into adulthood. Therefore, it is important early on to promote the self-management skills of adolescents with chronic pain by improving signaling, referral, and treatment of these youngsters. In this study protocol we describe the designs of two complementary studies: a signaling study and an intervention study. Methods and design The signaling study evaluates the Pain Barometer, a self-assessed signaling instrument for chronic pain in adolescents. To evaluate the feasibility of the Pain Barometer, the experiences of youth-health care nurses will be evaluated in semi-structured interviews. Also, we will explore the frequencies of referral per health-care provider. The intervention study evaluates Move It Now, a guided self-help intervention via the Internet for teenagers with chronic pain. This intervention uses cognitive behavioural techniques, including relaxation exercises and positive thinking. The objective of the intervention is to improve the ability of adolescents to cope with pain. The efficacy of Move It Now will be examined in a randomized controlled trial, in which 60 adolescents will be randomly assigned to an experimental condition or a waiting list control condition. Discussion If the Pain Barometer is proven to be feasible and Move It Now appears to be efficacious, a health care pathway can be created to provide the best tailored treatment promptly to adolescents with chronic pain. Move It Now can be easily implemented throughout the Netherlands, as the intervention is Internet based. Trial registration Dutch Trial Register NTR1926

  15. On shaky ground - A study of security vulnerabilities in control protocols

    Energy Technology Data Exchange (ETDEWEB)

    Byres, E. J. [Wurldtech Research Inc., 7178 Lancrest Tr., Lantzville, BC V0R 2H0 (Canada); Huffman, D. [Wurldtech Analytics Inc., 208-1040 Hamilton St., Vancouver, BC V6B 2R9 (Canada); Kube, N. [Univ. of Victoria, Dept. of Computer Science, PO Box 3055 STN CSC, Victoria BC V8W 3P6 (Canada)

    2006-07-01

    The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control protocol to determine if it had vulnerabilities that could be exploited. A framework was created in which a test could express a large number of test cases in very compact formal language. This in turn, allowed for the economical automation of both the generation of selectively malformed protocol traffic and the measurement of device under test's (DUT) behavior in response to this traffic. Approximately 5000 protocol conformance tests were run against two major brands of industrial controller. More than 60 categories of errors were discovered, the majority of which were in the form of incorrect error responses to malformed traffic. Several malformed packets however, caused the device to respond or communicate in inappropriate ways. These would be relatively simple for an attacker to inject into a system and could result in the plant operator losing complete view or control of the control device. Based on this relatively small set of devices, we believe that the nuclear industry urgently needs to adopt better security robustness testing of control devices as standard practice. (authors)

  16. On shaky ground - A study of security vulnerabilities in control protocols

    International Nuclear Information System (INIS)

    Byres, E. J.; Huffman, D.; Kube, N.

    2006-01-01

    The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control protocol to determine if it had vulnerabilities that could be exploited. A framework was created in which a test could express a large number of test cases in very compact formal language. This in turn, allowed for the economical automation of both the generation of selectively malformed protocol traffic and the measurement of device under test's (DUT) behavior in response to this traffic. Approximately 5000 protocol conformance tests were run against two major brands of industrial controller. More than 60 categories of errors were discovered, the majority of which were in the form of incorrect error responses to malformed traffic. Several malformed packets however, caused the device to respond or communicate in inappropriate ways. These would be relatively simple for an attacker to inject into a system and could result in the plant operator losing complete view or control of the control device. Based on this relatively small set of devices, we believe that the nuclear industry urgently needs to adopt better security robustness testing of control devices as standard practice. (authors)

  17. The precautionary principle as a provisional instrument in environmental policy: The Montreal Protocol case study

    International Nuclear Information System (INIS)

    Jacobs, J. Roger

    2014-01-01

    Highlights: • I examine whether a policy invoked under the Precautionary Principle can move beyond provisional status. • I review the certainty of conclusions based upon the Global Ozone Research and Monitoring Project. • There is high certainty that anthropogenic ozone depletion has health consequences in polar regions. • Current research focuses on long term projections of risk that perpetuates high uncertainty. • Establishment of a community to generate Assessments acts to perpetuate the period of uncertainty. - Abstract: Environmental studies identify possible threats to the health of the public or the environment when the scientific certainty of risk is low, but the potential cost is high. Governments may respond by invoking the Precautionary Principle, holding that scientific certainty is not required to take actions that reduce possible risk. EU guidelines suggest that precautionary measures remain provisional until sufficient scientific certainty is generated. Here I study the Scientific Assessments produced for the Montreal Protocol, and the scientific community that generates them, and ask whether a long-standing program of scientific investigation and monitoring can generate sufficient scientific certainty to move beyond dependence on the Precautionary Principle. When the Montreal Protocol was ratified, many scientists strongly suspected that anthropogenic substances like chlorofluorocarbons were depleting stratospheric ozone. Although the risk was uncertain, the perceived cost to public health of ozone depletion was high. A quarter century after formulating the Montreal Protocol, science can define the conditions for ozone depletion with great certainty, but uncertainty remains in determining the scale and distribution of the attributable increase in damaging ultra-violet (UV) radiation. Organisations, such as NASA, and scientists that contribute to the Scientific Assessments comprise the community in which the scientific consensus of risk is

  18. XPS Protocol for the Characterization of Pristine and Functionalized Single Wall Carbon Nanotubes

    Science.gov (United States)

    Sosa, E. D.; Allada, R.; Huffman, C. B.; Arepalli, S.

    2009-01-01

    Recent interest in developing new applications for carbon nanotubes (CNT) has fueled the need to use accurate macroscopic and nanoscopic techniques to characterize and understand their chemistry. X-ray photoelectron spectroscopy (XPS) has proved to be a useful analytical tool for nanoscale surface characterization of materials including carbon nanotubes. Recent nanotechnology research at NASA Johnson Space Center (NASA-JSC) helped to establish a characterization protocol for quality assessment for single wall carbon nanotubes (SWCNTs). Here, a review of some of the major factors of the XPS technique that can influence the quality of analytical data, suggestions for methods to maximize the quality of data obtained by XPS, and the development of a protocol for XPS characterization as a complementary technique for analyzing the purity and surface characteristics of SWCNTs is presented. The XPS protocol is then applied to a number of experiments including impurity analysis and the study of chemical modifications for SWCNTs.

  19. Immunosuppression for in vivo research: state-of-the-art protocols and experimental approaches

    Institute of Scientific and Technical Information of China (English)

    Rita Diehl; Fabienne Ferrara; Claudia Müller; Antje Y Dreyer; Damian D McLeod; Stephan Fricke; Johannes Boltze

    2017-01-01

    Almost every experimental treatment strategy using non-autologous cell,tissue or organ transplantation is tested in small and large animal models before clinical translation.Because these strategies require immunosuppression in most cases,immunosuppressive protocols are a key element in transplantation experiments.However,standard immunosuppressive protocols are often applied without detailed knowledge regarding their efficacy within the particular experimental setting and in the chosen model species.Optimization of such protocols is pertinent to the translation of experimental results to human patients and thus warrants further investigation.This review summarizes current knowledge regarding immunosuppressive drug classes as well as their dosages and application regimens with consideration of species-specific drug metabolization and side effects.It also summarizes contemporary knowledge of novel immunomodulatory strategies,such as the use of mesenchymal stem cells or antibodies.Thus,this review is intended to serve as a state-of-the-art compendium for researchers to refine applied experimental immunosuppression and immunomodulation strategies to enhance the predictive value of preclinical transplantation studies.

  20. User-Centered Design of Serious Games for Older Adults Following 3 Years of Experience With Exergames for Seniors: A Study Design.

    Science.gov (United States)

    Brox, Ellen; Konstantinidis, Stathis Th; Evertsen, Gunn

    2017-01-11

    Seniors need sufficient balance and strength to manage in daily life, and sufficient physical activity is required to achieve and maintain these abilities. This can be a challenge, but fun and motivational exergames can be of help. However, most commercial games are not suited for this age group for several reasons. Many usability studies and user-centered design (UCD) protocols have been developed and applied, but to the best of our knowledge none of them are focusing on seniors' use of games for physical activity. In GameUp, a European cofunded project, some prototype Kinect exergames to enhance the mobility of seniors were developed in a user-centered approach. In this paper we aim to record lessons learned in 3 years of experience with exergames for seniors, considering both the needs of older adults regarding user-centered development of exergames and participation in UCD. We also provide a UCD protocol for exergames tailored to senior needs. An initial UCD protocol was formed based on literature of previous research outcomes. Senior users participated in UCD following the initial protocol. The users formed a steady group that met every second week for 3 years to play exergames and participate in the UCD during the 4 phases of the protocol. Several methods were applied in the 4 different phases of the UCD protocol; the most important methods were structured and semistructured interviews, observations, and group discussions. A total of 16 seniors with an average age above 80 years participated for 3 years in UCD in order to develop the GameUp exergames. As a result of the lessons learned by applying the different methodologies of the UCD protocol, we propose an adjusted UCD protocol providing explanations on how it should be applied for seniors as users. Questionnaires should be turned into semistructured and structured interviews while user consultation sessions should be repeated with the same theme to ensure that the UCD methods produce a valid outcome. By

  1. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The Children's Activity and Movement in Preschool Study Motor Skills Protocol

    Science.gov (United States)

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2009-01-01

    The purpose of this study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field-based settings. The development of the Children's Activity and Movement in Preschool Study Motor Skills Protocol included evidence of its reliability and validity for use in field-based environments as part of large…

  2. The development and evaluation of an internal workplace violence risk assessment protocol: one organization's experience.

    Science.gov (United States)

    Heitt, Michael C; Tamburo, Melissa Back

    2005-01-01

    The creation and development of a Risk Assessment Team at a large urban university is presented as a case study, with particular focus on the role the Employee Assistance Program (EAP) plays in the multidisciplinary team. The structure of the team and differing roles and responsibilities of members will be discussed. A specific protocol for addressing incidents will be introduced, along with changes in the team ' response over time. Major lessons learned will be presented, as well as the challenges the team faces today, and discussion of areas for future research and evaluation.

  3. Disinfection Contact Time study plan (100-N Area tracer protocol). Revision 1

    International Nuclear Information System (INIS)

    Kretzschmar, S.P.; Bedi, G.S.; Martinez, P.; Ervin, K.

    1996-07-01

    Bechtel Hanford, Inc. will prepare an Engineering Tracer Study Protocol for the determination of contact time for the disinfection process at Group A Non-transient Non-community water treatment plant for the 100-N Water Plant at the Hanford Site in Richland, Washington. Included in this report are the results of a study that determine the actual detention time within the plant clearwell, and thus the disinfection contact time at several clearwell effluent flow rates

  4. Fiber Laser Component Testing for Space Qualification Protocol Development

    Science.gov (United States)

    Falvey, S.; Buelow, M.; Nelson, B.; Starcher, Y.; Thienel, L.; Rhodes, C.; Tull, Jackson; Drape, T.; Westfall, C.

    A test protocol for the space qualifying of Ytterbium-doped diode-pumped fiber laser (DPFL) components was developed under the Bright Light effort, sponsored by AFRL/VSE. A literature search was performed and summarized in an AMOS 2005 conference paper that formed the building blocks for the development of the test protocol. The test protocol was developed from the experience of the Bright Light team, the information in the literature search, and the results of a study of the Telcordia standards. Based on this protocol developed, test procedures and acceptance criteria for a series of vibration, thermal/vacuum, and radiation exposure tests were developed for selected fiber laser components. Northrop Grumman led the effort in vibration and thermal testing of these components at the Aerospace Engineering Facility on Kirtland Air Force Base, NM. The results of the tests conducted have been evaluated. This paper discusses the vibration and thermal testing that was executed to validate the test protocol. The lessons learned will aid in future assessments and definition of space qualification protocols. Components representative of major items within a Ytterbium-doped diode-pumped fiber laser were selected for testing; including fibers, isolators, combiners, fiber Bragg gratings, and laser diodes. Selection of the components was based on guidelines to test multiple models of typical fiber laser components. A goal of the effort was to test two models (i.e. different manufacturers) of each type of article selected, representing different technologies for the same type of device. The test articles did not include subsystems or systems. These components and parts may not be available commercial-off-the-shelf (COTS), and, in fact, many are custom articles, or newly developed by the manufacturer. The primary goal for this effort is a completed taxonomy that lists all relevant laser components, modules, subsystems, and interfaces, and cites the documentation for space

  5. Clinical protocol levels are required in laboratory animal surgery when using medical devices: experiences with ureteral replacement surgery in goats.

    Science.gov (United States)

    de Jonge, Paul K J D; Sloff, Marije; Janke, Heinz P; Kortmann, Barbara B M; de Gier, Robert P E; Geutjes, Paul J; Oosterwijk, Egbert; Feitz, Wout F J

    2017-10-01

    It is common to test medical devices in large animal studies that are or could also be used in humans. In this short report we describe the use of a ureteral J-stent for the evaluation of biodegradable tubular constructs for tissue reconstruction, and the regeneration of ureters in Saanen goats. Similarly to a previous study in pigs, the ureteral J-stent was blindly inserted until some resistance was met. During evaluation of the goats after three months, perforation of the renal cortex by the stent was observed in four out of seven animals. These results indicated that blind stent placement was not possible in goats. In four new goats, clinical protocols were followed using X-ray and iodinated contrast fluids to visualize the kidney and stent during stent placement. With this adaptation the stents were successfully placed in the kidneys of these four new goats with minimal additional effort. It is likely that other groups in other fields ran into similar problems that could have been avoided by following clinical protocols. Therefore, we would like to stress the importance of following clinical protocols when using medical devices in animals to prevent unnecessary suffering and to reduce the number of animals needed.

  6. The MOBI-Kids Study Protocol: Challenges in Assessing Childhood and Adolescent Exposure to Electromagnetic Fields from Wireless Telecommunication Technologies and Possible Association with Brain Tumor Risk

    Science.gov (United States)

    Sadetzki, Siegal; Langer, Chelsea Eastman; Bruchim, Revital; Kundi, Michael; Merletti, Franco; Vermeulen, Roel; Kromhout, Hans; Lee, Ae-Kyoung; Maslanyj, Myron; Sim, Malcolm R.; Taki, Masao; Wiart, Joe; Armstrong, Bruce; Milne, Elizabeth; Benke, Geza; Schattner, Rosa; Hutter, Hans-Peter; Woehrer, Adelheid; Krewski, Daniel; Mohipp, Charmaine; Momoli, Franco; Ritvo, Paul; Spinelli, John; Lacour, Brigitte; Delmas, Dominique; Remen, Thomas; Radon, Katja; Weinmann, Tobias; Klostermann, Swaantje; Heinrich, Sabine; Petridou, Eleni; Bouka, Evdoxia; Panagopoulou, Paraskevi; Dikshit, Rajesh; Nagrani, Rajini; Even-Nir, Hadas; Chetrit, Angela; Maule, Milena; Migliore, Enrica; Filippini, Graziella; Miligi, Lucia; Mattioli, Stefano; Yamaguchi, Naohito; Kojimahara, Noriko; Ha, Mina; Choi, Kyung-Hwa; Mannetje, Andrea ’t; Eng, Amanda; Woodward, Alistair; Carretero, Gema; Alguacil, Juan; Aragones, Nuria; Suare-Varela, Maria Morales; Goedhart, Geertje; Schouten-van Meeteren, A. Antoinette Y. N.; Reedijk, A. Ardine M. J.; Cardis, Elisabeth

    2014-01-01

    The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF) and extremely low frequency (ELF) electromagnetic fields (EMF). MOBI-Kids, a multinational case–control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10–24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: (1) the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; (2) investigating a young study population spanning a relatively wide age range; (3) conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; (4) investigating a rare and potentially fatal disease; and (5) assessing exposure to EMF from communication technologies. Our experience in thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people. PMID:25295243

  7. The MOBI-Kids study protocol: challenges in assessing childhood and adolescent exposure to electromagnetic fields from wireless telecommunication technologies and possible association with brain tumor risk

    Directory of Open Access Journals (Sweden)

    Siegal eSadetzki

    2014-09-01

    Full Text Available The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF, extremely low frequency (ELF electromagnetic fields (EMF. MOBI-Kids, a multinational case-control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10-24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure and brain tumor risk in young people in a large number of countries is complex and poses methodological challenges. This manuscript discusses the design of MOBI-Kids and describes the challenges and approaches chosen to address them, including: 1 the choice of controls operated for suspected appendicitis, to reduce potential selection bias related to low response rates among population controls; 2 investigating a young study population spanning a relatively wide age-range. 3 conducting a large, multinational epidemiological study, while adhering to increasingly stricter ethics requirements; 4 investigating a rare and potentially fatal disease; and 5 assessing exposure to EMF from communication technologies. Our experience thus far developing and implementing the study protocol indicates that MOBI-Kids is feasible and will generate results that will contribute to the understanding of potential brain tumor risks associated with use of mobile phones and other wireless communications technologies among young people.

  8. Study protocol for a pragmatic randomised controlled trial evaluating efficacy of a smoking cessation e-‘Tabac Info Service’: ee-TIS trial

    Science.gov (United States)

    Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F

    2017-01-01

    Introduction A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. Methods and analyses The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. Ethics and dissemination The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. Trial registration

  9. Protocol adaptations to conduct Systematic Literature Reviews in Software Engineering: a chronological study

    Directory of Open Access Journals (Sweden)

    Samuel Sepúlveda

    2015-09-01

    Full Text Available Systematic literature reviews (SLR have reached a considerable level of adoption in Software Engineering (SE, how-ever protocol adaptations for its implementation remain tangentially addressed. This work provides a chronological framework for the use and adaptation of the SLR protocol, including its current status. A systematic literature search was performed, reviewing a set of twelve articles being selected in accordance with the inclusion and exclusion criteria between 2004 and 2013, using digital data sources recognized by the SE community. A chronological framework is provided that includes the current state of the protocol adaptations to conduct SLR in SE. The results indicate areas where the quantity and quality of investigations needs to be increased and the identi- fication of the main proposals providing adaptations for the protocol conducting SLR in SE.

  10. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  11. Transitions of Care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study: A study of protocols in Greater London

    Directory of Open Access Journals (Sweden)

    Ford Tamsin

    2008-06-01

    Full Text Available Abstract Background Although young people's transition from Child and Adolescent Mental Health Services (CAMHS to Adult Mental Health Services (AMHS in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. Methods A questionnaire survey (Jan-April 2005 of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Results Forty two of the 65 teams contacted (65% responded to the survey. Teams varied in type (generic/targeted/in-patient, catchment area (locality-based, wider or national and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0–70, SD 14.5, n = 37 was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0–50, SD 9.5, n = 33. In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. Conclusion At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in

  12. Implementation of a protocol to reduce occurrence of retained sponges after vaginal delivery.

    Science.gov (United States)

    Lutgendorf, Monica A; Schindler, Lynnett L; Hill, James B; Magann, Everett F; O'Boyle, John D

    2011-06-01

    Retained sponges (gossypiboma) following vaginal delivery are an uncommon occurrence. Although significant morbidity from such an event is unlikely, there are many reported adverse effects, including symptoms of malodorous discharge, loss of confidence in providers and the medical system, and legal claims. To report a protocol intended to reduce the occurrence of retained sponges following vaginal delivery. After identification of limitations with existing delivery room protocols, we developed a sponge count protocol to reduce occurrence of retained vaginal sponges. We report our experience at Naval Medical Center Portsmouth, a large tertiary care military treatment facility with our efforts to implement a sponge count protocol to reduce retained sponges following vaginal delivery. With appropriate pre-implementation training, protocols which incorporate post-delivery vaginal sweep and sponge counts are well accepted by the health care team and can be incorporated into the delivery room routine.

  13. Validation of a protocol for the estimation of three-dimensional body center of mass kinematics in sport.

    Science.gov (United States)

    Mapelli, Andrea; Zago, Matteo; Fusini, Laura; Galante, Domenico; Colombo, Andrea; Sforza, Chiarella

    2014-01-01

    Since strictly related to balance and stability control, body center of mass (CoM) kinematics is a relevant quantity in sport surveys. Many methods have been proposed to estimate CoM displacement. Among them, segmental method appears to be suitable to investigate CoM kinematics in sport: human body is assumed as a system of rigid bodies, hence the whole-body CoM is calculated as the weighted average of the CoM of each segment. The number of landmarks represents a crucial choice in the protocol design process: one have to find the proper compromise between accuracy and invasivity. In this study, using a motion analysis system, a protocol based upon the segmental method is validated, adopting an anatomical model comprising 14 landmarks. Two sets of experiments were conducted. Firstly, our protocol was compared to the ground reaction force method (GRF), accounted as a standard in CoM estimation. In the second experiment, we investigated the aerial phase typical of many disciplines, comparing our protocol with: (1) an absolute reference, the parabolic regression of the vertical CoM trajectory during the time of flight; (2) two common approaches to estimate CoM kinematics in gait, known as sacrum and reconstructed pelvis methods. Recognized accuracy indexes proved that the results obtained were comparable to the GRF; what is more, during the aerial phases our protocol showed to be significantly more accurate than the two other methods. The protocol assessed can therefore be adopted as a reliable tool for CoM kinematics estimation in further sport researches. Copyright © 2013 Elsevier B.V. All rights reserved.

  14. Data-sharing protocol: A prototype implementation

    International Nuclear Information System (INIS)

    Gibney, T.; Greenwood, D.

    1992-12-01

    This paper describes a client/server communication protocol which will allow physicists to access data from cooperating remote experiments. Special low-level ''client'' software within the user's ''home'' data-access library formulates a request for data from the remote experiment. This request is sent over a network to a server at the remote site. The server has specific knowledge about the location and format of the requested data. The server gets the data and sends it over the network to the requesting client, which reformats the data according to the local library's conventions. Our prototype is being developed to suppose remote access to data from ATF, PBX, and micro Vax data from Tore-Supra. We have attempted to create a flexible design which should accommodate data from other experiments as well

  15. Metacognitive Protocols: A Qualitative Study of Perceptions of "Smartness" of Adults and Children.

    Science.gov (United States)

    Morse, Linda W.; Smith-Mallette, Geraldine; Talento-Miller, Eileen

    Metacognition is a theoretical construct used to describe individuals' perceptions of their thinking processes and their own control over their thinking processes. This study examined the protocols of 78 undergraduates who responded to 3 questions from the Swanson Metacognitive Questionnaire: (1) What makes someone really smart? (2) How do…

  16. Research protocol for a digital intervention to reduce stigma among males with a personal experience of suicide in the Australian farming community.

    Science.gov (United States)

    Kennedy, Alison J; Versace, Vincent Lawrence; Brumby, Susan A

    2016-11-29

    Australian farming communities have up to twice the suicide rate of the general population. Men, particularly, demonstrate debilitating self- and perceived-stigma associated with an experience of suicide. The Ripple Effect is aimed to reduce suicide stigma within the social, cultural, geographical and psychological contexts in which it occurs. A mixed-method design with multi-level evaluation will be effected following the development and delivery of a personalised website experience (combining shared stories, education, personal goal setting and links to resources) to farming men, aged 30-64 years, with an experience of suicide. Pre- and post-surveys will be used to assess changes in self- and perceived-stigma and suicide literacy. Online feedback from participants and semi-structured interviews during follow-up will be thematically analysed. This project will provide information about increasingly accessible, innovative approaches to reducing the debilitating health and wellbeing effects of suicide stigma on a population of Australia's farmers. This research protocol was registered with the Australian New Zealand Clinical Trials Registry (ANZCTR) (ACTRN: ACTRN12616000289415 ) on 7 th March, 2016.

  17. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  18. Continuous sweep versus discrete step protocols for studying effects of wearable robot assistance magnitude.

    Science.gov (United States)

    Malcolm, Philippe; Rossi, Denise Martineli; Siviy, Christopher; Lee, Sangjun; Quinlivan, Brendan Thomas; Grimmer, Martin; Walsh, Conor J

    2017-07-12

    Different groups developed wearable robots for walking assistance, but there is still a need for methods to quickly tune actuation parameters for each robot and population or sometimes even for individual users. Protocols where parameters are held constant for multiple minutes have traditionally been used for evaluating responses to parameter changes such as metabolic rate or walking symmetry. However, these discrete protocols are time-consuming. Recently, protocols have been proposed where a parameter is changed in a continuous way. The aim of the present study was to compare effects of continuously varying assistance magnitude with a soft exosuit against discrete step conditions. Seven participants walked on a treadmill wearing a soft exosuit that assists plantarflexion and hip flexion. In Continuous-up, peak exosuit ankle moment linearly increased from approximately 0 to 38% of biological moment over 10 min. Continuous-down was the opposite. In Discrete, participants underwent five periods of 5 min with steady peak moment levels distributed over the same range as Continuous-up and Continuous-down. We calculated metabolic rate for the entire Continuous-up and Continuous-down conditions and the last 2 min of each Discrete force level. We compared kinematics, kinetics and metabolic rate between conditions by curve fitting versus peak moment. Reduction in metabolic rate compared to Powered-off was smaller in Continuous-up than in Continuous-down at most peak moment levels, due to physiological dynamics causing metabolic measurements in Continuous-up and Continuous-down to lag behind the values expected during steady-state testing. When evaluating the average slope of metabolic reduction over the entire peak moment range there was no significant difference between Continuous-down and Discrete. Attempting to correct the lag in metabolics by taking the average of Continuous-up and Continuous-down removed all significant differences versus Discrete. For kinematic and

  19. Registered nurses' clinical reasoning in home healthcare clinical practice: A think-aloud study with protocol analysis.

    Science.gov (United States)

    Johnsen, Hege Mari; Slettebø, Åshild; Fossum, Mariann

    2016-05-01

    The home healthcare context can be unpredictable and complex, and requires registered nurses with a high level of clinical reasoning skills and professional autonomy. Thus, additional knowledge about registered nurses' clinical reasoning performance during patient home care is required. The aim of this study is to describe the cognitive processes and thinking strategies used by recently graduated registered nurses while caring for patients in home healthcare clinical practice. An exploratory qualitative think-aloud design with protocol analysis was used. Home healthcare visits to patients with stroke, diabetes, and chronic obstructive pulmonary disease in seven healthcare districts in southern Norway. A purposeful sample of eight registered nurses with one year of experience. Each nurse was interviewed using the concurrent think-aloud technique in three different patient home healthcare clinical practice visits. A total of 24 home healthcare visits occurred. Follow-up interviews were conducted with each participant. The think-aloud sessions were transcribed and analysed using three-step protocol analysis. Recently graduated registered nurses focused on both general nursing concepts and concepts specific to the domains required and tasks provided in home healthcare services as well as for different patient groups. Additionally, participants used several assertion types, cognitive processes, and thinking strategies. Our results showed that recently graduated registered nurses used both simple and complex cognitive processes involving both inductive and deductive reasoning. However, their reasoning was more reactive than proactive. The results may contribute to nursing practice in terms of developing effective nursing education programmes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. A customised cold-water immersion protocol favours one-size-fits-all protocols in improving acute performance recovery

    NARCIS (Netherlands)

    Zandvoort, Coen S.; de Zwart, Jelmer R.; van Keeken, Brenda L.; Viroux, Patrick J.F.; Tiemessen, Ivo J.H.

    The purpose of the present study was to investigate whether a customised cold-water immersion (CWIc) protocol was more effective in enhancing acute performance recovery than a one-size-fits-all CWI (CWIs) or active recovery (AR) protocol. On three separate testing days, 10 healthy, physically

  1. The perils of straying from protocol: sampling bias and interviewer effects.

    Directory of Open Access Journals (Sweden)

    Carrie J Ngongo

    Full Text Available Fidelity to research protocol is critical. In a contingent valuation study in an informal urban settlement in Nairobi, Kenya, participants responded differently to the three trained interviewers. Interviewer effects were present during the survey pilot, then magnified at the start of the main survey after a seemingly slight adaptation of the survey sampling protocol allowed interviewers to speak with the "closest neighbor" in the event that no one was home at a selected household. This slight degree of interviewer choice led to inferred sampling bias. Multinomial logistic regression and post-estimation tests revealed that the three interviewers' samples differed significantly from one another according to six demographic characteristics. The two female interviewers were 2.8 and 7.7 times less likely to talk with respondents of low socio-economic status than the male interviewer. Systematic error renders it impossible to determine which of the survey responses might be "correct." This experience demonstrates why researchers must take care to strictly follow sampling protocols, consistently train interviewers, and monitor responses by interview to ensure similarity between interviewers' groups and produce unbiased estimates of the parameters of interest.

  2. Establishment and optimization of NMR-based cell metabonomics study protocols for neonatal Sprague-Dawley rat cardiomyocytes.

    Science.gov (United States)

    Zhang, Ming; Sun, Bo; Zhang, Qi; Gao, Rong; Liu, Qiao; Dong, Fangting; Fang, Haiqin; Peng, Shuangqing; Li, Famei; Yan, Xianzhong

    2017-01-15

    A quenching, harvesting, and extraction protocol was optimized for cardiomyocytes NMR metabonomics analysis in this study. Trypsin treatment and direct scraping cells in acetonitrile were compared for sample harvesting. The results showed trypsin treatment cause normalized concentration increasing of phosphocholine and metabolites leakage, since the trypsin-induced membrane broken and long term harvesting procedures. Then the intracellular metabolite extraction efficiency of methanol and acetonitrile were compared. As a result, washing twice with phosphate buffer, direct scraping cells and extracting with acetonitrile were chosen to prepare cardiomyocytes extracts samples for metabonomics studies. This optimized protocol is rapid, effective, and exhibits greater metabolite retention. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. Bee venom acupuncture for the treatment of chronic low back pain: study protocol for a randomized, double-blinded, sham-controlled trial.

    Science.gov (United States)

    Seo, Byung-Kwan; Lee, Jun-Hwan; Sung, Won-Suk; Song, Eun-Mo; Jo, Dae-Jean

    2013-01-14

    Chronic non-specific low back pain is the most common medical problem for which patients seek complementary and alternative medical treatment, including bee venom acupuncture. However, the effectiveness and safety of such treatments have not been fully established by randomized clinical trials. The aim of this study is to determine whether bee venom acupuncture is effective for improving pain intensity, functional status and quality of life of patients with chronic non-specific low back pain. This study is a randomized, double-blinded, sham-controlled clinical trial with two parallel arms. Fifty-four patients between 18 and 65 years of age with non-radicular chronic low back pain experiencing low back pain lasting for at least the previous three months and ≥ 4 points on a 10-cm visual analog scale for bothersomeness at the time of screening will be included in the study. Participants will be randomly allocated into the real or sham bee venom acupuncture groups and treated by the same protocol to minimize non-specific and placebo effects. Patients, assessors, acupuncturists and researchers who prepare the real or sham bee venom acupuncture experiments will be blinded to group allocation. All procedures, including the bee venom acupuncture increment protocol administered into predefined acupoints, are designed by a process of consensus with experts and previous researchers according to the Standards for Reporting Interventions in Clinical Trials of Acupuncture. Bothersomeness measured using a visual analogue scale will be the primary outcome. Back pain-related dysfunction, pain, quality of life, depressive symptoms and adverse experiences will be measured using the visual analogue scale for pain intensity, the Oswestry Disability Index, the EuroQol 5-Dimension, and the Beck's Depression Inventory. These measures will be recorded at baseline and 1, 2, 3, 4, 8 and 12 weeks. The results from this study will provide clinical evidence on the efficacy and safety of bee

  4. PREMEDICATION PROTOCOLS IN DENTAL PRACTICE IN ALLERGIC PATIENTS.

    OpenAIRE

    Angelina Kisselova; Adriana Krasteva; Assya Krasteva

    2011-01-01

    The problem with choosing a suitable pre-medication protocols before local anesthesia in dentistry in allergic patients is always discussed, as in the dental practice different schemes are already proven (3,5). The propose of this communication is to share the experience on those pre-medication schemes in allergic patients during and outside pollen season.

  5. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  6. Electrostatic protocol treatment lens. The purpose of this device is to transport Antiprotons from the new ELENA storage beam to all AD experiments. The electrostatic device was successfully tested in ASACUSA two weeks ago.

    CERN Multimedia

    Maximilien Brice

    2012-01-01

    Electrostatic protocol treatment lens. The purpose of this device is to transport Antiprotons from the new ELENA storage beam to all AD experiments. The electrostatic device was successfully tested in ASACUSA two weeks ago.

  7. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  8. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  9. THE NEED TO STUDY PROTOCOL IN HIGHER EDUCATION STUDIES OF SOCIAL CHARACTER

    Directory of Open Access Journals (Sweden)

    Ana Belén Fernández Souto

    2013-04-01

    Full Text Available It seems clear that globalization today reaches all areas of society, business and, of course, science and knowledge. The University cannot escape this reality and should strive more than ever, to train professionals to meet the daily challenges of a weak economy and total global markets. Is in this framework in which we intend to justify the need for senior school and college students to learn and acquire training related to international protocol, so they become competent in international negotiating, to know potential communication noises that may arise interacting with different cultures and to take advantage of resources and synergies for the success of the relationship, whether or not commercial. Thus, we propose a theoretical and practical justification of why senior school students related to social area must possess protocol knowledge to leave for the labor market better prepared and to get a higher real return from its formative stage.

  10. A longitudinal, multi-level comparative study of quality and safety in European hospitals: the QUASER study protocol

    Directory of Open Access Journals (Sweden)

    Weggelaar Anne-Marie

    2011-10-01

    Full Text Available Abstract Background although there is a wealth of information available about quality improvement tools and techniques in healthcare there is little understanding about overcoming the challenges of day-to-day implementation in complex organisations like hospitals. The 'Quality and Safety in Europe by Research' (QUASER study will investigate how hospitals implement, spread and sustain quality improvement, including the difficulties they face and how they overcome them. The overall aim of the study is to explore relationships between the organisational and cultural characteristics of hospitals and how these impact on the quality of health care; the findings will be designed to help policy makers, payers and hospital managers understand the factors and processes that enable hospitals in Europe to achieve-and sustain-high quality services for their patients. Methods/design in-depth multi-level (macro, meso and micro-system analysis of healthcare quality policies and practices in 5 European countries, including longitudinal case studies in a purposive sample of 10 hospitals. The project design has three major features: • a working definition of quality comprising three components: clinical effectiveness, patient safety and patient experience • a conceptualisation of quality as a human, social, technical and organisational accomplishment • an emphasis on translational research that is evidence-based and seeks to provide strategic and practical guidance for hospital practitioners and health care policy makers in the European Union. Throughout the study we will adopt a mixed methods approach, including qualitative (in-depth, narrative-based, ethnographic case studies using interviews, and direct non-participant observation of organisational processes and quantitative research (secondary analysis of safety and quality data, for example: adverse incident reporting; patient complaints and claims. Discussion the protocol is based on the premise that

  11. Studying Acute Coronary Syndrome Through the World Wide Web: Experiences and Lessons.

    Science.gov (United States)

    Alonzo, Angelo A

    2017-10-13

    This study details my viewpoint on the experiences, lessons, and assessments of conducting a national study on care-seeking behavior for heart attack in the United States utilizing the World Wide Web. The Yale Heart Study (YHS) was funded by the National Heart, Lung, and Blood Institute (NHLBI) of the National Institutes of Health (NIH). Grounded on two prior studies, the YHS combined a Web-based interview survey instrument; ads placed on the Internet; flyers and posters in public libraries, senior centers, and rehabilitation centers; information on chat rooms; a viral marketing strategy; and print ads to attract potential participants to share their heart attack experiences. Along the way, the grant was transferred from Ohio State University (OSU) to Yale University, and significant administrative, information technology, and personnel challenges ensued that materially delayed the study's execution. Overall, the use of the Internet to collect data on care-seeking behavior is very time consuming and emergent. The cost of using the Web was approximately 31% less expensive than that of face-to-face interviews. However, the quality of the data may have suffered because of the absence of some data compared with interviewing participants. Yet the representativeness of the 1154 usable surveys appears good, with the exception of a dearth of African American participants. ©Angelo A Alonzo. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 13.10.2017.

  12. An existential-phenomenological investigation of the experience of ...

    African Journals Online (AJOL)

    This study represents an existential-phenomenological investigation of the experience of being accepted in individuals who have undergone psychiatric institutionalization. Written protocols of narrative accounts were collected from nine individuals drawn from a partial hospitalization programme, with the analysis of these ...

  13. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  14. Greenberger-Horne-Zeilinger state protocols for fully connected qubit networks

    International Nuclear Information System (INIS)

    Galiautdinov, Andrei; Coffey, Mark W.; Deiotte, Ron

    2009-01-01

    We generalize the recently proposed Greenberger-Horne-Zeilinger tripartite protocol [A. Galiautdinov and J. M. Martinis, Phys. Rev. A 78, 010305(R) (2008)] to fully connected networks of weakly coupled qubits interacting by way of anisotropic Heisenberg exchange g(XX+YY)+g-tildeZZ. Our model differs from the more familiar Ising-Heisenberg chain in that here every qubit interacts with every other qubit in the circuit. The assumption of identical couplings on all qubit pairs allows an elegant proof of the protocol for arbitrary N. In order to further make contact with experiment, we study fidelity degradation due to coupling imperfections by numerically simulating the N=3 and 4 cases. Our simulations indicate that the best fidelity at unequal couplings is achieved when (a) the system is initially prepared in the uniform superposition state (similarly to how it is done in the ideal case) and (b) the entangling time and the final rotations on each of the qubits are appropriately adjusted.

  15. Implementing a protocol for selection and prioritisation of organic ...

    African Journals Online (AJOL)

    2012-07-09

    Jul 9, 2012 ... To safeguard drinking water industry customers, it was necessary to develop a generic protocol to assist with ... This is a very important guide to assist water utilities in optimising their resources while not ..... views and experience of the various experts. ...... wastewater by an innovative biological technology.

  16. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    Science.gov (United States)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  17. Study protocol for a pragmatic randomised controlled trial evaluating efficacy of a smoking cessation e-'Tabac Info Service': ee-TIS trial.

    Science.gov (United States)

    Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F

    2017-02-24

    A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. NCT02841683; Pre-results. Published by the BMJ Publishing Group Limited. For

  18. Protocol of study and pursuit of the radioinduced burns; Protocolo de estudio y seguimiento de las quemaduras radioinducidas

    Energy Technology Data Exchange (ETDEWEB)

    Portas, Mercedes; Glustein, Daniel; Pomerane, Armando; Peragallo, Mabel; Guzman, Alejandra; Ciordia, Irma [Hospital de Quemados de Buenos Aires (Argentina). Comite de Radiopatologia; Genovese, Jorge [Laboratorio Craveri, Buenos Aires (Argentina). Dept. de Ingenieria de Tejidos; Cymberknoh, Manuel [Centro de Investigaciones Mamarias, Buenos Aires (Argentina). Dept. de Teletermografia; Dubner, Diana; Michelin, Severino; Perez, Maria del Rosario; Trano, Jose Luis Di; Gisone, Pablo [Autoridad Regulatoria Nuclear, Buenos Aires (Argentina). Lab. de Radiopatologia

    2001-07-01

    A study of localized overexposures based on local experience and international criteria is being carried out within the framework of a cooperation agreement between the Buenos Aires Burned Hospital and the Nuclear Regulatory Authority. This protocol was designed considering separately acute and chronic reactions, including the following aspects: patient reception: clinical findings, laboratory tests, photographic recording, and multidisciplinary evaluation; dose reconstruction: evaluation of the dose distribution by biophysical and biological procedures; extension and depth estimation: telethermography, computed tomography, magnetic resonance, radioisotopic procedures, capillaroscopy and percutaneous oxymetry; therapeutic strategies: pain treatment, prevention of infections, systemic administration of pentoxiphyllin and alpha-tocopherol, local application of trolamine and antioxidants, prevention and treatment of radioinduced fibrosis. When it is indicated, surgical treatment includes partial or total excision followed by covering by graft or flap. The application of tissue-engineering techniques will be considered. Study of individual radiosensitivity: evaluation of apoptosis in peripheral lymphocytes and clonogenic assays in dermal fibroblasts 'in vitro' irradiated. (author)

  19. Implementation of a Hydrotherapy Protocol to Improve Postpartum Pain Management.

    Science.gov (United States)

    Batten, Meghann; Stevenson, Eleanor; Zimmermann, Deb; Isaacs, Christine

    2017-03-01

    A growing number of women are seeking alternatives to traditional pharmacologic pain management during birth. While there has been an extensive array of nonpharmacologic options developed for labor, there are limited offerings in the postpartum period. The purpose of this quality improvement project was to implement a hydrotherapy protocol in the early postpartum period to improve pain management for women choosing a nonmedicated birth. The postpartum hydrotherapy protocol was initiated in a certified nurse-midwife (CNM) practice in an urban academic medical center. All women who met criteria were offered a 30-minute warm water immersion bath at one hour postpartum. Pain scores were assessed prior to the bath, at 15 minutes after onset, and again at the conclusion (30 minutes). Women who completed the bath were also asked to complete a brief survey on their experience with postpartum hydrotherapy. In women who used the bath (N = 45), there was a significant reduction in pain scores (P hydrotherapy protocol as an alternative or adjunct to medication for early postpartum pain management that significantly reduced pain and improved the birth experience for those who used it. It offers a nonpharmacologic alternative where there have traditionally been limited options. © 2017 by the American College of Nurse-Midwives.

  20. Application of low-dose radiation protocols in survey CT scans

    International Nuclear Information System (INIS)

    Fu Qiang; Liu Ting; Lu Tao; Xu Ke; Zhang Lin

    2009-01-01

    Objective: To characterize the protocols with low-dose radiation in survey CT scans for localization. Methods: Eighty standard adult patients, head and body phantoms were recruited. Default protocols provided by operator's manual setting were that all the tube voltage for head, chest, abdomen and lumbar was 120 kV; the tube currents were 20,10,20 and 40 mA, respectively. Values of kV and mA in the low-dose experiments were optimized according to the device options. For chest and abdomen, the tube position were compared between default (0 degree) and 180 degree. Phantoms were scanned with above protocols, and the radiation doses were measured respectively. Paired t-test were used for comparisons of standard deviation in CT value, noise and exposure surface dose (ESD) between group with default protocols and group with optimized protocols. Results: The optimized protocols in low-dose CT survey scans were 80 kV, 10 mA for head, 80 kV, 10 mA for chest, 80 kV, 10 mA for abdomen and 100 kV, 10 mA for lumbar. The values of ESD for phantom scan in default and optimized protocols were 0.38 mGy/0.16 mGy in head, 0.30 mGy/0.20 mGy in chest, 0.74 mGy/0.30 mGy in abdomen and 0.81 mGy/0.44 mGy in lumbar, respectively. Compared with default protocols, the optimized protocols reduced the radiation doses 59%, 33%, 59% and 46% in head, chest, abdomen and lumbar. When tube position changed from 0 degree to 180 degree, the ESD were 0.24 mGy/0.20 mGy for chest; 0.37 mGy/0.30 mGy for abdomen, and the radiation doses were reduced 20% and 17%. Conclusion: A certain amount of image noise is increased in low-dose protocols, but image quality is still acceptable without problem in CT localization. The reduction of radiation dose and the radiation harm to patients are the superiority. (authors)

  1. Pilot studies for the North American Soil Geochemical Landscapes Project - Site selection, sampling protocols, analytical methods, and quality control protocols

    Science.gov (United States)

    Smith, D.B.; Woodruff, L.G.; O'Leary, R. M.; Cannon, W.F.; Garrett, R.G.; Kilburn, J.E.; Goldhaber, M.B.

    2009-01-01

    In 2004, the US Geological Survey (USGS) and the Geological Survey of Canada sampled and chemically analyzed soils along two transects across Canada and the USA in preparation for a planned soil geochemical survey of North America. This effort was a pilot study to test and refine sampling protocols, analytical methods, quality control protocols, and field logistics for the continental survey. A total of 220 sample sites were selected at approximately 40-km intervals along the two transects. The ideal sampling protocol at each site called for a sample from a depth of 0-5 cm and a composite of each of the O, A, and C horizons. The Ca, Fe, K, Mg, Na, S, Ti, Ag, As, Ba, Be, Bi, Cd, Ce, Co, Cr, Cs, Cu, Ga, In, La, Li, Mn, Mo, Nb, Ni, P, Pb, Rb, Sb, Sc, Sn, Sr, Te, Th, Tl, U, V, W, Y, and Zn by inductively coupled plasma-mass spectrometry and inductively coupled plasma-atomic emission spectrometry following a near-total digestion in a mixture of HCl, HNO3, HClO4, and HF. Separate methods were used for Hg, Se, total C, and carbonate-C on this same size fraction. Only Ag, In, and Te had a large percentage of concentrations below the detection limit. Quality control (QC) of the analyses was monitored at three levels: the laboratory performing the analysis, the USGS QC officer, and the principal investigator for the study. This level of review resulted in an average of one QC sample for every 20 field samples, which proved to be minimally adequate for such a large-scale survey. Additional QC samples should be added to monitor within-batch quality to the extent that no more than 10 samples are analyzed between a QC sample. Only Cr (77%), Y (82%), and Sb (80%) fell outside the acceptable limits of accuracy (% recovery between 85 and 115%) because of likely residence in mineral phases resistant to the acid digestion. A separate sample of 0-5-cm material was collected at each site for determination of organic compounds. A subset of 73 of these samples was analyzed for a suite of

  2. A Push-pull Protocol to Reduce Colonization of Bird Nest Boxes by Honey Bees.

    Science.gov (United States)

    Efstathion, Caroline A; Kern, William H

    2016-09-04

    Introduction of the invasive Africanized honey bee (AHB) into the Neotropics is a serious problem for many cavity nesting birds, specifically parrots. These bees select cavities that are suitable nest sites for birds, resulting in competition. The difficulty of removing bees and their defensive behavior makes a prevention protocol necessary. Here, we describe a push-pull integrated pest management protocol to deter bees from inhabiting bird boxes by applying a bird safe insecticide, permethrin, to repel bees from nest boxes, while simultaneously attracting them to pheromone-baited swarm traps. Shown here is an example experiment using Barn Owl nest boxes. This protocol successfully reduced colonization of Barn Owl nest boxes by Africanized honey bees. This protocol is flexible, allowing adjustments to accommodate a wide range of bird species and habitats. This protocol could benefit conservation efforts where AHB are located.

  3. An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Lauritsen, Rasmus; Toft, Tomas

    2014-01-01

    Recent developments in Multi-party Computation (MPC) has resulted in very efficient protocols for dishonest majority in the preprocessing model. In particular, two very promising protocols for Boolean circuits have been proposed by Nielsen et al. (nicknamed TinyOT) and by Damg˚ard and Zakarias...... suggest a modification of MiniMac that achieves increased parallelism at no extra communication cost. This gives an asymptotic improvement of the original protocol as well as an 8-fold speed-up of our implementation. We compare the resulting protocol to TinyOT for the case of secure computation in parallel...... of a large number of AES encryptions and find that it performs better than results reported so far on TinyOT, on the same hardware.p...

  4. Beyond communication: the role of standardized protocols in a changing health care environment.

    Science.gov (United States)

    Vardaman, James M; Cornell, Paul; Gondo, Maria B; Amis, John M; Townsend-Gervis, Mary; Thetford, Carol

    2012-01-01

    Communication errors have grave consequences in health care settings. The situation-background-assessment-recommendation (SBAR) protocol has been theorized to improve communication by creating a common language between nurses and physicians in acute care situations. This practice is gaining acceptance across the health care field. However, as yet, there has been little investigation of the ways in which SBAR may have an impact on how health care professionals operate beyond the creation of a common language. The purposes of the study were to explore the implementation of the SBAR protocol and investigate the potential impact of SBAR on the day-to-day experiences of nurses. We performed a qualitative case study of 2 hospitals that were implementing the SBAR protocol. We collected data from 80 semistructured interviews with nurses, nurse manager, and physicians; observation of nursing and other hospital activities; and documents that pertained to the implementation of the SBAR protocol. Data were analyzed using a thematic approach. Our analysis revealed 4 dimensions of impact that SBAR has beyond its use as a communication tool: schema formation, development of legitimacy, development of social capital, and reinforcement of dominant logics. The results indicate that SBAR may function as more than a tool to standardize communication among nurses and physicians. Rather, the findings indicate that SBAR may aid in schema development that allows rapid decision making by nurses, provide social capital and legitimacy for less-tenured nurses, and reinforce a move toward standardization in the nursing profession. Our findings further suggest that standardized protocols such as SBAR may be a cost-effective method for hospital managers and administrators to accelerate the socialization of nurses, particularly new hires.

  5. Using salivary cortisol to measure the effects of a Wilbarger protocol-based procedure on sympathetic arousal: a pilot study.

    Science.gov (United States)

    Kimball, Judith G; Lynch, Keara M; Stewart, Kelli C; Williams, Nicole E; Thomas, Meghan A; Atwood, Kam D

    2007-01-01

    This study investigated changes in salivary cortisol, the stress hormone, after administration of a procedure based on the Wilbarger protocol to children diagnosed with sensory defensiveness (SD), a type of sensory modulation dysfunction. Using a single-subject design across participants, we studied 4 boys with SD ages 3 to 5 years. Each participant completed four sessions consisting of the collection of a saliva sample, administration of a procedure based on the Wilbarger protocol, 15 min of quiet neutral activities to allow time for any changes in cortisol level to manifest in the saliva, and the second collection of saliva. Saliva samples were analyzed using enzyme-linked immunosorbent assay (ELISA). Salivary cortisol levels in all participants changed after each of four applications of a procedure based on the Wilbarger protocol. The cortisol levels of 2 children whose levels were relatively higher on pretest decreased at each posttest. The levels of 1 child whose cortisol was higher on pretest three times decreased those three times and increased the one time the pretest cortisol was lower. The levels of 1 child who had the lowest cortisol levels of any of the children increased each time. Therefore, in all participants, cortisol moved in the direction of modulation. In these 4 boys, a procedure based on the Wilbarger protocol modulated cortisol levels toward a middle range. This pilot study indicates that there is an association between sympathetic nervous system response and the Wilbarger protocol-based procedure, as indicated by salivary cortisol levels.

  6. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  7. Dynamic federations: storage aggregation using open tools and protocols

    CERN Document Server

    Fabrizio Furano, F F; Ricardo Brito da Rocha, R R; Adrien Devresse, A D; Oliver Keeble, O K; Alejandro Alvarez Ayllon, A A

    2012-01-01

    A number of storage elements now offer standard protocol interfaces like NFS 4.1/pNFS and WebDAV, for access to their data repositories, in line with the standardization effort of the European Middleware Initiative (EMI). Also the LCG FileCatalogue (LFC) can offer such features. Here we report on work that seeks to exploit the federation potential of these protocols and build a system that offers a unique view of the storage and metadata ensemble and the possibility of integration of other compatible resources such as those from cloud providers. The challenge, here undertaken by the providers of dCache and DPM, and pragmatically open to other Grid and Cloud storage solutions, is to build such a system while being able to accommodate name translations from existing catalogues (e.g. LFCs), experiment- based metadata catalogues, or stateless algorithmic name translations, also known as ”trivial file catalogues”. Such so-called storage federations of standard protocols-based storage elements give a unique vie...

  8. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  9. Performance of a multi-disciplinary emergency department observation protocol for acetaminophen overdose.

    Science.gov (United States)

    Beauchamp, Gillian A; Hart, Kimberly W; Lindsell, Christopher J; Lyons, Michael S; Otten, Edward J; Smith, Carol L; Ward, Michael J; Wright, Stewart W

    2013-09-01

    The availability of 20-h N-acetylcysteine (NAC) infusion for low-risk acetaminophen (APAP) overdose enabled our center to implement an Emergency Department observation unit (OU) protocol as an alternative to hospitalization. Our objective was to evaluate our early experience with this protocol. This retrospective cohort study included all patients treated for low-risk APAP overdose in our academic hospital between 2006 and 2011. Cases were identified using OU and pharmacy records. Successful OU discharge was defined as disposition with no inpatient admission. Differences in medians with 95 % confidence intervals were used for comparisons. One hundred ninety-six patients received NAC for APAP overdose with a mean age of 35 years (SD 14); 73 % were white, and 43 % were male. Twenty (10 %) received care in the OU; 3/20(15 %) met criteria for inclusion in the OU protocol and 13/20(65 %) were discharged successfully. Out of the 196 patients, 10 met criteria for inclusion in the OU protocol but instead received care in the inpatient setting. The median total length of stay from presentation to ED discharge was 41 h for all patients treated in the OU, compared to 68 h for ten patients who met criteria for inclusion in the OU protocol but who were admitted (difference 27 h, 95 % CI 18-72 h). ED observation for APAP overdose can be a viable alternative to inpatient admission. Most patients were successfully discharged from the OU. This evaluation identified both over- and under-utilization of the OU. OU treatment resulted in shorter median length of stay than inpatient admission.

  10. Impact of CO2 injection protocol on fluid-solid reactivity: high-pressure and temperature microfluidic experiments in limestone

    Science.gov (United States)

    Jimenez-Martinez, Joaquin; Porter, Mark; Carey, James; Guthrie, George; Viswanathan, Hari

    2017-04-01

    Geological sequestration of CO2 has been proposed in the last decades as a technology to reduce greenhouse gas emissions to the atmosphere and mitigate the global climate change. However, some questions such as the impact of the protocol of CO2 injection on the fluid-solid reactivity remain open. In our experiments, two different protocols of injection are compared at the same conditions (8.4 MPa and 45 C, and constant flow rate 0.06 ml/min): i) single phase injection, i.e., CO2-saturated brine; and ii) simultaneous injection of CO2-saturated brine and scCO2. For that purpose, we combine a unique high-pressure/temperature microfluidics experimental system, which allows reproducing geological reservoir conditions in geo-material substrates (i.e., limestone, Cisco Formation, Texas, US) and high resolution optical profilometry. Single and multiphase flow through etched fracture networks were optically recorded with a microscope, while processes of dissolution-precipitation in the etched channels were quantified by comparison of the initial and final topology of the limestone micromodels. Changes in hydraulic conductivity were quantified from pressure difference along the micromodel. The simultaneous injection of CO2-saturated brine and scCO2, reduced the brine-limestone contact area and also created a highly heterogeneous velocity field (i.e., low velocities regions or stagnation zones, and high velocity regions or preferential paths), reducing rock dissolution and enhancing calcite precipitation. The results illustrate the contrasting effects of single and multiphase flow on chemical reactivity and suggest that multiphase flow by isolating parts of the flow system can enhance CO2 mineralization.

  11. Breaking bad news in clinical setting - health professionals' experience and perceived competence in Southwestern Nigeria: a cross sectional study.

    Science.gov (United States)

    Adebayo, Philip Babatunde; Abayomi, Olukayode; Johnson, Peter O; Oloyede, Taofeeq; Oyelekan, Abimbola A A

    2013-01-01

    Communication skills are vital in clinical settings because the manner in which bad news is delivered could be a huge determinant of responses to such news; as well as compliance with beneficial treatment option. Information on training, institutional guidelines and protocols for breaking bad news (BBN) is scarce in Nigeria. We assessed the training, experience and perceived competence of BBN among medical personnel in southwestern Nigeria. The study was a cross-sectional descriptive study conducted out among doctors and nurses in two healthcare institutions in southwestern Nigeria using an anonymous questionnaire (adapted from the survey by Horwitz et al.), which focused on the respondents training, awareness of protocols in BBN; and perceived competence (using a Five-Point Likert Scale) in five clinical scenarios. We equally asked the respondents about an instance of BBN they have recently witnessed. A total of 113 of 130 selected (response rate 86.9%) respondents were studied. Eight (7.1%) of the respondents knew of the guidelines on BBN in the hospital in which they work. Twenty-three (20.3%) respondents claimed knowledge of a protocol. The median perceived competence rating was 4 out of 5 in all the clinical scenarios. Twenty-five (22.1%) respondents have had a formal training in BBN and they generally had significant higher perceived competence rating (P = 0.003-0.021). There is poor support from fellow workers during instances of BBN. It appears that the large proportion of the respondents in this study were unconsciously incompetent in BBN in view of the low level of training and little or no knowledge of well known protocols for BBN even though self-rated competence is high. Continuous medical education in communication skills among health personnel in Nigeria is advocated.

  12. Gender-Specific Combination HIV Prevention for Youth in High-Burden Settings: The MP3 Youth Observational Pilot Study Protocol.

    Science.gov (United States)

    Buttolph, Jasmine; Inwani, Irene; Agot, Kawango; Cleland, Charles M; Cherutich, Peter; Kiarie, James N; Osoti, Alfred; Celum, Connie L; Baeten, Jared M; Nduati, Ruth; Kinuthia, John; Hallett, Timothy B; Alsallaq, Ramzi; Kurth, Ann E

    2017-03-08

    Nearly three decades into the epidemic, sub-Saharan Africa (SSA) remains the region most heavily affected by human immunodeficiency virus (HIV), with nearly 70% of the 34 million people living with HIV globally residing in the region. In SSA, female and male youth (15 to 24 years) are at a disproportionately high risk of HIV infection compared to adults. As such, there is a need to target HIV prevention strategies to youth and to tailor them to a gender-specific context. This protocol describes the process for the multi-staged approach in the design of the MP3 Youth pilot study, a gender-specific, combination, HIV prevention intervention for youth in Kenya. The objective of this multi-method protocol is to outline a rigorous and replicable methodology for a gender-specific combination HIV prevention pilot study for youth in high-burden settings, illustrating the triangulated methods undertaken to ensure that age, sex, and context are integral in the design of the intervention. The mixed-methods, cross-sectional, longitudinal cohort pilot study protocol was developed by first conducting a systematic review of the literature, which shaped focus group discussions around prevention package and delivery options, and that also informed age- and sex- stratified mathematical modeling. The review, qualitative data, and mathematical modeling created a triangulated evidence base of interventions to be included in the pilot study protocol. To design the pilot study protocol, we convened an expert panel to select HIV prevention interventions effective for youth in SSA, which will be offered in a mobile health setting. The goal of the pilot study implementation and evaluation is to apply lessons learned to more effective HIV prevention evidence and programming. The combination HIV prevention package in this protocol includes (1) offering HIV testing and counseling for all youth; (2) voluntary medical circumcision and condoms for males; (3) pre-exposure prophylaxis (Pr

  13. A Pilot Study on the effects of Music Therapy on Frontotemporal Dementia - developing a research protocol

    DEFF Research Database (Denmark)

    Ridder, Hanne Mette Ochsner; Wigram, Tony; Ottesen, Anne Marie

    2009-01-01

    , and pharmacological treatment of the psychiatric symptoms is difficult, requiring specialist proficiency in the field. Pilot study: As there is not yet sufficient research that examines the effects of non-pharmacologic treatment with this group there is a need to develop valid and reliable research protocols....... As an example of a non-pharmacologic treatment procedure music therapy was investigated. With the focus to develop a research protocol for a future larger population study a pilot study was carried out. In two case studies a combination of data collection methods were examined with the overall goal to document...... changes in intersubjectivity. In this pilot testing there was a specific interest in selecting a relevant and manageable dementia specific instrument for measuring quality of life and relating it with other instruments. Following three instruments were tested: the Altzheimers Disease-Related Quality...

  14. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  15. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  16. Decellularization and Delipidation Protocols of Bovine Bone and Pericardium for Bone Grafting and Guided Bone Regeneration Procedures.

    Directory of Open Access Journals (Sweden)

    Chiara Gardin

    Full Text Available The combination of bone grafting materials with guided bone regeneration (GBR membranes seems to provide promising results to restore bone defects in dental clinical practice. In the first part of this work, a novel protocol for decellularization and delipidation of bovine bone, based on multiple steps of thermal shock, washes with detergent and dehydration with alcohol, is described. This protocol is more effective in removal of cellular materials, and shows superior biocompatibility compared to other three methods tested in this study. Furthermore, histological and morphological analyses confirm the maintenance of an intact bone extracellular matrix (ECM. In vitro and in vivo experiments evidence osteoinductive and osteoconductive properties of the produced scaffold, respectively. In the second part of this study, two methods of bovine pericardium decellularization are compared. The osmotic shock-based protocol gives better results in terms of removal of cell components, biocompatibility, maintenance of native ECM structure, and host tissue reaction, in respect to the freeze/thaw method. Overall, the results of this study demonstrate the characterization of a novel protocol for the decellularization of bovine bone to be used as bone graft, and the acquisition of a method to produce a pericardium membrane suitable for GBR applications.

  17. Continuous-variable protocol for oblivious transfer in the noisy-storage model

    DEFF Research Database (Denmark)

    Furrer, Fabian; Gehring, Tobias; Schaffner, Christian

    2018-01-01

    for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we...... derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced...

  18. Workshop to promote the ratification of the protocol on heavy metals across the entire UN ECE region

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-12-15

    Within the workshop of the German Federal Environment Agency (Dessau-Rosslau, Federal Republic of Germany) at 14th to 16th May, 2008 in Yerevan (Armenia), the following lectures were held: (1) The convention and its protocols - framework and requirements (Tea Aulavuo); (2) Development of the heavy metals protocol up to now (D. Jost); (3) Experiences in transposing the obligations of the HM protocol into national law (Ivan Angelov); (4) Evaluation of concentrations of air pollutants and depositions of HM over the EECCA region (Ilia Ilyin); (5) The effectiveness of the HM protocol - emission reductions and costs (TNO-study) (M. van het Bolscher); (6) Technologies and techniques and their emission reduction potential and costs (Andre Peeters Weem); (7) Synergies of reduction of HM and particulate matter (Katja Kraus); (8) Critical loads / critical levels and effects of HM - integrated assessment (Jean-Paul Hettelingh); (9) Additional technical measures / options and their reduction potential (M. van het Bolscher); (10) Overview of the situation in the EECCA region - evaluation of a questionnaire of the Secretariat of the LRTAP Convention and ideas on revising the protocol and its annexes (Johan Sliggers); (11) Future aims of the TF (Katja Kraus).

  19. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  20. Formal Test Automation: The Conference Protocol with PHACT

    NARCIS (Netherlands)

    Heerink, A.W.; Ural, Hasan; Probert, Robert L.; Feenstra, J.; Tretmans, G.J.; von Bochmann, Gregor

    2000-01-01

    We discuss a case study of automatic test generation and test execution based on formal methods. The case is the Conference Protocol, a simple, chatbox-like protocol, for which (formal) specifications and multiple implementations are publicly available and which is also used in other case study

  1. Protocol for the building construction process. Results of the implementation trajectory protocols EWN and EUN; Opnameprotocol versterkt bouwkolom. Resultaten implementatietraject opnameprotocollen EWN en EUN

    Energy Technology Data Exchange (ETDEWEB)

    Neeleman, J.; Uitbeijerse, G.C.M. [DWA installatie- en energieadvies, Duitslandweg 4, Postbus 274, 2410 AG Bodegraven (Netherlands)

    2013-04-15

    In the year 2012 it was foreseen to base the energy label for new buildings on the Energy Efficiency Coefficient (EPC in Dutch). This is a protocol for residential and utility buildings, with the aim to check whether and to what extent buildings were constructed according the EPC and to determine the realized EPC. In order to gain experience with the new protocols and the voluntary ventilation test the Protocol for the Energy Label for New Houses (EWN in Dutch) and the Protocol for the Energy Label for New Utility Buildings (EUN in Dutch) were conducted in 12 newly built housing projects and 5 projects in the utility building sector [Dutch] In het jaar 2012 was voorzien om het nieuwbouwlabel te baseren op de EPC (Energie Prestatie Coefficient). Hiervoor is een opnameprotocol opgesteld voor de woningbouw en de utiliteitsbouw, met als doel te controleren of en in hoeverre conform de EPC is gebouwd en om de gerealiseerde EPC te bepalen. Om ervaring op te doen met de nieuwe opnameprotocollen en de vrijwillige ventilatietoets werden het Opnameprotocol Energielabel Woningen Nieuwbouw (EWN) en Opnameprotocol Energielabel Utiliteitsgebouwen Nieuwbouw (EUN) uitgevoerd bij 12 nieuwbouwprojecten in de woningbouw en 5 projecten in de utiliteitsbouw.

  2. Research protocol for a digital intervention to reduce stigma among males with a personal experience of suicide in the Australian farming community

    Directory of Open Access Journals (Sweden)

    Alison J. Kennedy

    2016-11-01

    Full Text Available Abstract Background Australian farming communities have up to twice the suicide rate of the general population. Men, particularly, demonstrate debilitating self- and perceived-stigma associated with an experience of suicide. The Ripple Effect is aimed to reduce suicide stigma within the social, cultural, geographical and psychological contexts in which it occurs. Methods A mixed-method design with multi-level evaluation will be effected following the development and delivery of a personalised website experience (combining shared stories, education, personal goal setting and links to resources to farming men, aged 30–64 years, with an experience of suicide. Pre- and post-surveys will be used to assess changes in self- and perceived-stigma and suicide literacy. Online feedback from participants and semi-structured interviews during follow-up will be thematically analysed. Discussion This project will provide information about increasingly accessible, innovative approaches to reducing the debilitating health and wellbeing effects of suicide stigma on a population of Australia’s farmers. Trial registration This research protocol was registered with the Australian New Zealand Clinical Trials Registry (ANZCTR (ACTRN: ACTRN12616000289415 on 7th March, 2016.

  3. Reproductive studies with the anti-inflammatory agent, piroxicam: modification of classical protocols.

    Science.gov (United States)

    Perraud, J; Stadler, J; Kessedjian, M J; Monro, A M

    1984-02-14

    Reproductive toxicology studies were conducted in rabbits and rats given piroxicam, a non-steroidal anti-inflammatory agent (NSAI), orally at 2, 5 and 10 mg/kg/day. In teratology studies there was neither drug-related embryotoxicity nor teratogenicity. As piroxicam, like other NSAI, affects parturition in rats and leads to a progressive toxicity in lactating females, standard protocols were modified: dams of the female fertility study were treated from 2 weeks prior to mating until day 6 of gestation and females of the post-natal toxicity study were treated from parturition until day 12 of lactation. No other adverse effects on reproduction, fertility and postnatal development were observed.

  4. Research Paper: Production of A Protocol on Early Intervention for Speech and Language Delays in Early Childhood: An Novice Experience in Iran

    Directory of Open Access Journals (Sweden)

    Roshanak Vameghi

    2016-01-01

    Results The result of this study is presented as 7 intervention packages, including the following domains of disorders: prelingual lingual speech and language hearing impairment, speech sound, dysphagia, stuttering, and dysarthria  Conclusion Most studies have confirmed the effectiveness and need for early interventions for children with speech and language impairment. However, most do not explain the details of these interventions. Before the present study, no systematic and evidence-based protocol existed for early intervention in childhood speech and language impairments, in Iran; and due to language differences, as well as possible differences in the speech and language developmental process of children of different communities, making direct use of non-Persian references was not possible and effective. Thus, there was a clear demand for the production of such a protocol.

  5. Longitudinal measurement of cortisol in association with mental health and experience of domestic violence and abuse: study protocol.

    Science.gov (United States)

    Lokhmatkina, Natalia V; Feder, Gene; Blake, Sarah; Morris, Richard; Powers, Victoria; Lightman, Stafford

    2013-07-13

    Domestic violence and abuse is threatening behavior, violence/abuse used by one person to control the other within an intimate or family-type relationship. Women experience more severe physical and sexual domestic violence and abuse and more mental health consequences than men. The current study aims at exploring of the role of hypothalamic-pituitary-adrenocortical axis activity in abuse impact on women's mental health. 1) To evaluate diurnal cortisol slope, cortisol awakening response, and the mean cortisol concentration in women with a current or recent experience of abuse; 2) To estimate whether cortisol secretion is associated with type, severity, duration and cessation of abuse; 3) To investigate whether cortisol acts as mediator between abuse and mental health condition; 4) To examine whether there is any distinction in cortisol levels between those women exposed to both childhood abuse and domestic violence and abuse and those experienced only the latter. 4) To explore whether cortisol secretion differs between women living in refuge and those still living in the community. To meet study objectives 128 women will be recruited in a domestic violence agency and local communities. Baseline and 3-month follow-up measures will be taken over 6 months after recruitment. Each assessment will include: (1) standardized self-administered questionnaires to evaluate socio-demographics, experience of violence and abuse, mental and physical health; (2) weight and height measurement; (3) self-completion of wakening, post-wakening and evening saliva samples. Saliva will be analysed for cortisol and cortisone using Ultra performance liquid chromatography-tandem mass spectrometry. We will compare diurnal cortisol parameters between non-abused controls and abuse survivors with and without mental health conditions. First following descriptive statistics for all the cortisol and mental health outcomes, relationships between them will be investigated using appropriate regression

  6. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  7. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  8. THE INFLUENCE OF PRIOR EXPERIENCE ON THE CONSTRUCTION OF SCORING CRITERIA FOR ESL COMPOSITIONS: A CASE STUDY

    Directory of Open Access Journals (Sweden)

    M. Usman Erdosy

    2001-12-01

    Full Text Available Before a principled explanation of variability in raters' judgements of ESL compositions can be offered, the process of constructing scoring criteria and the manner in which prior experience enters this process must be analyzed. Therefore, utilizing protocol and intewiew data collected in the context of a comparative study, a case study will describe how one experienced rater dealt with the following operations while assessing a corpus of 60 TOEFL essays: establishing the purpose of assessment, developing a reading strategy to deal with a corpus of essays, and collecting context-specific information. Within each operation, the influence of background variables such as teaching and assessment experience will be examined, particularly on determining what type of information to collect, and on articulating expectations concerning test takers, test scores and the textual qualities of essays. The results of the study will be used to specific directions for future research into explaining inter-rater variability.

  9. Design and utilisation of protocols to characterise dynamic PET uptake of two tracers using basis pursuit

    Science.gov (United States)

    Bell, Christopher; Puttick, Simon; Rose, Stephen; Smith, Jye; Thomas, Paul; Dowson, Nicholas

    2017-06-01

    Imaging using more than one biological process using PET could be of great utility, but despite previously proposed approaches to dual-tracer imaging, it is seldom performed. The alternative of performing multiple scans is often infeasible for clinical practice or even in research studies. Dual-tracer PET scanning allows for multiple PET radiotracers to be imaged within the same imaging session. In this paper we describe our approach to utilise the basis pursuit method to aid in the design of dual-tracer PET imaging experiments, and later in separation of the signals. The advantage of this approach is that it does not require a compartment model architecture to be specified or even that both signals are distinguishable in all cases. This means the method for separating dual-tracer signals can be used for many feasible and useful combinations of biology or radiotracer, once an appropriate scanning protocol has been decided upon. Following a demonstration in separating the signals from two consecutively injected radionuclides in a controlled experiment, phantom and list-mode mouse experiments demonstrated the ability to test the feasibility of dual-tracer imaging protocols for multiple injection delays. Increases in variances predicted for kinetic macro-parameters V D and K I in brain and tumoral tissue were obtained when separating the synthetically combined data. These experiments confirmed previous work using other approaches that injections delays of 10-20 min ensured increases in variance were kept minimal for the test tracers used. On this basis, an actual dual-tracer experiment using a 20 min delay was performed using these radio tracers, with the kinetic parameters (V D and K I) extracted for each tracer in agreement with the literature. This study supports previous work that dual-tracer PET imaging can be accomplished provided certain constraints are adhered to. The utilisation of basis pursuit techniques, with its removed need to specify a model

  10. Experiments with Rydberg atoms on a current-carrying atom chip

    NARCIS (Netherlands)

    Cisternas San Martín, N.V.

    2018-01-01

    On one side, atom-chip experiments have demonstrated to be a versatile tool to study quantum physics in cold atoms systems. On the other side, Rydberg atoms have exaggerated properties that makes them good candidates to study quantum information and quantum simulations protocols. In this thesis both

  11. Automated extraction protocol for quantification of SARS-Coronavirus RNA in serum: an evaluation study

    Directory of Open Access Journals (Sweden)

    Lui Wing-bong

    2006-02-01

    Full Text Available Abstract Background We have previously developed a test for the diagnosis and prognostic assessment of the severe acute respiratory syndrome (SARS based on the detection of the SARS-coronavirus RNA in serum by real-time quantitative reverse transcriptase polymerase chain reaction (RT-PCR. In this study, we evaluated the feasibility of automating the serum RNA extraction procedure in order to increase the throughput of the assay. Methods An automated nucleic acid extraction platform using the MagNA Pure LC instrument (Roche Diagnostics was evaluated. We developed a modified protocol in compliance with the recommended biosafety guidelines from the World Health Organization based on the use of the MagNA Pure total nucleic acid large volume isolation kit for the extraction of SARS-coronavirus RNA. The modified protocol was compared with a column-based extraction kit (QIAamp viral RNA mini kit, Qiagen for quantitative performance, analytical sensitivity and precision. Results The newly developed automated protocol was shown to be free from carry-over contamination and have comparable performance with other standard protocols and kits designed for the MagNA Pure LC instrument. However, the automated method was found to be less sensitive, less precise and led to consistently lower serum SARS-coronavirus concentrations when compared with the column-based extraction method. Conclusion As the diagnostic efficiency and prognostic value of the serum SARS-CoV RNA RT-PCR test is critically associated with the analytical sensitivity and quantitative performance contributed both by the RNA extraction and RT-PCR components of the test, we recommend the use of the column-based manual RNA extraction method.

  12. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  13. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  14. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  15. Paediatric end-of-life care needs in Switzerland: current practices, and perspectives from parents and professionals. A study protocol.

    Science.gov (United States)

    Bergstraesser, Eva; Zimmermann, Karin; Eskola, Katri; Luck, Patricia; Ramelet, Anne-Sylvie; Cignacco, Eva

    2015-08-01

    To present a protocol for a multi-phase study about the current practice of end-of-life care in paediatric settings in Switzerland. In Switzerland, paediatric palliative care is usually provided by teams, who may not necessarily have specific training. There is a lack of systematic data about specific aspects of care at the end of a child's life, such as symptom management, involvement of parents in decision-making and family-centred care and experiences and needs of parents, and perspectives of healthcare professionals. This retrospective nationwide multicentre study, Paediatric End-of-LIfe CAre Needs in Switzerland (PELICAN), combines quantitative and qualitative methods of enquiry. The PELICAN study consists of three observational parts, PELICAN I describes practices of end-of-life care (defined as the last 4 weeks of life) in the hospital and home care setting of children (0-18 years) who died in the years 2011-2012 due to a cardiac, neurological or oncological disease, or who died in the neonatal period. PELICAN II assesses the experiences and needs of parents during the end-of-life phase of their child. PELICAN III focuses on healthcare professionals and explores their perspectives concerning the provision of end-of-life care. This first study across Switzerland will provide comprehensive insight into the current end-of-life care in children with distinct diagnoses and the perspectives of affected parents and health professionals. The results may facilitate the development and implementation of programmes for end-of-life care in children across Switzerland, building on real experiences and needs. ClinicalTrials.gov Identifier: NCT01983852. © 2015 John Wiley & Sons Ltd.

  16. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  17. Conservative Treatment Protocol for Keratocystic Odontogenic Tumour: a Follow-up Study of 3 Cases

    Directory of Open Access Journals (Sweden)

    Gülsün Yildirim

    2010-07-01

    Full Text Available Background: The keratocystic odontogenic tumour is classified as a developmental cyst derived from the enamel organ or from the dental lamina. The treatment of keratocystic odontogenic tumour of the jaw remains controversial. The aim of this study was to report the outcome of our conservative treatment protocol for keratocystic odontogenic tumour.Methods: Three patients with different complaints referred to Oral and Maxillofacial Surgery Clinic, Faculty of Dentistry, Selçuk University. Initial biopsy was carried out in all patients and keratocystic odontogenic tumours was diagnosed subsequent to histopathological examination. The patients with keratocystic odontogenic tumours were treated by enucleation followed by open packing. This conservative treatment protocol was selected because of existing young aged patients. The average follow-up duration of the cases was 2 years.Results: Out of 3 cases, 2 lesions were present in mandible and 1 lesion in maxilla. There was no evidence of recurrence during follow-up. All the cases were monitored continuously with panoramic radiographs, computed tomography and clinical evaluations.Conclusions: This conservative treatment protocol for keratocystic odontogenic tumours, based on enucleation followed by open packing would be a possible choice with a view of offering low recurrence rate and low morbidity rate particularly in young patients.

  18. Health care access for rural youth on equal terms? A mixed methods study protocol in northern Sweden.

    Science.gov (United States)

    Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin

    2018-01-11

    The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.

  19. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  20. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  1. A protocol for isolating insect mitochondrial genomes: a case study of NUMT in Melipona flavolineata (Hymenoptera: Apidae).

    Science.gov (United States)

    Françoso, Elaine; Gomes, Fernando; Arias, Maria Cristina

    2016-07-01

    Nuclear mitochondrial DNA insertions (NUMTs) are mitochondrial DNA sequences that have been transferred into the nucleus and are recognized by the presence of indels and stop codons. Although NUMTs have been identified in a diverse range of species, their discovery was frequently accidental. Here, our initial goal was to develop and standardize a simple method for isolating NUMTs from the nuclear genome of a single bee. Subsequently, we tested our new protocol by determining whether the indels and stop codons of the cytochrome c oxidase subunit I (COI) sequence of Melipona flavolineata are of nuclear origin. The new protocol successfully demonstrated the presence of a COI NUMT. In addition to NUMT investigations, the protocol described here will also be very useful for studying mitochondrial mutations related to diseases and for sequencing complete mitochondrial genomes with high read coverage by Next-Generation technology.

  2. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  3. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  4. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    ’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture......Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication...... the designer’s authentic line of reasoning. To illustrate how RPA can be used, the site planning case is briefly presented, and part of the replicated line of reasoning analysed. One result of the analysis is a glimpse of a ‘logic of design’; another is an insight which sheds new light on Darke’s classical...

  5. The additional protocol to the African Charter on Human and ...

    African Journals Online (AJOL)

    Aniekwu Nkolika Ijeoma notes that, in July 2003, the African Union adopted a landmark treaty, the Protocol on the Rights of Women in Africa, which significantly advances human rights protections to better reflect and incorporate women's experiences. It presents a tremendous opportunity for women's rights advocates in ...

  6. An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution

    Science.gov (United States)

    2012-02-01

    INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN // CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR...of the messages passed, and that the time to prepare or separate the message information is negligible . Finally, for this experiment all errors...of interactions becomes negligible . In fact, of the three protocols, experiments performed here have shown that Winnow produces the highest average

  7. Minimizing variance in Care of Pediatric Blunt Solid Organ Injury through Utilization of a hemodynamic-driven protocol: a multi-institution study.

    Science.gov (United States)

    Cunningham, Aaron J; Lofberg, Katrine M; Krishnaswami, Sanjay; Butler, Marilyn W; Azarow, Kenneth S; Hamilton, Nicholas A; Fialkowski, Elizabeth A; Bilyeu, Pamela; Ohm, Erika; Burns, Erin C; Hendrickson, Margo; Krishnan, Preetha; Gingalewski, Cynthia; Jafri, Mubeen A

    2017-12-01

    An expedited recovery protocol for management of pediatric blunt solid organ injury (spleen, liver, and kidney) was instituted across two Level 1 Trauma Centers, managed by nine pediatric surgeons within three hospital systems. Data were collected for 18months on consecutive patients after protocol implementation. Patient demographics (including grade of injury), surgeon compliance, National Surgical Quality Improvement Program (NSQIP) complications, direct hospital cost, length of stay, time in the ICU, phlebotomy, and re-admission were compared to an 18-month control period immediately preceding study initiation. A total of 106 patients were treated (control=55, protocol=51). Demographics were similar among groups, and compliance was 78%. Hospital stay (4.6 vs. 3.5days, p=0.04), ICU stay (1.9 vs. 1.0days, p=0.02), and total phlebotomy (7.7 vs. 5.3 draws, p=0.007) were significantly less in the protocol group. A decrease in direct hospital costs was also observed ($11,965 vs. $8795, p=0.09). Complication rates (1.8% vs. 3.9%, p=0.86, no deaths) were similar. An expedited, hemodynamic-driven, pediatric solid organ injury protocol is achievable across hospital systems and surgeons. Through implementation we maintained quality while impacting length of stay, ICU utilization, phlebotomy, and cost. Future protocols should work to further limit resource utilization. Retrospective cohort study. Level II. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Effects of a peer support programme for youth social services employees experiencing potentially traumatic events: a protocol for a prospective cohort study.

    Science.gov (United States)

    Guay, Stephane; Tremblay, Nicole; Goncalves, Jane; Bilodeau, Henriette; Geoffrion, Steve

    2017-06-24

    The use of peer support programmes to help workers experiencing potentially traumatic events (PTE) has increased in high-risk organisations in the last decades. However, the scientific evidence of its effectiveness is still very limited. This paper aims to describe the protocol of a prospective cohort study that assesses the efficacy of a peer support programme among youth social services employees exposed to a PTE at work on psychological well-being, work functioning and needs of support. This is a mixed-methods prospective study that will examine workers' evolution four times over a 12-month period in Canada. This study involves: (1) quantitative data obtained through self-administrated questionnaires among 222 workers, and (2) qualitative in-depth interviews with a subsample of 45 workers. This study will compare findings from a cohort who received the support of a peer following a PTE (peer support-experimental protocol) as part of the experimental protocol of the Montreal Youth Social Services-University Institute (MYSS-UI), the second group of workers did not ask for the peer support (no peer support-experimental protocol) but was part of MYSS-UI, and the third group received standard organisational support from the Monteregie Youth Social Services (MYSS) (standard organisational protocol). The protocol and informed consent form complied with the ethics guidelines of the MYSS-UI. The Research Ethics Board of MYSS-UI and MYSS reviewed and accepted the protocol as required. The results of the study will be published in peer-reviewed journals, presented at research and general public conferences, disseminated via a public report for the institute that funded the project and for all workers. Results of this study will influence decision making regarding intervention policies following PTE and peer support interventions may be expanded throughout the youth social services in Canada and worldwide. © Article author(s) (or their employer(s) unless otherwise stated

  9. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  10. A review on transport layer protocol performance for delivering video on an adhoc network

    Science.gov (United States)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  11. Benchmarking pediatric cranial CT protocols using a dose tracking software system: a multicenter study

    Energy Technology Data Exchange (ETDEWEB)

    Bondt, Timo de; Parizel, Paul M. [Antwerp University Hospital and University of Antwerp, Department of Radiology, Antwerp (Belgium); Mulkens, Tom [H. Hart Hospital, Department of Radiology, Lier (Belgium); Zanca, Federica [GE Healthcare, DoseWatch, Buc (France); KU Leuven, Imaging and Pathology Department, Leuven (Belgium); Pyfferoen, Lotte; Casselman, Jan W. [AZ St. Jan Brugge-Oostende AV Hospital, Department of Radiology, Brugge (Belgium)

    2017-02-15

    To benchmark regional standard practice for paediatric cranial CT-procedures in terms of radiation dose and acquisition parameters. Paediatric cranial CT-data were retrospectively collected during a 1-year period, in 3 different hospitals of the same country. A dose tracking system was used to automatically gather information. Dose (CTDI and DLP), scan length, amount of retakes and demographic data were stratified by age and clinical indication; appropriate use of child-specific protocols was assessed. In total, 296 paediatric cranial CT-procedures were collected. Although the median dose of each hospital was below national and international diagnostic reference level (DRL) for all age categories, statistically significant (p-value < 0.001) dose differences among hospitals were observed. The hospital with lowest dose levels showed smallest dose variability and used age-stratified protocols for standardizing paediatric head exams. Erroneous selection of adult protocols for children still occurred, mostly in the oldest age-group. Even though all hospitals complied with national and international DRLs, dose tracking and benchmarking showed that further dose optimization and standardization is possible by using age-stratified protocols for paediatric cranial CT. Moreover, having a dose tracking system revealed that adult protocols are still applied for paediatric CT, a practice that must be avoided. (orig.)

  12. The safety of a novel early mobilization protocol conducted by ICU physicians: a prospective observational study

    Directory of Open Access Journals (Sweden)

    Keibun Liu

    2018-02-01

    Full Text Available Abstract Background There are numerous barriers to early mobilization (EM in a resource-limited intensive care unit (ICU without a specialized team or an EM culture, regarding patient stability while critically ill or in the presence of medical devices. We hypothesized that ICU physicians can overcome these barriers. The aim of this study was to investigate the safety of EM according to the Maebashi EM protocol conducted by ICU physicians. Methods This was a single-center prospective observational study. All consecutive patients with an unplanned emergency admission were included in this study, according to the exclusion criteria. The observation period was from June 2015 to June 2016. Data regarding adverse events, medical devices in place during rehabilitation, protocol adherence, and rehabilitation outcomes were collected. The primary outcome was safety. Results A total of 232 consecutively enrolled patients underwent 587 rehabilitation sessions. Thirteen adverse events occurred (2.2%; 95% confidence interval, 1.2–3.8% and no specific treatment was needed. There were no instances of dislodgement or obstruction of medical devices, tubes, or lines. The incidence of adverse events associated with mechanical ventilation or extracorporeal membrane oxygenation (ECMO was 2.4 and 3.6%, respectively. Of 587 sessions, 387 (66% sessions were performed at the active rehabilitation level, including sitting out of the bed, active transfer to a chair, standing, marching, and ambulating. ICU physicians attended over 95% of these active rehabilitation sessions. Of all patients, 143 (62% got out of bed within 2 days (median 1.2 days; interquartile range 0.1–2.0. Conclusions EM according to the Maebashi EM protocol conducted by ICU physicians, without a specialized team or EM culture, was performed at a level of safety similar to previous studies performed by specialized teams, even with medical devices in place, including mechanical ventilation or ECMO

  13. Dosimetry study on the conventional and three dimensional conformal radiation treatment planning protocols for rectal cancer

    International Nuclear Information System (INIS)

    Cai Yong; He Yuxiang; Han Shukui; Wu Hao; Gong Jian; Xu Bo

    2007-01-01

    Objective: To compare the dose distribution of clinical target volume (CTV), in normal tissues and organs for patients with rectal cancer on the conventional radiotherapy (2D) and three dimension- al conformal radiation treatment (3DCRT). Methods: The CT image data of 36 rectal cancer patients treated with 3DCRT were studied. The CTV, small bowel, colon, bladder, pelvic bone marrow, and femoral head and neck were contoured on consecutive axial slices of CT images. Two 3DCRT and three conventional treatment planning protocols were simulated using three dimensional treatment planning system (CMS Focus 2.31), were defined as 3D-3, 3D-4, 2D-2, 2D-3, 2D-4. The difference of five treatment planning protocols on the CTV and normal structure by analysis of dose-volume histograms (DVHs) were compared. Results: The D 95 and V 95 of these five protocols all exceeded 97%. The conformity index(CI) of 3D was obviously larger than that of 2D protocol. The dose inhomogeneity(DI) in 4 DCRT was less than that of 3 DCRT. The 3D as compared with the 2D, significantly reduced the mean dose of 45 Gy to the small bowel and colon. The 3D-3 as compared with the 2D-3, the 3D-4 as compared with the 2D-4, the mean dose of small bowel and colon was reduced by 28.5% and 25.7%, respectively. The 3D-3 as compared with the 2D-2, the 3D-3 as compared with the 2D-3 and the 3D4 as compared with the 2D-4, the percentage volume of small bowel and colon which received 45 Gy was reduced by 80.8% , 51.1% and 54.7% , respectively. Either the mean dose, or the percentage volume receiving 35 Gy and 45 Gy to the pelvic bone and bladder, the 3D planning protocols had advanage over the 2D planning protocols. The V 45 of bladder in 2D-2 planning proto- col was the highest in all planning protocols, exceeding 98%, but the highest V 45 of bladder was only 50% in the other planning protocols. Conclusions: Even though the difference in pelvic CTV of rectal cancer patients between the conventional radiotherapy and 3

  14. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  15. Effects of different five-day progesterone-based fixed-time AI protocols on follicular/luteal dynamics and fertility in dairy cows

    Science.gov (United States)

    GARCIA-ISPIERTO, Irina; LÓPEZ-GATIUS, Fernando

    2014-01-01

    This study compares in two experiments the responses of lactating dairy cows to four different progesterone-based protocols for fixed-time artificial insemination (FTAI) in terms of their effects on follicular/luteal dynamics and fertility. The protocols consisted of a progesterone intravaginal device fitted for five days, along with the administration of different combinations of gonadotropin releasing hormone, equine chorionic gonadotropin and a single or double dose (24 h apart) of prostaglandin F2α. In Experiment I, the data were derived from 232 lactating cows. Binary logistic regression identified no effects of treatment on ovulation failure or multiple ovulation 10 days post artificial insemination (AI). Based on the odds ratio, the likelihood of ovulation failure was lower (by a factor of 0.1) in cows showing at least one corpus luteum (CL) upon treatment than in cows lacking a CL; repeat breeders (> 3 AI) and cows with multiple CLs at treatment showed lower (by a factor of 0.44) and higher (by a factor of 9.0) risks of multiple ovulation, respectively, than the remaining animals. In Experiment II, the data were derived from 5173 AIs. The independent variable treatment failed to affect the conception rate 28–34 days post AI, twin pregnancy or early fetal loss 58–64 days post AI. The results of this study demonstrate the efficacy of 5-day progesterone-based protocols for FTAI. All four protocols examined were able to induce ovulation in both cyclic and non-cyclic animals so that FTAI returned a similar pregnancy rate to spontaneous estrus. Our results suggest that the ovarian response and fertility resulting from each treatment are due more to the effect of ovarian structures at treatment than to the different combinations of hormones investigated. PMID:25196275

  16. The Spectrum of Histopathological Changes in the Renal Allograft - a 12 Months Protocol Biopsy Study

    Directory of Open Access Journals (Sweden)

    Galina Severova-Andreevska

    2018-03-01

    CONCLUSION: Our 12-month protocol biopsy study revealed the presence of different forms of mixed subclinical rejection. Use of recent BANFF classification and scoring system enables more precise diagnosis and subsequently different approach to the further treatment of the KTR. More correlative long-term studies including Anti HLA antibodies and Endothelial Cell Activation- Associated Transcripts (ENDAT are needed.

  17. An Overview of the Object Protocol Model (OPM) and the OPM Data Management Tools.

    Science.gov (United States)

    Chen, I-Min A.; Markowitz, Victor M.

    1995-01-01

    Discussion of database management tools for scientific information focuses on the Object Protocol Model (OPM) and data management tools based on OPM. Topics include the need for new constructs for modeling scientific experiments, modeling object structures and experiments in OPM, queries and updates, and developing scientific database applications…

  18. Centralization of politrauma. Study of Ferrara’s reality and simulation of an agreed-upon protocol

    Directory of Open Access Journals (Sweden)

    Luigi Melcarne

    2011-09-01

    Full Text Available In a time in which everybody’s asked a big effort to use hospitals, resources and emergency departments in a rational way, the Centralization – that is sending the right patient to the right hospital at the right time – allows an optimization of the resources and a better management of medical patients. In this study we examined the actual state of Centralization in the city of Ferrara where an experimental protocol of “centralization” has been introduced. This study has the purpose of simulating reality if the protocol had been introduced in the years 2008/2009. The results confirm not only that an important number of patients that were meant to be sent to the CTZ of Ferrara where instead sent to the PST but also that, on the contrary, patients from the suburbs that didn’t require advanced treatments were sent to the Sant’Anna hospital of Ferrara. So if medical literature already points out the advantages of a correct Centralization for patients with polytraumas; the study, based on the reality in Ferrara , shows how the creation of an agreed protocol with the goal to guide health workers at sending polytrauma patients to the right destination , instead of creating an excessive flow th the main hub, can improve the overall organization of health services, with an equal distribution between hub and spoke. When considering First Aid not always speed and rapidity guarantee survival; this is so much more real in the case of patients with polytrauma, where quality of cures assumes more importance than time.

  19. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  20. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  1. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs

    Directory of Open Access Journals (Sweden)

    Haowen Tan

    2018-01-01

    Full Text Available As a crucial component of Internet-of-Thing (IoT, vehicular ad hoc networks (VANETs have attracted increasing attentions from both academia and industry fields in recent years. With the extensive VANETs deployment in transportation systems of more and more countries, drivers’ driving experience can be drastically improved. In this case, the real-time road information needs to be disseminated to the correlated vehicles. However, due to inherent wireless communicating characteristics of VANETs, authentication and group key management strategies are indispensable for security assurance. Furthermore, effective road message dissemination mechanism is of significance. In this paper, we address the above problems by developing a certificateless authentication and road message dissemination protocol. In our design, certificateless signature and the relevant feedback mechanism are adopted for authentication and group key distribution. Subsequently, message evaluating and ranking strategy is introduced. Security analysis shows that our protocol achieves desirable security properties. Additionally, performance analysis demonstrates that the proposed protocol is efficient compared with the state of the art.

  2. Bee venom acupuncture for the treatment of chronic low back pain: study protocol for a randomized, double-blinded, sham-controlled trial

    Directory of Open Access Journals (Sweden)

    Seo Byung-Kwan

    2013-01-01

    Full Text Available Abstract Background Chronic non-specific low back pain is the most common medical problem for which patients seek complementary and alternative medical treatment, including bee venom acupuncture. However, the effectiveness and safety of such treatments have not been fully established by randomized clinical trials. The aim of this study is to determine whether bee venom acupuncture is effective for improving pain intensity, functional status and quality of life of patients with chronic non-specific low back pain. Methods/design This study is a randomized, double-blinded, sham-controlled clinical trial with two parallel arms. Fifty-four patients between 18 and 65 years of age with non-radicular chronic low back pain experiencing low back pain lasting for at least the previous three months and ≥4 points on a 10-cm visual analog scale for bothersomeness at the time of screening will be included in the study. Participants will be randomly allocated into the real or sham bee venom acupuncture groups and treated by the same protocol to minimize non-specific and placebo effects. Patients, assessors, acupuncturists and researchers who prepare the real or sham bee venom acupuncture experiments will be blinded to group allocation. All procedures, including the bee venom acupuncture increment protocol administered into predefined acupoints, are designed by a process of consensus with experts and previous researchers according to the Standards for Reporting Interventions in Clinical Trials of Acupuncture. Bothersomeness measured using a visual analogue scale will be the primary outcome. Back pain-related dysfunction, pain, quality of life, depressive symptoms and adverse experiences will be measured using the visual analogue scale for pain intensity, the Oswestry Disability Index, the EuroQol 5-Dimension, and the Beck’s Depression Inventory. These measures will be recorded at baseline and 1, 2, 3, 4, 8 and 12 weeks. Discussion The results from this study

  3. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  4. Initial experience on protocol optimization for integrated PET/MR%PET/MR一体机操作优化的初步经验

    Institute of Scientific and Technical Information of China (English)

    刘家金; 陈英茂; 张雄伟; 富丽萍; 田嘉禾; 尹大一; 徐白萱

    2014-01-01

    目的 通过比较PET/CT和PET/MR,初步探索PET/MR一体机的操作流程和成像优化方案.方法 228例患者同日内接受PET/CT和PET/MR检查,通过6种不同MR序列与PET采集组合方案,比较图像质量的优劣,以在保证诊断信息基础上缩短患者扫描时间的原则分析判断,并初步确定最优PET/MR一体机采集方案.结果 PET/MR结果与PET/CT相近,但其操作流程和注意事项有独特之处;在6种方案中,以躯干和头部各有独立序列组合、兼顾各向同性结构显示与突出病灶特点的方案6效果最优;PET/MR比PET/CT更易产生伪影.结论 在优化方案基础上,PET/MR可获得与PET/CT一致的诊断级图像,但PET/MR采集时间长、伪影多,有待进一步完善.%Objective To investigate the optimal workflow and protocol for integrated PET/MR by comparison with PET/CT.Methods A total of 228 patients were enrolled in this study for PET/CT and PET/MR evaluation on the same day.Six PET/MR protocols with different MR sequences but the same PET acquisition protocol were investigated and the optimal protocol was identified based on image quality,acquisition time and diagnostic performance.Results PET/MR workflow was similar to PET/CT,however,some special issues needed to be considered for PET/MR.Among the 6 protocols,protocol No.6 outperformed others for body and head regions.Types of artifacts were found more often in PET/MR than in PET/CT.Conclusions By optimizing the protocol,PET/MR could achieve almost the same diagnostic performance as PET/CT.However,the issues of long acquisition time and artifacts on PET/MR need to be further improved.

  5. Inter-laboratory variation in DNA damage using a standard comet assay protocol

    DEFF Research Database (Denmark)

    Forchhammer, Lykke; Ersson, Clara; Loft, Steffen

    2012-01-01

    determined the baseline level of DNA strand breaks (SBs)/alkaline labile sites and formamidopyrimidine DNA glycosylase (FPG)-sensitive sites in coded samples of mononuclear blood cells (MNBCs) from healthy volunteers. There were technical problems in seven laboratories in adopting the standard protocol...... analysed by the standard protocol. The SBs and FPG-sensitive sites were measured in the same experiment, indicating that the large spread in the latter lesions was the main reason for the reduced inter-laboratory variation. However, it remains worrying that half of the participating laboratories obtained...

  6. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  7. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  8. Past and Future of the Kyoto Protocol. Final report

    International Nuclear Information System (INIS)

    Wijen, F.; Zoeteman, K.

    2004-01-01

    The present report reflects findings from a study on the realization of and prospects for the Kyoto Protocol. The purpose of the study was (1) to obtain insights into the factors that enabled the realization of the Kyoto Protocol, in particular the interactions among major parties involved; (2) to assess the future opportunities and threats of the Kyoto Protocol, in particular against the backdrop of an increasingly globalised world. The study was conducted from February up to December 2003 by (a) reviewing the literature, especially publications on the negotiation history of the Kyoto process, the social interactions enabling the realization of the Protocol, analyses of strengths and weaknesses, and future climate regimes; (b) conducting a series of interviews with representatives from government, academia, non-governmental organisations, and business, who have been - directly or indirectly - involved in the Kyoto process; (c) internal discussions,brainstorming and analysing the Protocol's strengths and weaknesses, possible future scenarios (including policy options), and the management of a possible failure of the Kyoto Protocol. The present report reflects and integrates the different sources. The first section deals with the past and the present. It discusses how the Kyoto Protocol could be realized despite the divergent interests, reflects on its architecture, and analyses major strengths and weaknesses. In the second section, we present possible future scenarios. We explore how different combinations of domestic and international commitment provide possible realities that national government may face when crafting climate policy. The third section provides an in-depth analysis of the possible event that the Kyoto Protocol fails. We discuss its definition and policy implications. The final section is reserved for overall conclusions and policy recommendations

  9. Single-cell qPCR on dispersed primary pituitary cells -an optimized protocol

    Directory of Open Access Journals (Sweden)

    Haug Trude M

    2010-11-01

    Full Text Available Abstract Background The incidence of false positives is a potential problem in single-cell PCR experiments. This paper describes an optimized protocol for single-cell qPCR measurements in primary pituitary cell cultures following patch-clamp recordings. Two different cell harvesting methods were assessed using both the GH4 prolactin producing cell line from rat, and primary cell culture from fish pituitaries. Results Harvesting whole cells followed by cell lysis and qPCR performed satisfactory on the GH4 cell line. However, harvesting of whole cells from primary pituitary cultures regularly produced false positives, probably due to RNA leakage from cells ruptured during the dispersion of the pituitary cells. To reduce RNA contamination affecting the results, we optimized the conditions by harvesting only the cytosol through a patch pipette, subsequent to electrophysiological experiments. Two important factors proved crucial for reliable harvesting. First, silanizing the patch pipette glass prevented foreign extracellular RNA from attaching to charged residues on the glass surface. Second, substituting the commonly used perforating antibiotic amphotericin B with β-escin allowed efficient cytosol harvest without loosing the giga seal. Importantly, the two harvesting protocols revealed no difference in RNA isolation efficiency. Conclusion Depending on the cell type and preparation, validation of the harvesting technique is extremely important as contaminations may give false positives. Here we present an optimized protocol allowing secure harvesting of RNA from single cells in primary pituitary cell culture following perforated whole cell patch clamp experiments.

  10. Protocol of a Multicenter International Randomized Controlled Manikin Study on Different Protocols of Cardiopulmonary Resuscitation for laypeople (MANI-CPR).

    Science.gov (United States)

    Baldi, Enrico; Contri, Enrico; Burkart, Roman; Borrelli, Paola; Ferraro, Ottavia Eleonora; Tonani, Michela; Cutuli, Amedeo; Bertaia, Daniele; Iozzo, Pasquale; Tinguely, Caroline; Lopez, Daniel; Boldarin, Susi; Deiuri, Claudio; Dénéréaz, Sandrine; Dénéréaz, Yves; Terrapon, Michael; Tami, Christian; Cereda, Cinzia; Somaschini, Alberto; Cornara, Stefano; Cortegiani, Andrea

    2018-04-19

    Out-of-hospital cardiac arrest is one of the leading causes of death in industrialised countries. Survival depends on prompt identification of cardiac arrest and on the quality and timing of cardiopulmonary resuscitation (CPR) and defibrillation. For laypeople, there has been a growing interest on hands-only CPR, meaning continuous chest compression without interruption to perform ventilations. It has been demonstrated that intentional interruptions in hands-only CPR can increase its quality. The aim of this randomised trial is to compare three CPR protocols performed with different intentional interruptions with hands-only CPR. This is a prospective randomised trial performed in eight training centres. Laypeople who passed a basic life support course will be randomised to one of the four CPR protocols in an 8 min simulated cardiac arrest scenario on a manikin: (1) 30 compressions and 2 s pause; (2) 50 compressions and 5 s pause; (3) 100 compressions and 10 s pause; (4) hands-only. The calculated sample size is 552 people. The primary outcome is the percentage of chest compression performed with correct depth evaluated by a computerised feedback system (Laerdal QCPR). ETHICS AND DISSEMINATION: . Due to the nature of the study, we obtained a waiver from the Ethics Committee (IRCCS Policlinico San Matteo, Pavia, Italy). All participants will sign an informed consent form before randomisation. The results of this study will be published in peer-reviewed journal. The data collected will also be made available in a public data repository. NCT02632500. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  11. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    Science.gov (United States)

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  12. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  13. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  14. Improved protocols for the study of urinary electrolyte excretion and blood pressure in rodents: use of gel food and stepwise changes in diet composition.

    Science.gov (United States)

    Nizar, Jonathan M; Bouby, Nadine; Bankir, Lise; Bhalla, Vivek

    2018-06-01

    Many experimental protocols in rodents require the comparison of groups that are fed different diets. Changes in dietary electrolyte and/or fat content can influence food intake, which can potentially introduce bias or confound the results. Unpalatable diets slow growth or cause weight loss, which is exacerbated by housing the animals in individual metabolic cages or by surgery. For balance studies in mice, small changes in body weight and food intake and low urinary flow can amplify these challenges. Powder food can be administered as gel with the addition of a desired amount of water, electrolytes, drugs (if any), and a small amount of agar. We describe here how the use of gel food to vary water, Na, K, and fat content can reduce weight loss and improve reproducibility of intake, urinary excretion, and blood pressure in rodents. In addition, mild food restriction reduces the interindividual variability and intergroup differences in food intake and associated variables, thus improving the statistical power of an experiment. Finally, we also demonstrate the advantages of using gel food for weight-based drug dosing. These protocols can improve the accuracy and reproducibility of experimental data where dietary manipulations are needed and are especially advisable in rodent studies related to water balance, obesity, and blood pressure.

  15. A Prospective Pilot Study to Validate the Management Protocol for Patients Presenting with Acute Urinary Retention: A Community-Based, Nonhospitalised Protocol

    Directory of Open Access Journals (Sweden)

    Shyamala S. Gopi

    2006-01-01

    Full Text Available Acute urinary retention (AUR in males is managed conventionally by hospital admission, alpha-adrenergic therapy, and trial without catheter. To reduce inpatient bed pressures, we set up a protocol to manage such patients in the community. We review our results in this paper. We performed a prospective study of male patients presenting to our acute admissions ward and Accident and Emergency department over 6 months. Patients with chronic urinary retention, macroscopic haematuria, sepsis, urinary tract infection, and/or serum creatinine >130 mmol/l were excluded from the study. Those enrolled were catheterised, commenced on alfuzosin (10 mg nocte, and discharged to the community. A trial without catheter (TWOC was performed 5—7 days later. QoL/IPSS, peak flow rate, and residual volume assessment were performed following successful TWOC 3 months later.Thirty-one male patients with a median age of 69 years were studied and the median residual volume following catheterisation was 900 ml. The aetiology of AUR was benign prostatic hyperplasia (BPH in 29 patients and constipation in the remaining 2 patients. TWOC was successful in 19 patients (61.3% following first TWOC, 26 (83.9% following second trial of voiding. The mean peak flow rate was 6.5 ml/sec and postvoid scan 165 ml, following an immediate TWOC. At 3 months follow-up, mean peak flow rate was 13.2 ml/sec, postvoid scan 26.5 ml, IPSS 4.5, and QoL score was 2. This study has shown that AUR can be managed safely and effectively in the community. Effective communication with the nurse urology specialist, general practitioner, and emergency department are crucial for the successful implementation of the protocol.

  16. Using mobile technology to deliver a cognitive behaviour therapy-informed intervention in early psychosis (Actissist): study protocol for a randomised controlled trial.

    Science.gov (United States)

    Bucci, Sandra; Barrowclough, Christine; Ainsworth, John; Morris, Rohan; Berry, Katherine; Machin, Matthew; Emsley, Richard; Lewis, Shon; Edge, Dawn; Buchan, Iain; Haddock, Gillian

    2015-09-10

    Cognitive behaviour therapy (CBT) is recommended for the treatment of psychosis; however, only a small proportion of service users have access to this intervention. Smartphone technology using software applications (apps) could increase access to psychological approaches for psychosis. This paper reports the protocol development for a clinical trial of smartphone-based CBT. We present a study protocol that describes a single-blind randomised controlled trial comparing a cognitive behaviour therapy-informed software application (Actissist) plus Treatment As Usual (TAU) with a symptom monitoring software application (ClinTouch) plus TAU in early psychosis. The study consists of a 12-week intervention period. We aim to recruit and randomly assign 36 participants registered with early intervention services (EIS) across the North West of England, UK in a 2:1 ratio to each arm of the trial. Our primary objective is to determine whether in people with early psychosis the Actissist app is feasible to deliver and acceptable to use. Secondary aims are to determine whether Actissist impacts on predictors of first episode psychosis (FEP) relapse and enhances user empowerment, functioning and quality of life. Assessments will take place at baseline, 12 weeks (post-treatment) and 22-weeks (10 weeks post-treatment) by assessors blind to treatment condition. The trial will report on the feasibility and acceptability of Actissist and compare outcomes between the randomised arms. The study also incorporates semi-structured interviews about the experience of participating in the Actissist trial that will be qualitatively analysed to inform future developments of the Actissist protocol and app. To our knowledge, this is the first controlled trial to test the feasibility, acceptability, uptake, attrition and potential efficacy of a CBT-informed smartphone app for early psychosis. Mobile applications designed to deliver a psychologically-informed intervention offer new possibilities to

  17. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  18. Human Schedule Performance, Protocol Analysis, and the "Silent Dog" Methodology

    Science.gov (United States)

    Cabello, Francisco; Luciano, Carmen; Gomez, Inmaculada; Barnes-Holmes, Dermot

    2004-01-01

    The purpose of the current experiment was to investigate the role of private verbal behavior on the operant performances of human adults, using a protocol analysis procedure with additional methodological controls (the "silent dog" method). Twelve subjects were exposed to fixed ratio 8 and differential reinforcement of low rate 3-s schedules. For…

  19. Towards designing energy-efficient routing protocol for wireless mesh networks

    CSIR Research Space (South Africa)

    Dludla, AG

    2009-08-01

    Full Text Available Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based...

  20. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  1. Serious gaming during multidisciplinary rehabilitation for patients with complex chronic pain or fatigue complaints: study protocol for a controlled trial and process evaluation.

    Science.gov (United States)

    Vugts, Miel A P; Joosen, Margot C W; Mert, Agali; Zedlitz, Aglaia; Vrijhoef, Hubertus J M

    2017-06-08

    Many individuals suffer from chronic pain or functional somatic syndromes and face boundaries for diminishing functional limitations by means of biopsychosocial interventions. Serious gaming could complement multidisciplinary interventions through enjoyment and independent accessibility. A study protocol is presented for studying whether, how, for which patients and under what circumstances, serious gaming improves patient health outcomes during regular multidisciplinary rehabilitation. A mixed-methods design is described that prioritises a two-armed naturalistic quasi-experiment. An experimental group is composed of patients who follow serious gaming during an outpatient multidisciplinary programme at two sites of a Dutch rehabilitation centre. Control group patients follow the same programme without serious gaming in two similar sites. Multivariate mixed-modelling analysis is planned for assessing how much variance in 250 patient records of routinely monitored pain intensity, pain coping and cognition, fatigue and psychopathology outcomes is attributable to serious gaming. Embedded qualitative methods include unobtrusive collection and analyses of stakeholder focus group interviews, participant feedback and semistructured patient interviews. Process analyses are carried out by a systematic approach of mixing qualitative and quantitative methods at various stages of the research. The Ethics Committee of the Tilburg School of Social and Behavioural Sciences approved the research after reviewing the protocol for the protection of patients' interests in conformity to the letter and rationale of the applicable laws and research practice (EC 2016.25t). Findings will be presented in research articles and international scientific conferences. A prospective research protocol for the naturalistic quasi-experimental outcome evaluation was entered in the Dutch trial register (registration number: NTR6020; Pre-results). © Article author(s) (or their employer(s) unless

  2. A School Passport as Part of a Protocol to Assist Educational Reintegration After Medulloblastoma Treatment in Childhood.

    Science.gov (United States)

    Tresman, Rachel; Brown, Morven; Fraser, Faye; Skinner, Roderick; Bailey, Simon

    2016-09-01

    Medulloblastoma is the most common malignant brain tumour in children and is treated with a combination of surgery, radiotherapy and chemotherapy. These children frequently experience long-term cognitive, social and physical sequelae, which significantly affect school reintegration. This study aimed to explore school-return experiences to create a more structured school reintegration protocol for children postmedulloblastoma. A cohort of nine patients who had completed treatment and for whom full neuropsychometric data were available was included in the study (median time since diagnosis 8 years). Data were collected using qualitative parental questionnaires, semistructured interviews with teachers (n = 12) and healthcare professionals (HCPs) (n = 6) involved in their school reintegration. Thematic analysis was employed. A focus group with five HCPs was then used for data validation. This study uncovered the following four main subjects: (1) Information sharing; (2) education and empowerment (of educational professionals (EP) and parents); (3) communication between parents, HCPs and EPs; and (4) long-term difficulties. Implementation of a standardised protocol delivered within the structure of a school passport document would aid uniform follow-up. The proposed multistage protocol includes early communication and reintegration planning followed by meetings at school re-entry. Follow-up meetings are suggested to reduce information loss and reassess the child's needs. Hospital support at school transitions, inclusion of school data in long-term clinical follow-up and long-term rehabilitation are also recommended. Each stage would be supported by school passport documentation and would facilitate school and parental empowerment, paramount to the long-term sustainability of successful schooling. © 2016 Wiley Periodicals, Inc.

  3. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  4. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal; Tammam, Amr; Alouini, Mohamed-Slim; Aissa, Sonia

    2015-01-01

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  5. Development of a research evaluation protocol for NSD research portfolios

    International Nuclear Information System (INIS)

    Gould, J.

    1999-01-01

    This report is concerned with developing and describing a research evaluation protocol for use by the Nuclear Safety Directorate (NSD), in evaluating their various programmes of research; or aspects of those programmes. The Health and Safety Executive (HSE) has been involved with research evaluation for some considerable time and NSD, as part of HSE, wishes to develop a protocol which, while it meets their needs, is also fully compatible with other HSE approaches. It is intended that the methodology developed by this project will be used for evaluation of the Probabilistic Safety Assessment Portfolio (as a separate project). The usefulness of the methodology will be reviewed in the light of this experience

  6. Development of a 3D remote dosimetry protocol compatible with MRgIMRT.

    Science.gov (United States)

    Mein, Stewart; Rankine, Leith; Adamovics, John; Li, Harold; Oldham, Mark

    2017-11-01

    To develop a novel remote 3D dosimetry protocol to verify Magnetic Resonance-guided Radiation Therapy (MRgRT) treatments. The protocol was applied to investigate the accuracy of TG-119 IMRT irradiations delivered by the MRIdian ® system (ViewRay ® , Oakwood Village, OH, USA) allowing for a 48-hour delay between irradiation at a field institution and subsequent readout at a base institution. The 3D dosimetry protocol utilizes a novel formulation of PRESAGE ® radiochromic dosimeters developed for high postirradiation stability and compatibility with optical-CT readout. Optical-CT readout was performed with an in-house system utilizing telecentric lenses affording high-resolution scanning. The protocol was developed from preparatory experiments to characterize PRESAGE ® response in relevant conditions. First, linearity and sensitivity of PRESAGE ® dose-response in the presence of a magnetic field was evaluated in a small volume study (4 ml cuvettes) conducted under MRgRT conditions and irradiated with doses 0-15 Gy. Temporal and spatial stability of the dose-response were investigated in large volume studies utilizing large field-of-view (FOV) 2 kg cylindrical PRESAGE ® dosimeters. Dosimeters were imaged at t = 1 hr and t = 48 hrs enabling the development of correction terms to model any observed spatial and temporal changes postirradiation. Polynomial correction factors for temporal and spatial changes in PRESAGE ® dosimeters (C T and C R respectively) were obtained by numerical fitting to time-point data acquired in six irradiated dosimeters. A remote dosimetry protocol was developed where PRESAGE ® change in optical-density (ΔOD) readings at time t = X (the irradiation to return shipment time interval) were corrected back to a convenient standard time t = 1 hr using the C T and C R corrections. This refined protocol was then applied to TG-119 (American Association of Physicists in Medicine, Task Group 119) plan deliveries on the MRIdian

  7. Milrinone and homeostasis to treat cerebral vasospasm associated with subarachnoid hemorrhage: the Montreal Neurological Hospital protocol.

    Science.gov (United States)

    Lannes, Marcelo; Teitelbaum, Jeanne; del Pilar Cortés, Maria; Cardoso, Mauro; Angle, Mark

    2012-06-01

    For the treatment of cerebral vasospasm, current therapies have focused on increasing blood flow through blood pressure augmentation, hypervolemia, the use of intra-arterial vasodilators, and angioplasty of proximal cerebral vessels. Through a large case series, we present our experience of treating cerebral vasospasm with a protocol based on maintenance of homeostasis (correction of electrolyte and glucose disturbances, prevention and treatment of hyperthermia, replacement of fluid losses), and the use of intravenous milrinone to improve microcirculation (the Montreal Neurological Hospital protocol). Our objective is to describe the use milrinone in our practice and the neurological outcomes associated with this approach. Large case series based on the review of all patients diagnosed with delayed ischemic neurologic deficits after aneurysmal subarachnoid hemorrhage between April 1999 and April 2006. 88 patients were followed for a mean time of 44.6 months. An intravenous milrinone infusion was used for a mean of 9.8 days without any significant side effects. No medical complications associated with this protocol were observed. There were five deaths; of the surviving patients, 48.9 % were able to go back to their previous baseline and 75 % had a good functional outcome (modified Rankin scale ≤ 2). A protocol using intravenous milrinone, and the maintenance of homeostasis is simple to use and requires less intensive monitoring and resources than the standard triple H therapy. Despite the obvious limitations of this study's design, we believe that it would be now appropriate to proceed with formal prospective studies of this protocol.

  8. Hydrogen peroxide bleaching induces changes in the physical properties of dental restorative materials: Effects of study protocols.

    Science.gov (United States)

    Yu, Hao; Zhang, Chang-Yuan; Wang, Yi-Ning; Cheng, Hui

    2018-03-01

    The purpose of this study was to evaluate the influence of study protocols on the effects of bleaching on the surface roughness, substance loss, flexural strength (FS), flexural modulus (FM), Weibull parameters, and color of 7 restorative materials. The test materials included 4 composite resins, 1 glass-ionomer cement, 1 dental ceramic, and 1 polyacid-modified composite. The specimens were randomly divided into 4 groups (n = 20) according to different study protocols: a bleaching group at 25°C (group 25B), a bleaching group at 37°C (group 37B), a control group at 25°C (group 25C), and a control group at 37°C (group 37C). The specimens in the bleaching group were treated with 40% hydrogen peroxide for 80 min at the respective environmental temperatures. The surface roughness, substance loss, FS, FM, and color of the specimens were measured before and after treatment. FS data were also subjected to Weibull analysis, which was used to estimate of the Weibull modulus (m) and the characteristic strength (σ 0 ). Surface roughness increased and significant color changes were observed for all tested specimens after bleaching treatment, except for the ceramic. After bleaching at 37°C, the polyacid-modified composite showed significantly reduced FS, FM, m, and σ 0 values in comparison to the control specimens stored at 37°C in whole saliva. Significant differences were also found between the 37B and 25B polyacid-modified composite groups in terms of surface roughness, FS, m, σ 0 , and color changes. Varying effects of bleaching on the physical properties of dental restorative materials were observed, and the influences of the study protocols on bleaching effects were found to be material-dependent. The influence of study protocols on the effects of bleaching on the surface roughness, flexural properties, and color of dental restorative materials are material-dependent and should be considered when evaluating the effects of bleaching on dental restorative

  9. A systematic review of protocol studies on conceptual design cognition: design as search and exploration

    OpenAIRE

    Hay, Laura; Duffy, Alex H.B.; McTeague, Chris; Pidgeon, Laura M.; Vuletic, Tijana; Grealy, Madeleine

    2017-01-01

    This paper reports findings from the first systematic review of protocol studies focusing specifically on conceptual design cognition, aiming to answer the following research question: What is our current understanding of the cognitive processes involved in conceptual design tasks carried out by individual designers? We reviewed 47 studies on architectural design, engineering design and product design engineering. This paper reports 24 cognitive processes investigated in a subset of 33 studie...

  10. Abdominal stab wound protocol: prospective study documents applicability for widespread use.

    Science.gov (United States)

    Rosemurgy, A S; Albrink, M H; Olson, S M; Sherman, H; Albertini, J; Kramer, R; Camps, M; Reiss, A

    1995-02-01

    Traditionally, stab wounds violating the abdominal wall fascia led to exploratory celiotomy that was often nontherapeutic. In an attempt to limit the number of nontherapeutic celiotomies (NTC), we devised a protocol to prospectively study stab wounds violating the anterior abdominal wall fascia. Through protocol, abdominal stab wounds were explored in stable adults. If the anterior fascia was violated, paracentesis and, if necessary, peritoneal lavage was undertaken in the absence of previous abdominal surgery. If evisceration was noted, it was reduced and the patient lavaged. Fascial penetration was noted in 72 patients. 46 patients underwent celiotomy: because of shock/peritonitis in 8 (2 NTC), fascial penetration with a history of previous celiotomy in 7 (5 NTC), positive paracentesis in 20 (5 NTC), or positive lavage in 10 (4 NTC). One patient underwent late celiotomy without ill-effect after a negative lavage because she subsequently developed fever and localized peritonitis (ice pick injury to cecum). Eleven patients had evisceration; nine underwent celiotomy. Patients with abdominal stab wounds can be selectively managed safely. More than one-third with fascial penetration, some with evisceration, avoided exploration. Only one patient underwent delayed celiotomy and did so without detriment. Nontherapeutic celiotomy rates were highest in patients with previous abdominal surgery who, thereby, could not undergo paracentesis/lavage; excluding these patients, the nontherapeutic celiotomy rate was 17% (11/65) for those with fascial penetration.

  11. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  12. Patient and nurse preferences for nurse handover-using preferences to inform policy: a discrete choice experiment protocol.

    Science.gov (United States)

    Spinks, Jean; Chaboyer, Wendy; Bucknall, Tracey; Tobiano, Georgia; Whitty, Jennifer A

    2015-11-11

    Nursing bedside handover in hospital has been identified as an opportunity to involve patients and promote patient-centred care. It is important to consider the preferences of both patients and nurses when implementing bedside handover to maximise the successful uptake of this policy. We outline a study which aims to (1) identify, compare and contrast the preferences for various aspects of handover common to nurses and patients while accounting for other factors, such as the time constraints of nurses that may influence these preferences.; (2) identify opportunities for nurses to better involve patients in bedside handover and (3) identify patient and nurse preferences that may challenge the full implementation of bedside handover in the acute medical setting. We outline the protocol for a discrete choice experiment (DCE) which uses a survey design common to both patients and nurses. We describe the qualitative and pilot work undertaken to design the DCE. We use a D-efficient design which is informed by prior coefficients collected during the pilot phase. We also discuss the face-to-face administration of this survey in a population of acutely unwell, hospitalised patients and describe how data collection challenges have been informed by our pilot phase. Mixed multinomial logit regression analysis will be used to estimate the final results. This study has been approved by a university ethics committee as well as two participating hospital ethics committees. Results will be used within a knowledge translation framework to inform any strategies that can be used by nursing staff to improve the uptake of bedside handover. Results will also be disseminated via peer-reviewed journal articles and will be presented at national and international conferences. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  13. Clinical outcomes and mortality before and after implementation of a pediatric sepsis protocol in a limited resource setting: A retrospective cohort study in Bangladesh.

    Directory of Open Access Journals (Sweden)

    Teresa Bleakly Kortz

    Full Text Available Pediatric sepsis has a high mortality rate in limited resource settings. Sepsis protocols have been shown to be a cost-effective strategy to improve morbidity and mortality in a variety of populations and settings. At Dhaka Hospital in Bangladesh, mortality from pediatric sepsis in high-risk children previously approached 60%, which prompted the implementation of an evidenced-based protocol in 2010. The clinical effectiveness of this protocol had not been measured. We hypothesized that implementation of a pediatric sepsis protocol improved clinical outcomes, including reducing mortality and length of hospital stay.This was a retrospective cohort study of children 1-59 months old with a diagnosis of sepsis, severe sepsis or septic shock admitted to Dhaka Hospital from 10/25/2009-10/25/2011. The primary outcome was inpatient mortality pre- and post-protocol implementation. Secondary outcomes included fluid overload, heart failure, respiratory insufficiency, length of hospital stay, and protocol compliance, as measured by antibiotic and fluid bolus administration within 60 minutes of hospital presentation.404 patients were identified by a key-word search of the electronic medical record; 328 patients with a primary diagnosis of sepsis, severe sepsis, or septic shock were included (143 pre- and185 post-protocol in the analysis. Pre- and post-protocol mortality were similar and not statistically significant (32.17% vs. 34.59%, p = 0.72. The adjusted odds ratio (AOR for post-protocol mortality was 1.55 (95% CI, 0.88-2.71. The odds for developing fluid overload were significantly higher post-protocol (AOR 3.45, 95% CI, 2.04-5.85, as were the odds of developing heart failure (AOR 4.52, 95% CI, 1.43-14.29 and having a longer median length of stay (AOR 1.81, 95% CI 1.10-2.96. There was no statistically significant difference in respiratory insufficiency (pre- 65.7% vs. post- 70.3%, p = 0.4 or antibiotic administration between the cohorts (pre- 16.08% vs

  14. Preparing healthcare students who participate in interprofessional education for interprofessional collaboration: A constructivist grounded theory study protocol.

    Science.gov (United States)

    Bianchi, Monica; Bagnasco, Annamaria; Aleo, Giuseppe; Catania, Gianluca; Zanini, Milko Patrick; Timmins, Fiona; Carnevale, Franco; Sasso, Loredana

    2018-05-01

    This article presents a qualitative research protocol to explore and understand the interprofessional collaboration (IPC) preparation process implemented by clinical tutors and students of different professions involved in interprofessional education (IPE). Many studies have shown that IPE initiatives improve students' understanding of the roles and responsibilities of other professionals. This improves students' attitudes towards other professions, facilitating mutual respect, and IPC. However, there is limited information about how students are prepared to work collaboratively within interprofessional teams. This is a constructivist grounded theory (GT) study, which will involve data collection through in-depth semi-structured interviews (to 9-15 students and 6-9 clinical tutors), participant observations, and the analysis of documentation. After analysing, coding, integrating, and comparing the data if necessary, a second round of interviews could be conducted to explore any particularly interesting aspects or clarify any issues. This will then be followed by focused and theoretical coding. Qualitative data analysis will be conducted with the support of NVivo 10 software (Victoria, Australia). A better conceptual understanding will help to understand if IPE experiences have contributed to the acquisition of competencies considered important for IPC, and if they have facilitated the development of teamwork attitudes.

  15. The NA60 experiment readout architecture

    CERN Document Server

    Floris, M; Usai, G L; David, A; Rosinsky, P; Ohnishi, H

    2004-01-01

    The NA60 experiment was designed to identify signatures of a new state of matter, the Quark Gluon Plasma, in heavy-ion collisions at the CERN Super Proton Synchroton. The apparatus is composed of four main detectors: a muon spectrometer (MS), a zero degree calorimeter (ZDC), a silicon vertex telescope (VT), and a silicon microstrip beam tracker (BT). The readout of the whole experiment is based on a PCI architecture. The basic unit is a general purpose PCI card, interfaced to the different subdetectors via custom mezzanine cards. This allowed us to successfully implement several completely different readout protocols (from the VME like protocol of the MS to the custom protocol of the pixel telescope). The system was fully tested with proton and ion beams, and several million events were collected in 2002 and 2003. This paper presents the readout architecture of NA60, with particular emphasis on the PCI layer common to all the subdetectors. (16 refs).

  16. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  17. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  18. Efficiency of different protocols for enamel clean-up after bracket debonding: an in vitro study

    Directory of Open Access Journals (Sweden)

    Lara Carvalho Freitas Sigilião

    2015-10-01

    Full Text Available Objective: This study aimed to assess the efficiency of six protocols for cleaning-up tooth enamel after bracket debonding.Methods:A total of 60 premolars were divided into six groups, according to the tools used for clean-up: 12-blade bur at low speed (G12L, 12-blade bur at high speed (G12H, 30-blade bur at low speed (G30L, DU10CO ORTHO polisher (GDU, Renew System (GR and Diagloss polisher (GD. Mean roughness (Ra and mean roughness depth (Rz of enamel surface were analyzed with a profilometer. Paired t-test was used to assess Ra and Rz before and after enamel clean-up. ANOVA/Tukey tests were used for intergroup comparison. The duration of removal procedures was recorded. The association between time and variation in enamel roughness (∆Ra, ∆Rz were evaluated by Pearson's correlation test. Enamel topography was assessed by scanning electron microscopy (SEM.Results:In Groups G12L and G12H, original enamel roughness did not change significantly. In Groups G30L, GDU, GR and GD, a smoother surface (p < 0.05 was found after clean-up. In Groups G30L and GD, the protocols used were more time-consuming than those used in the other groups. Negative and moderate correlation was observed between time and (∆Ra, ∆Rz; Ra and (∆Ra, ∆Rz; Rz (r = - 0.445, r = - 0.475, p < 0.01.Conclusion:All enamel clean-up protocols were efficient because they did not result in increased surface roughness. The longer the time spent performing the protocol, the lower the surface roughness.

  19. Ovarian dynamics in response to two modified intravaginal progesterone releasing device and oestradiol benzoate based ovulation synchronisation protocols designed for use in Brahman heifers.

    Science.gov (United States)

    Edwards, S A A; Atkinson, P C; Satake, N; Boe-Hansen, G; McGowan, M R

    2014-07-01

    The objective was to investigate the ovarian response of Brahman heifers to two modified ovulation synchronisation protocols developed to increase the proportion of normal synchronous ovulations. Experiment 1 characterised the growth of the ovulatory follicle in heifers (n=19) treated with an intravaginal progesterone releasing device (IPRD) and oestradiol benzoate (ODB), to determine the optimal time to induce ovulation. Using the findings from Experiment 1, Experiment 2 investigated the effect of reducing the duration of IPRD insertion and increasing the interval from IPRD removal to ODB treatment (modified protocol 1 - OPO-6; n=20), and omitting ODB treatment at the time of IPRD insertion (modified protocol 2 - PO-6; n=20). An IPRD (0.78 g progesterone) was inserted at Day 0 (OPO-8) or Day 2 (OPO-6 and PO-6) and all heifers also received 1 mg ODB i.m. Day 8: IPRD removed + 500 μg cloprostenol i.m. At 24 h (OPO-8) and 36 h (OPO-6 and PO-6) post IPRD removal: 1 mg ODB i.m. Fixed-time AI (FTAI) occurred at 54 h for OPO-8 and 72 h for OPO-6 and PO-6, post IPRD removal. After IPRD treatment all OPO-6 and OPO-8 heifers initiated a new follicular wave whereas 25% of PO-6 heifers failed. Diameter of the dominant follicle was larger at FTAI in the PO-6 (11.34 ± 0.50 mm) compared to the OPO-8 protocol (9.74 ± 0.51 mm; P<0.05), but similar to the OPO-6 protocol (10.52 ± 0.51 mm). Proportion of ovulations occurring 12 h prior and 24 h post FTAI was similar for the PO-6 (80%) and OPO-6 (75%) protocols but numerically lower in the OPO-8 heifers (60%). The apparent improvement in ovarian response in heifers treated with the modified protocols needs to be confirmed in larger field studies. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Accessibility in Public Buildings: Efficiency of Checklist Protocols.

    Science.gov (United States)

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checklist protocols. The study revolved around the use of a checklist protocol in assessments of two buildings in Stockholm: the new head office for the National Authority for Social Insurances (ASI) and the School of Architecture at the Royal Institute of Technology (KTH). The study included three groups: Group 1 and Group 2 consisted of 50 real estate managers employed by the ASI, while Group 3 consisted of three participants in a course at the KTH. The results were similar in all of the groups. The use of the checklist protocol generated queries, which related mainly to two factors: (1) the accompanying factsheet consisted of textual explanations with no drawings, photographs or illustrations and (2) the order of the questions in the checklist protocol was difficult to correlate with the two buildings' spatial logic of accessing, egressing and making use of the built space.

  1. Affirmative LGBT psychotherapy: Outcomes of a therapist training protocol.

    Science.gov (United States)

    Pepping, Christopher A; Lyons, Anthony; Morris, Eric M J

    2018-03-01

    Lesbian, gay, bisexual, and transgender (LGBT) people seek psychotherapy at high rates, and the importance of providing culturally appropriate and LGBT-affirmative psychotherapy has been widely acknowledged. Despite this, remarkably little research has investigated the effects of therapist training in LGBT-affirmative psychotherapy. Here we examined the effectiveness of a training protocol for LGBT-affirmative psychotherapy with 96 mental health professionals, ranging in therapeutic experience from LGBT clients following the training. Therapists also displayed reductions in homo-negativity and trans-negativity. Therapists' characteristics did not influence the extent to which they benefited from training. Specifically, years of clinical experience, therapist religiosity, and therapist psychological flexibility were unrelated to changes in attitudes, knowledge, and skills. The results of this study clearly suggest that providing training in LGBT-affirmative psychotherapy can enhance therapists' attitudes, knowledge, and skills. Of particular importance is that the benefits associated with such training appear to hold regardless of therapists' characteristics. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  2. OAI-PMH repositories : quality issues regarding metadata and protocol compliance, tutorial 1

    CERN Multimedia

    CERN. Geneva; Cole, Tim

    2005-01-01

    This tutorial will provide an overview of emerging guidelines and best practices for OAI data providers and how they relate to expectations and needs of service providers. The audience should already be familiar with OAI protocol basics and have at least some experience with either data provider or service provider implementations. The speakers will present both protocol compliance best practices and general recommendations for creating and disseminating high-quality "shareable metadata". Protocol best practices discussion will include coverage of OAI identifiers, date-stamps, deleted records, sets, resumption tokens, about containers, branding, errors conditions, HTTP server issues, and repository lifecycle issues. Discussion of what makes for good, shareable metadata will cover topics including character encoding, namespace and XML schema issues, metadata crosswalk issues, support of multiple metadata formats, general metadata authoring recommendations, specific recommendations for use of Dublin Core elemen...

  3. Assessing the Efficacy of an App-Based Method of Family Planning: The Dot Study Protocol.

    Science.gov (United States)

    Simmons, Rebecca G; Shattuck, Dominick C; Jennings, Victoria H

    2017-01-18

    assess pregnancy status over time. This paper outlines the protocol for this efficacy trial, following the Standard Protocol Items: Recommendations for Intervention Trials checklist, to provide an overview of the rationale, methodology, and analysis plan. Participants will be asked to provide daily sexual history data and periodically answer surveys administered through a call center or directly on their phone. Funding for the study was provided in 2013 under the United States Agency for International Development Fertility Awareness for Community Transformation project. Recruitment for the study will begin in January of 2017. The study is expected to last approximately 18 months, depending on recruitment. Findings on the study's primary outcomes are expected to be finalized by September 2018. Reproducibility and transparency, important aspects of all research, are particularly critical in developing new approaches to research design. This protocol outlines the first study to prospectively test both the efficacy (correct use) and effectiveness (actual use) of a pregnancy prevention app. This protocol and the processes it describes reflect the dynamic integration of mobile technologies, a call center, and Health Insurance Portability and Accountability Act-compliant study procedures. Future fertility app studies can build on our approaches to develop methodologies that can contribute to the evidence base around app-based methods of contraception. ClinicalTrials.gov NCT02833922; https://clinicaltrials.gov/ct2/show/NCT02833922 (Archived be WebCite at http://www.webcitation.org/6nDkr0e76). ©Rebecca G Simmons, Dominick C Shattuck, Victoria H Jennings. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 18.01.2017.

  4. The Dana Farber consortium protocol (DFCP) vs. classic Hyper-CVAD for treatment of acute lymphoblastic leukemia in patients <50 Y. Single institution experience.

    Science.gov (United States)

    Alabdulwahab, Amal S; Elsayed, Hussein G; Sherisher, Mohamed A; Zeeneldin, Ahmed; Alghamdi, Khalofa; Elbjeirami, Wafaa M

    2017-09-01

    The use of intensive pediatric protocols for the treatment of ALL is being extended to older adults. Analysis of the efficacy and toxicity results of pediatric DFCP vs. classic Hyper-CVAD protocol for the treatment of patients with ALL Hyper-CVAD for first line treatment of patients with ALL Hyper-CVAD protocol. CR rate was 90.7% for DFCP vs. 83.7 for Hyper-CVAD (p 0.7). 3 Y Leukemia free survival was 57.4% (70.9% for DFCP vs. 41.6% Hyper-CVAD P 0.1) while 3Y OS was 62.6%% for the whole group, 72.6% DFCP vs. 48.5% Hyper-CVAD, P 0.04. Those with age Hyper-CVAD related to gall stones. Osteonecrosis affected 5 patients on DFCP. pediatric protocols are feasible in patients younger than 50 Y and they are more active than classic adult protocols. Although modifications of adult protocols may improve their results, this had to be investigated in randomized controlled trials. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Ethical assessment of research protocols: the experience of the Research Ethics Committee of the Hospital Israelita Albert Einstein (HIAE

    Directory of Open Access Journals (Sweden)

    Sonia Maria Oliveira de Barros

    2005-03-01

    Full Text Available This is a review article on the origin of the ethical analysis ofresearch protocols, the Brazilian and International legislation,including the Research Ethics Committee of Hospital IsraelitaAlbert Einstein. Since 1997, when the Committee was validatedits role has been recognized as that of a consultant and educator,participating on local and national scientific events andcollaborating with researchers in order to improve their projectsand learn to recognize ethical dilemmas in their protocols.

  6. Comparative study of 2 oral care protocols in intensive care units.

    Science.gov (United States)

    Ory, Jérôme; Raybaud, Evelyne; Chabanne, Russell; Cosserant, Bernard; Faure, Jean Sébastien; Guérin, Renaud; Calvet, Laure; Pereira, Bruno; Mourgues, Charline; Guelon, Dominique; Traore, Ousmane

    2017-03-01

    The quality of oral care is important in limiting the emergence of ventilator-associated pneumonia (VAP) in intubated patients. Our main objective was to measure the quality improvement in oral care following the implementation of a new oral care protocol. We also monitored VAP rates. This was a cohort study of patients in 5 adult ICUs covering different specialties. During period 1, caregivers used a foam stick for oral care and during period 2 a stick and tooth brushing with aspiration. Oral chlorhexidine was used during both periods. The caregivers rated improvement in oral health on the basis of 4 criteria (tongue, mucous membranes, gingivae, and teeth). Caregiver satisfaction was also assessed. The incidence of VAP was monitored. A total of 2,030 intubated patients admitted to intensive care units benefited from oral care. The patient populations during the 2 periods were similar with regard to demographic data and VAP potential risk factors. Oral health was significantly better from the third day of oral care in period 2 onward (period 1, 6.4 ± 2.1; period 2, 5.6 ± 1.8; P = .043). Caregivers found the period 2 protocol easier to implement and more effective. VAP rates decreased significantly between the 2 periods (period 1, 12.8%; period 2, 8.5%; P = .002). Our study showed that the implementation of a simple strategy improved the quality of oral care of patients in intensive care units, and decreased VAP rates. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  7. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  8. Multi-centred mixed-methods PEPFAR HIV care & support public health evaluation: study protocol

    Directory of Open Access Journals (Sweden)

    Fayers Peter

    2010-09-01

    Full Text Available Abstract Background A public health response is essential to meet the multidimensional needs of patients and families affected by HIV disease in sub-Saharan Africa. In order to appraise curret provision of HIV care and support in East Africa, and to provide evidence-based direction to future care programming, and Public Health Evaluation was commissioned by the PEPFAR programme of the US Government. Methods/Design This paper described the 2-Phase international mixed methods study protocol utilising longitudinal outcome measurement, surveys, patient and family qualitative interviews and focus groups, staff qualitative interviews, health economics and document analysis. Aim 1 To describe the nature and scope of HIV care and support in two African countries, including the types of facilities available, clients seen, and availability of specific components of care [Study Phase 1]. Aim 2 To determine patient health outcomes over time and principle cost drivers [Study Phase 2]. The study objectives are as follows. 1 To undertake a cross-sectional survey of service configuration and activity by sampling 10% of the facilities being funded by PEPFAR to provide HIV care and support in Kenya and Uganda (Phase 1 in order to describe care currently provided, including pharmacy drug reviews to determine availability and supply of essential drugs in HIV management. 2 To conduct patient focus group discussions at each of these (Phase 1 to determine care received. 3 To undertake a longitudinal prospective study of 1200 patients who are newly diagnosed with HIV or patients with HIV who present with a new problem attending PEPFAR care and support services. Data collection includes self-reported quality of life, core palliative outcomes and components of care received (Phase 2. 4 To conduct qualitative interviews with staff, patients and carers in order to explore and understand service issues and care provision in more depth (Phase 2. 5 To undertake document

  9. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A; Zulkarnain, Zuriati A

    2016-06-22

    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.

  10. Reduction in Wound Complications After Total Ankle Arthroplasty Using a Compression Wrap Protocol.

    Science.gov (United States)

    Schipper, Oliver N; Hsu, Andrew R; Haddad, Steven L

    2015-12-01

    The purpose of this study was to evaluate the clinical differences in wound complications after total ankle arthroplasty (TAA) between a cohort of patients that received a compression wrap protocol and a historical control group treated with cast immobilization. Patient charts and postoperative wound pictures were reviewed for 42 patients who underwent a compression wrap protocol and 50 patients who underwent circumferential casting after primary TAA from 2008 to 2013. A blinded reviewer graded each wound using a novel postoperative wound classification system, and recorded whether the wound was completely healed by or after 3 months. A second blinded review was performed to determine intraobserver reliability. Mean patient age was 55 years (range, 24-80) and all patients had at least 6-month follow-up. There were significantly more total wound complications (P = .02) and mild wound complications (P = .02) in the casted group compared to the compression wrap group. There were no significant differences in the number of moderate and severe complications between each group. A significantly higher proportion of TAA incisions took longer than 3 months to heal in the casted group (P = .02). Based on our clinical experience with postoperative wound care after TAA, use of a compression wrap protocol was safe and effective at reducing wound-related complications, and well tolerated by patients. Further prospective, randomized clinical trials are warranted to evaluate the utility and cost-effectiveness of a compression wrap protocol after TAA. © The Author(s) 2015.

  11. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    OpenAIRE

    RIBEIRO, CHRISTIE GRAF; MOREIRA, ANA TEREZA RAMOS; PINTO, JOSÉ SIMÃO DE PAULA; MALAFAIA, OSVALDO

    2016-01-01

    ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). Methods: this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) compute...

  12. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  13. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  14. Energy-efficient TDMA medium access control protocol scheduling

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerard J.M.

    2000-01-01

    In this paper we study the energy efficiency and channel efficiency of TDMA MAC protocol scheduling mechanisms. Most MAC protocols are based on phase grouping that basically has three phases in a frame: uplink, downlink and reservation. We propose a new mechanism in which we have multiple uplink and

  15. Characterisation of exposure to non-ionising electromagnetic fields in the Spanish INMA birth cohort: Study protocol

    NARCIS (Netherlands)

    M. Gallastegi (Mara); M. Guxens Junyent (Mònica); A. Jiménez-Zabala (Ana); I. Calvente (Irene); M. Fernández (Marta); L. Birks (Laura); B. Struchen (Benjamin); M. Vrijheid (Martine); M. Estarlich (Marisa); M.F. Fernandez (Mariana); M. Torrent (Maties); F. Ballester (Ferran); J.J. Aurrekoetxea (Juan José); J. Ibarluzea (Jesús); D. Guerra (David); J. González (Julián); M. Röösli (Martin); L. Santa-Marina (Loreto)

    2016-01-01

    textabstractBackground: Analysis of the association between exposure to electromagnetic fields of non-ionising radiation (EMF-NIR) and health in children and adolescents is hindered by the limited availability of data, mainly due to the difficulties on the exposure assessment. This study protocol

  16. An Experimental Protocol for Maternal Pulmonary Exposure in Developmental Toxicology

    DEFF Research Database (Denmark)

    Jackson, Petra; Lund, Søren P.; Kristiansen, Gitte

    2011-01-01

    To establish a protocol for studying effects of pulmonary exposure in developmental toxicity studies, the effects of intratracheal sham instillation under short-term isoflurane anaesthesia were evaluated with a protocol including multiple instillations during gestation. Twelve time-mated mice (C5...

  17. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  18. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  19. Optimised low-dose multidetector CT protocol for children with cranial deformity

    Energy Technology Data Exchange (ETDEWEB)

    Vazquez, Jose Luis [Complejo Hospitalario Universitario de Vigo, Department of Radiology, Vigo, Pontevedra (Spain); Pombar, Miguel Angel [Complejo Hospitalario Universitario de Santiago, Department of Radiophysics, Santiago de Compostela, La Coruna (Spain); Pumar, Jose Manuel [Complejo Hospitalario Universitario de Santiago, Department of Radiology, Santiago de Compostela, La Coruna (Spain); Campo, Victor Miguel del [Complejo Hospitalario Universitario de Vigo, Department of Public Health, Vigo, Pontevedra (Spain)

    2013-08-15

    To present an optimised low-dose multidetector computed tomography (MDCT) protocol for the study of children with cranial deformity. Ninety-one consecutive MDCT studies were performed in 80 children. Studies were performed with either our standard head CT protocol (group 1, n = 20) or a low-dose cranial deformity protocol (groups 2 and 3). Group 2 (n = 38), initial, and group 3 (n = 33), final and more optimised. All studies were performed in the same 64-MDCT equipment. Cranial deformity protocol was gradationally optimised decreasing kVp, limiting mA range, using automatic exposure control (AEC) and increasing the noise index (NI). Image quality was assessed. Dose indicators such us CT dose index volume (CTDIvol), dose-length product (DLP) and effective dose (E) were used. The optimised low-dose protocol reached the following values: 80 kVp, mA range: 50-150 and NI = 23. We achieved a maximum dose reduction of 10-22 times in the 1- to 12-month-old cranium in regard to the 2004 European guidelines for MDCT. A low-dose MDCT protocol that may be used as the first diagnostic imaging option in clinically selected patients with skull abnormalities. (orig.)

  20. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  1. A Novel UDT-Based Transfer Speed-Up Protocol for Fog Computing

    Directory of Open Access Journals (Sweden)

    Zhijie Han

    2018-01-01

    Full Text Available Fog computing is a distributed computing model as the middle layer between the cloud data center and the IoT device/sensor. It provides computing, network, and storage devices so that cloud based services can be closer to IOT devices and sensors. Cloud computing requires a lot of bandwidth, and the bandwidth of the wireless network is limited. In contrast, the amount of bandwidth required for “fog computing” is much less. In this paper, we improved a new protocol Peer Assistant UDT-Based Data Transfer Protocol (PaUDT, applied to Iot-Cloud computing. Furthermore, we compared the efficiency of the congestion control algorithm of UDT with the Adobe’s Secure Real-Time Media Flow Protocol (RTMFP, based on UDP completely at the transport layer. At last, we built an evaluation model of UDT in RTT and bit error ratio which describes the performance. The theoretical analysis and experiment result have shown that UDT has good performance in IoT-Cloud computing.

  2. Quantitative methods for studying design protocols

    CERN Document Server

    Kan, Jeff WT

    2017-01-01

    This book is aimed at researchers and students who would like to engage in and deepen their understanding of design cognition research. The book presents new approaches for analyzing design thinking and proposes methods of measuring design processes. These methods seek to quantify design issues and design processes that are defined based on notions from the Function-Behavior-Structure (FBS) design ontology and from linkography. A linkograph is a network of linked design moves or segments. FBS ontology concepts have been used in both design theory and design thinking research and have yielded numerous results. Linkography is one of the most influential and elegant design cognition research methods. In this book Kan and Gero provide novel and state-of-the-art methods of analyzing design protocols that offer insights into design cognition by integrating segmentation with linkography by assigning FBS-based codes to design moves or segments and treating links as FBS transformation processes. They propose and test ...

  3. MANET Performance for Source and Destination Moving Scenarios Considering OLSR and AODV protocols

    Directory of Open Access Journals (Sweden)

    Elis Kulla

    2010-01-01

    Full Text Available Recently, a great interest is shown in MANETs potential usage and applications in several fields such as military activities, rescue operations and time-critical applications. In this work, we implement and analyse a MANET testbed considering AODV and OLSR protocols for wireless multi-hop networking. We investigate the effect of mobility and topology changing in MANET and evaluate the performance of the network through experiments in a real environment. The performance assessment of our testbed is done considering throughput, number of dropped packets and delay. We designed four scenarios: Static, Source Moving, Destination Moving and Source-Destination Moving. From our experimental results, we concluded that when the communicating nodes are moving and the routes change quickly, OLSR (as a proactive protocol performs better than AODV, which is a reactive protocol.

  4. Study about the behaviour of fishways in laboratory. Experiments 2009-2010

    International Nuclear Information System (INIS)

    Lara Dominguez, A.; Aramburu Godinez, E.; Berges Acedo, J. A.; Morcillo Alonso, F.; Castillo Blanco, M.

    2011-01-01

    The Hydraulic Laboratory of the Center for Hydro graphic Studies (CEDEX) is carrying out a study about the behaviour of some salmonid and cryprinid fish species in a vertical slot fishways built in the Laboratory, in order to know the relationship between hydraulic and biological parameters and to obtain valid design criteria. Its the first time in our country that fish are been monitored in a fishways using a RFD system, underwater and cenital cameras. First at all, the hydraulic of this typology has been characterised. An experiment protocol has been established to optimize the results. Regarding fish movements in the fishways, on the one hand we have found that fish always rest ascending the pass and, on the other, an influence of the flow on the percentage of fish that ascend the whole pass. Moreover, a tool analyze the efficiency of a fish way model according to biological criteria has been contrasted but it needs to be calibrated with biological variables obtained from native fish species. concerning fish fatigue and effort, studies about physiological parameters in plasma (hematocrit, glucose, cortisol and lactate) have implemented and the results point out the need to increase the studies with physiological parameters in muscle. (Author) 14 refs.

  5. Benchmarking pediatric cranial CT protocols using a dose tracking software system: a multicenter study.

    Science.gov (United States)

    De Bondt, Timo; Mulkens, Tom; Zanca, Federica; Pyfferoen, Lotte; Casselman, Jan W; Parizel, Paul M

    2017-02-01

    To benchmark regional standard practice for paediatric cranial CT-procedures in terms of radiation dose and acquisition parameters. Paediatric cranial CT-data were retrospectively collected during a 1-year period, in 3 different hospitals of the same country. A dose tracking system was used to automatically gather information. Dose (CTDI and DLP), scan length, amount of retakes and demographic data were stratified by age and clinical indication; appropriate use of child-specific protocols was assessed. In total, 296 paediatric cranial CT-procedures were collected. Although the median dose of each hospital was below national and international diagnostic reference level (DRL) for all age categories, statistically significant (p-value benchmarking showed that further dose optimization and standardization is possible by using age-stratified protocols for paediatric cranial CT. Moreover, having a dose tracking system revealed that adult protocols are still applied for paediatric CT, a practice that must be avoided. • Significant differences were observed in the delivered dose between age-groups and hospitals. • Using age-adapted scanning protocols gives a nearly linear dose increase. • Sharing dose-data can be a trigger for hospitals to reduce dose levels.

  6. Factors that impact on the use of mechanical ventilation weaning protocols in critically ill adults and children: a qualitative evidence-synthesis.

    Science.gov (United States)

    Jordan, Joanne; Rose, Louise; Dainty, Katie N; Noyes, Jane; Blackwood, Bronagh

    2016-10-04

    the trials included in the effectiveness reviews as well as of studies (potentially) included in the qualitative synthesis, conducted citation searches of the publications reporting these studies, and contacted content experts.We reran the search on 3rd July 2016 and found three studies, which are awaiting classification. We included qualitative studies that described: the circumstances in which protocols are designed, implemented or used, or both, and the views and experiences of healthcare professionals either involved in the design, implementation or use of weaning protocols or involved in the weaning of critically-ill adults and children from mechanical ventilation not using protocols. We included studies that: reflected on any aspect of the use of protocols, explored contextual factors relevant to the development, implementation or use of weaning protocols, and reported contextual phenomena and outcomes identified as relevant to the effectiveness of protocolized weaning from mechanical ventilation. At each stage, two review authors undertook designated tasks, with the results shared amongst the wider team for discussion and final development. We independently reviewed all retrieved titles, abstracts and full papers for inclusion, and independently extracted selected data from included studies. We used the findings of the included studies to develop a new set of analytic themes focused on the barriers and facilitators to the use of protocols, and further refined them to produce a set of summary statements. We used the Confidence in the Evidence from Reviews of Qualitative Research (CERQual) framework to arrive at a final assessment of the overall confidence of the evidence used in the synthesis. We included all studies but undertook two sensitivity analyses to determine how the removal of certain bodies of evidence impacted on the content and confidence of the synthesis. We deployed a logic model to integrate the findings of the qualitative evidence synthesis with

  7. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  8. Better movers and thinkers (BMT: A quasi-experimental study into the impact of physical education on children's cognition—A study protocol

    Directory of Open Access Journals (Sweden)

    Andrew Dalziell

    2015-01-01

    This protocol provides the details of the rationale and design of the study and details of the intervention, outcome measures, and the recruitment process. The study will address gaps within current research by evaluating if a change of approach in the delivery of PE within schools has an effect on children's cognition, PA habits, and GMC within a Scottish setting.

  9. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  10. Protocol for the building construction process. Results of the implementation trajectory protocols EWN and EUN. Annexes; Opnameprotocol versterkt bouwkolom. Resultaten implementatietraject opnameprotocollen EWN en EUN. Bijlagen

    Energy Technology Data Exchange (ETDEWEB)

    Neeleman, J.; Uitbeijerse, G.C.M. [DWA installatie- en energieadvies, Duitslandweg 4, Postbus 274, 2410 AG Bodegraven (Netherlands)

    2013-04-15

    In the year 2012 it was foreseen to base the energy label for new buildings on the Energy Efficiency Coefficient (EPC in Dutch). This is a protocol for residential and utility buildings, with the aim to check whether and to what extent buildings were constructed according the EPC and to determine the realized EPC. In order to gain experience with the new protocols and the voluntary ventilation test the Protocol for the Energy Label for New Houses (EWN in Dutch) and the Protocol for the Energy Label for New Utility Buildings (EUN in Dutch) were conducted in 12 newly built housing projects and 5 projects in the utility building sector. This report presents the annexes [Dutch] In het jaar 2012 was voorzien om het nieuwbouwlabel te baseren op de EPC (Energie Prestatie Coefficient). Hiervoor is een opnameprotocol opgesteld voor de woningbouw en de utiliteitsbouw, met als doel te controleren of en in hoeverre conform de EPC is gebouwd en om de gerealiseerde EPC te bepalen. Om ervaring op te doen met de nieuwe opnameprotocollen en de vrijwillige ventilatietoets werden het Opnameprotocol Energielabel Woningen Nieuwbouw (EWN) en Opnameprotocol Energielabel Utiliteitsgebouwen Nieuwbouw (EUN) uitgevoerd bij 12 nieuwbouwprojecten in de woningbouw en 5 projecten in de utiliteitsbouw. In dit rapport worden de bijlagen weergegeven.

  11. Standardized Duplex Ultrasound-Based Protocol for Early Diagnosis of Transplant Renal Artery Stenosis: Results of a Single-Institution Retrospective Cohort Study

    Directory of Open Access Journals (Sweden)

    Vincenzo Li Marzi

    2018-01-01

    Full Text Available Transplant renal artery stenosis (TRAS is the most frequent vascular complication after kidney transplantation (KT and has been associated with potentially reversible refractory hypertension, graft dysfunction, and reduced patient survival. The aim of the study is to describe the outcomes of a standardized Duplex Ultrasound- (DU- based screening protocol for early diagnosis of TRAS and for selection of patients potentially requiring endovascular intervention. We retrospectively reviewed our prospectively collected database of KT from January 1998 to select patients diagnosed with TRAS. The follow-up protocol was based on a risk-adapted, dynamic subdivision of eligible KT patients in different risk categories (RC with different protocol strategies (PS. Of 598 patients included in the study, 52 (9% patients had hemodynamically significant TRAS and underwent percutaneous angioplasty (PTA and stent placement. Technical and clinical success rates were 97% and 90%, respectively. 7 cases of restenosis were recorded at follow-up and treated with re-PTA plus stenting. Both DU imaging and clinical parameters improved after stent placement. Prospective high-quality studies are needed to test the efficacy and safety of our protocol in larger series. Accurate trial design and standardized reporting of patient outcomes will be key to address the current clinical needs.

  12. Studies of future readout links for the CMS experiment

    CERN Document Server

    Bukowiec, Sebastian

    2010-01-01

    This paper studies a possible replacement of the existing S-LINK64 implementation by an optical link, based on 10 Gigabit Ethernet. The new link will employ commercial protocols in order to be able to receive the data by standard hardware components like PCs or network switches. Currently prototypes using multiple Gigabit Ethernet links are being developed and tested. The paper summarizes the status of these studies.

  13. FF-LYNX: protocol and interfaces for the control and readout of future Silicon detectors

    Energy Technology Data Exchange (ETDEWEB)

    Amendola, A; Bianchi, G; Fanucci, L; Saponara, S; Tongiani, C [Universita di Pisa, Dipartimento di Ingegneria dell' Informazione (DII-EIT), Via G. Caruso 16, 56122 Pisa (Italy); Castaldi, R; Minuti, M; Verdini, P G [INFN, Sezione di Pisa, Largo B. Pontecorvo 3, 56018 Pisa (Italy); Incandela, J; Magazzu, G; Rossin, R, E-mail: Guido.Magazzu@pi.infn.i [University of California at Santa Barbara (UCSB), Department of Physics, 5113 Broida Hall, CA 93106 Santa Barbara (United States)

    2010-06-15

    The FF-LYNX protocol provides an innovative solution for the integrated distribution of Timing, Trigger and Control signals and the data readout in future High Energy Physics experiments. Transmitter and receiver interfaces implementing the FF-LYNX protocol have been simulated with a high-level simulator and in an FPGA based emulator. The design of the interfaces in a commercial CMOS technology as radiation tolerant and low power modules is ongoing and the submission of a test circuit is foreseen in fall 2010. The key features of the protocol are described in this paper as well as its possible application for the transmission from Silicon Trackers to trigger processors with short and constant latency of data to be used for the L1 trigger generation.

  14. Effects of a dynamic balance training protocol on podalic support in older women. Pilot Study.

    Science.gov (United States)

    Battaglia, Giuseppe; Bellafiore, Marianna; Bianco, Antonino; Paoli, Antonio; Palma, Antonio

    2010-01-01

    The foot provides the only direct contact with supporting surfaces and therefore plays an important role in all postural tasks. Changes in the musculoskeletal and neurological characteristics of the foot with advancing age can alter plantar loading patterns and postural balance. Several studies have reported that exercise training improves postural performance in elderly individuals. The aim of our study was to investigate the effectiveness of a dynamic balance training protocol performed for 5 weeks on the support surface, percentage distribution of load in both feet, and body balance performance in healthy elderly women. Ten subjects (68.67±5.50 yrs old; 28.17±3.35 BMI) were evaluated with a monopodalic performance test and baropodometric analyses before and after the training period. We found a significant improvement in balance unipedal performance times on left and right foot by 20.18% and 26.23% respectively (p0.05). The increased support surface and equal redistribution of body weight on both feet obtained in response to our training protocol may be postural adaptations sufficient to improve static balance in elderly women.

  15. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  16. Analysing Password Protocol Security Against Off-line Dictionary Attacks

    NARCIS (Netherlands)

    Corin, R.J.; Doumen, J.M.; Etalle, Sandro; Busi, Nadia; Gorrieri, Roberto; Martinelli, Fabio

    We study the security of password protocols against off-line dictionary attacks. In addition to the standard adversary abilities, we also consider further cryptographic advantages given to the adversary when considering the password protocol being instantiated with particular encryption schemes. We

  17. Protocol dependence of mechanical properties in granular systems.

    Science.gov (United States)

    Inagaki, S; Otsuki, M; Sasa, S

    2011-11-01

    We study the protocol dependence of the mechanical properties of granular media by means of computer simulations. We control a protocol of realizing disk packings in a systematic manner. In 2D, by keeping material properties of the constituents identical, we carry out compaction with various strain rates. The disk packings exhibit the strain rate dependence of the critical packing fraction above which the pressure becomes non-zero. The observed behavior contrasts with the well-studied jamming transitions for frictionless disk packings. We also observe that the elastic moduli of the disk packings depend on the strain rate logarithmically. Our results suggest that there exists a time-dependent state variable to describe macroscopic material properties of disk packings, which depend on its protocol.

  18. Coping-Infused Dialogue through Patient-Preferred Live Music: A Medical Music Therapy Protocol and Randomized Pilot Study for Hospitalized Organ Transplant Patients.

    Science.gov (United States)

    Hogan, Tyler James; Silverman, Michael J

    2015-01-01

    Solid organ transplant patients often experience a variety of psychosocial stressors that can lead to distress and may hinder successful recovery. Using coping-infused dialogue (CID) through patient- preferred live music (PPLM) music therapy sessions may improve mood and decrease pain while also imparting psychoeducational knowledge concerning the identification of local and global problems and coping skills. The purpose of this pilot study was to develop a coping-based medical music therapy protocol that combines coping-infused dialogue (CID) with patient-preferred live music (PPLM) and measure the effects of the resulting CID-PPLM protocol on mood (positive and negative affect) and pain in hospitalized transplant patients. Our study used a pre-/posttest single-session wait-list control design. Participants (N=25) were randomly assigned to experimental (CID-PPLM) or control (usual care) conditions. Participants in the CID-PPLM condition received a single 30-minute session that integrated stressor identification and knowledge of coping skills (CID) with patient-preferred live music (PPLM). Results indicated no between-group differences at pretest and significant correlations between pre- and posttest measures. Concerning posttest ANCOVA analyses, there were significant between-group differences in positive affect, negative affect, and pain, with experimental participants having more favorable posttest scores than control participants. Effect sizes were in the medium-to-large range for positive affect (η2=.198), negative affect (η2=.422), and pain (η2=.303). CID through receptive PPLM may be an effective protocol for improving mood and decreasing pain in organ transplant recipients. MT interventions can be an important tool to develop rapport and enhance outcomes with patients. As greater engagement during interventions may have stronger treatment effects, we recommend future research examining patient engagement as a potential mediator of intervention effects

  19. Shoulder muscle endurance: the development of a standardized and reliable protocol

    Directory of Open Access Journals (Sweden)

    Roy Jean-Sébastien

    2011-01-01

    Full Text Available Abstract Background Shoulder muscle fatigue has been proposed as a possible link to explain the association between repetitive arm use and the development of rotator cuff disorders. To our knowledge, no standardized clinical endurance protocol has been developed to evaluate the effects of muscle fatigue on shoulder function. Such a test could improve clinical examination of individuals with shoulder disorders. Therefore, the purpose of this study was to establish a reliable protocol for objective assessment of shoulder muscle endurance. Methods An endurance protocol was developed on a stationary dynamometer (Biodex System 3. The endurance protocol was performed in isotonic mode with the resistance set at 50% of each subject's peak torque as measured for shoulder external (ER and internal rotation (IR. Each subject performed 60 continuous repetitions of IR/ER rotation. The endurance protocol was performed by 36 healthy individuals on two separate occasions at least two days apart. Maximal isometric shoulder strength tests were performed before and after the fatigue protocol to evaluate the effects of the endurance protocol and its reliability. Paired t-tests were used to evaluate the reduction in shoulder strength due to the protocol, while intraclass correlation coefficients (ICC and minimal detectable change (MDC were used to evaluate its reliability. Results Maximal isometric strength was significantly decreased after the endurance protocol (P 0.84. Conclusions Changes in muscular performance observed during and after the muscular endurance protocol suggests that the protocol did result in muscular fatigue. Furthermore, this study established that the resultant effects of fatigue of the proposed isotonic protocol were reproducible over time. The protocol was performed without difficulty by all volunteers and took less than 10 minutes to perform, suggesting that it might be feasible for clinical practice. This protocol could be used to induce

  20. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  1. SU-F-207-16: CT Protocols Optimization Using Model Observer

    International Nuclear Information System (INIS)

    Tseng, H; Fan, J; Kupinski, M

    2015-01-01

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear

  2. SU-F-207-16: CT Protocols Optimization Using Model Observer

    Energy Technology Data Exchange (ETDEWEB)

    Tseng, H [University of Arizona, Tucson, AZ (United States); Fan, J [CT Systems Engineering, GE Healthcare, Waukesha, Wisconsin (United States); Kupinski, M [Univ Arizona, Tucson, AZ (United States)

    2015-06-15

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear.

  3. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  4. Protocol to monitor trade agreement food-related aspects: the Fiji case study.

    Science.gov (United States)

    Ravuvu, Amerita; Friel, Sharon; Thow, Anne Marie; Snowdon, Wendy; Wate, Jillian

    2017-04-26

    Despite the growing rates of obesity and diet-related non-communicable diseases, globally, public health attention has only relatively recently turned to the links between trade agreements and the nutritional risks associated with it. Specific trade agreements appear to have played an influential role in the volume and types of foods entering different countries, yet there is currently no systematic and objective monitoring of trade agreements for their impacts on food environments. Recently, INFORMAS was set up to monitor and benchmark food environments, government policies and private sector actions within countries and globally. One of its projects/modules focuses on trade policy and in particular the food-related aspects of trade agreements. This paper describes the INFORMAS trade protocol, an approach to collecting food-related information about four domains of trade: trade in goods; trade in services and foreign direct investment; domestic supports, and policy space. Specifically, the protocol is tested in Fiji. The development and testing of this protocol in Fiji represents the first effort to set out a framework and process for objectively monitoring trade agreements and their impacts on national food supply and the wider food environment. It has shown that entry into WTO trade agreements contributed to the nutrition transition in Fiji through the increased availability of imported foods with varying nutritional quality. We observed an increase in imports of both healthy and less healthy foods. The application of the monitoring protocol also highlights challenges for data collection associated with each trade domain that should be considered for future data collection and analysis in other low and middle income countries. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  6. Protocol d'inicialització de sessió SIP

    OpenAIRE

    Ibrahem Fernández, Samer

    2006-01-01

    Aquest projecte té com a finalitat estudiar el protocol SIP i desenvolupar una aplicació que l'implementi. Este proyecto tiene como finalidad estudiar el protocolo SIP y desarrollar una aplicación que la implemente The purpose of this project is to study the SIP protocol and develop an application that implements it.

  7. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  8. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal; Ismail, Amr; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2013-01-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  9. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    Science.gov (United States)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  10. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials.

    Directory of Open Access Journals (Sweden)

    Benjamin Kasenda

    2016-06-01

    Full Text Available Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i the existence and types of publication agreements in trial protocols, (ii the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii the frequency of co-authorship by industry employees.We used a retrospective cohort of randomized clinical trials (RCTs based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5% mentioned an agreement regarding publication of results. Of these 456, 393 (86.2% documented an industry partner's right to disapprove or at least review proposed manuscripts; 39 (8.6% agreements were without constraints of publication. The remaining 24 (5.3% protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0% trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]. Of 71 agreements reported in publications, 52 (73.2% were concordant with those documented in the protocol. In 14 of 37 (37.8% publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements.Publication agreements constraining academic authors' independence are common. Journal articles seldom report on publication agreements, and, if they do

  11. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials

    Science.gov (United States)

    Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias

    2016-01-01

    Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on

  12. An example of the treatment protocol in the case of a patient who has received a radioactive product

    International Nuclear Information System (INIS)

    Izambard, N.

    2011-01-01

    At the end of 2009, the Radiation Protection Unit at Rouen University Hospital (Rouen CHU), took part in discussions initiated by the hospital's protocol review board (Nursing Care Directorate) regarding management of all hospital waste produced during health care activities (including activities involving radioactive materials) with a view to complying with French National Authority for Health requirements. Moreover, these new provisions had to incorporate management procedures relative to radioactive waste from the radio analysis laboratory at the hospital's Clinical Biology Institute in accordance with the Order of 23 July 2008. To this end, a study was carried out on the university hospital departments in question, in conjunction with the nuclear medicine department of the neighbouring Henry-Becquerel Regional Cancer Centre (CRLCC), the major producer of radioactive waste. This document presents the new protocol that takes into account the feedback experience from Rouen CHU and the CRLCC. This protocol is based on a better writing down and availability of all the information concerning the treatment received by the patient during his stay at the hospital. This protocol will allow a better identification of the waste and as a consequence a better optimization of its disposal

  13. Detecting child abuse based on parental characteristics: does the Hague Protocol cause parents to avoid the emergency department?

    Science.gov (United States)

    Diderich, Hester M; Fekkes, Minne; Dechesne, Mark; Buitendijk, Simone E; Oudesluys-Murphy, Anne Marie

    2015-04-01

    The Hague Protocol is used by professionals at the adult Emergency Departments (ED) in The Netherlands to detect child abuse based on three parental characteristics: (1) domestic violence, (2) substance abuse or (3) suicide attempt or self-harm. After detection, a referral is made to the Reporting Center for Child Abuse and Neglect (RCCAN). This study investigates whether implementing this Protocol will lead parents to avoid medical care. We compared the number of patients (for whom the Protocol applied) who attended the ED prior to implementation with those attending after implementation. We conducted telephone interviews (n = 14) with parents whose children were referred to the RCCAN to investigate their experience with the procedure. We found no decline in the number of patients, included in the Protocol, visiting the ED during the 4 year implementation period (2008-2011). Most parents (n = 10 of the 14 interviewed) were positive and stated that they would, if necessary, re-attend the ED with the same complaints in the future. ED nurses and doctors referring children based on parental characteristics do not have to fear losing these families as patients. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  15. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    International Nuclear Information System (INIS)

    Wu, D; France, E; Lambert, J; Hinkle, J

    2016-01-01

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articles were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse

  16. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    Energy Technology Data Exchange (ETDEWEB)

    Wu, D; France, E; Lambert, J; Hinkle, J [The University of Oklahoma Health Sciences Center, Oklahoma City, OK (United States)

    2016-06-15

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articles were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse

  17. Short and long-term effectiveness of couple counselling: a study protocol

    Directory of Open Access Journals (Sweden)

    Schofield Margot J

    2012-09-01

    Full Text Available Abstract Background Healthy couple relationships are fundamental to a healthy society, whereas relationship breakdown and discord are linked to a wide range of negative health and wellbeing outcomes. Two types of relationship services (couple counselling and relationship education have demonstrated efficacy in many controlled studies but evidence of the effectiveness of community-based relationship services has lagged behind. This study protocol describes an effectiveness evaluation of the two types of community-based relationship services. The aims of the Evaluation of Couple Counselling study are to: map the profiles of clients seeking agency-based couple counselling and relationship enhancement programs in terms of socio-demographic, relationship, health, and health service use indicators; to determine 3 and 12-month outcomes for relationship satisfaction, commitment, and depression; and determine relative contributions of client and therapy factors to outcomes. Methods/Design A quasi-experimental pre-post-post evaluation design is used to assess outcomes for couples presenting for the two types of community-based relationship services. The longitudinal design involves a pre-treatment survey and two follow-up surveys at 3- and 12-months post-intervention. The study is set in eight Relationships Australia Victoria centres, across metropolitan, outer suburbs, and regional/rural sites. Relationships Australia, a non-government organisation, is the largest provider of couple counselling and relationship services in Australia. The key outcomes are couple satisfaction, relationship commitment, and depression measured by the CESD-10. Multi-level modelling will be used to account for the dyadic nature of couple data. Discussion The study protocol describes the first large scale investigation of the effectiveness of two types of relationship services to be conducted in Australia. Its significance lies in providing more detailed profiles of couples who

  18. Assessment of Adverse Events in Protocols, Clinical Study Reports, and Published Papers of Trials of Orlistat: A Document Analysis.

    Directory of Open Access Journals (Sweden)

    Jeppe Bennekou Schroll

    2016-08-01

    Full Text Available Little is known about how adverse events are summarised and reported in trials, as detailed information is usually considered confidential. We have acquired clinical study reports (CSRs from the European Medicines Agency through the Freedom of Information Act. The CSRs describe the results of studies conducted as part of the application for marketing authorisation for the slimming pill orlistat. The purpose of this study was to study how adverse events were summarised and reported in study protocols, CSRs, and published papers of orlistat trials.We received the CSRs from seven randomised placebo controlled orlistat trials (4,225 participants submitted by Roche. The CSRs consisted of 8,716 pages and included protocols. Two researchers independently extracted data on adverse events from protocols and CSRs. Corresponding published papers were identified on PubMed and adverse event data were extracted from this source as well. All three sources were compared. Individual adverse events from one trial were summed and compared to the totals in the summary report. None of the protocols or CSRs contained instructions for investigators on how to question participants about adverse events. In CSRs, gastrointestinal adverse events were only coded if the participant reported that they were "bothersome," a condition that was not specified in the protocol for two of the trials. Serious adverse events were assessed for relationship to the drug by the sponsor, and all adverse events were coded by the sponsor using a glossary that could be updated by the sponsor. The criteria for withdrawal due to adverse events were in one case related to efficacy (high fasting glucose led to withdrawal, which meant that one trial had more withdrawals due to adverse events in the placebo group. Finally, only between 3% and 33% of the total number of investigator-reported adverse events from the trials were reported in the publications because of post hoc filters, though six of

  19. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  20. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  1. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  2. Development and validation of a remote home safety protocol.

    Science.gov (United States)

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  3. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  4. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  5. Protocol for Bone Augmentation with Simultaneous Early Implant Placement: A Retrospective Multicenter Clinical Study

    Directory of Open Access Journals (Sweden)

    Peter Fairbairn

    2015-01-01

    Full Text Available Purpose. To present a novel protocol for alveolar bone regeneration in parallel to early implant placement. Methods. 497 patients in need of extraction and early implant placement with simultaneous bone augmentation were treated in a period of 10 years. In all patients the same specific method was followed and grafting was performed utilizing in situ hardening fully resorbable alloplastic grafting materials consisting of β-tricalcium phosphate and calcium sulfate. The protocol involved atraumatic extraction, implant placement after 4 weeks with simultaneous bone augmentation, and loading of the implant 12 weeks after placement and grafting. Follow-up periods ranged from 6 months to 10 years (mean of 4 years. Results. A total of 601 postextraction sites were rehabilitated in 497 patients utilizing the novel protocol. Three implants failed before loading and three implants failed one year after loading, leaving an overall survival rate of 99.0%. Conclusions. This standardized protocol allows successful long-term functional results regarding alveolar bone regeneration and implant rehabilitation. The concept of placing the implant 4 weeks after extraction, augmenting the bone around the implant utilizing fully resorbable, biomechanically stable, alloplastic materials, and loading the implant at 12 weeks seems to offer advantages when compared with traditional treatment modalities.

  6. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  7. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  8. Comparison of microdose flare-up and antagonist multiple-dose protocols for poor-responder patients: a randomized study.

    Science.gov (United States)

    Demirol, Aygul; Gurgan, Timur

    2009-08-01

    To compare the efficacy of the microdose flare-up and multiple-dose antagonist protocols for poor-responder patients in intracytoplasmic sperm injection-ET cycles. A randomized, prospective study. Center for assisted reproductive technology in Turkey. Ninety patients with poor ovarian response in a minimum of two previous IVF cycles. All women were prospectively randomized into two groups by computer-assisted randomization. The patients in group 1 were stimulated according to the microdose flare-up protocol (n = 45), while the patients in group 2 were stimulated according to antagonist multiple-dose protocol (n = 45). The mean number of mature oocytes retrieved was the primary outcome measure, and fertilization rate, implantation rate per embryo, and clinical pregnancy rates were secondary outcome measures. The mean age of the women, the mean duration of infertility, basal FSH level, and the number of previous IVF cycles were similar in both groups. The total gonadotropin dose used was significantly higher in group 2, while the number of oocytes retrieved was significantly greater in group 1. Although the fertilization and clinical pregnancy rates were nonsignificantly higher in group 1 compared with group 2, the implantation rate was significantly higher in the microdose flare-up group than in the multiple-dose antagonist group (22% vs. 11%). The microdose flare-up protocol seems to have a better outcome in poor-responder patients, with a significantly higher mean number of mature oocytes retrieved and higher implantation rate.

  9. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  10. Cost of Medical Care of Patients with Advanced Serious Illness in Singapore (COMPASS): prospective cohort study protocol.

    Science.gov (United States)

    Teo, Irene; Singh, Ratna; Malhotra, Chetna; Ozdemir, Semra; Dent, Rebecca A; Kumarakulasinghe, Nesaretnam Barr; Yeo, Wee Lee; Cheung, Yin Bun; Malhotra, Rahul; Kanesvaran, Ravindran; Yee, Alethea Chung Pheng; Chan, Noreen; Wu, Huei Yaw; Chin, Soh Mun; Allyn, Hum Yin Mei; Yang, Grace Meijuan; Neo, Patricia Soek Hui; Nadkarni, Nivedita V; Harding, Richard; Finkelstein, Eric A

    2018-04-23

    Advanced cancer significantly impacts quality of life of patients and families as they cope with symptom burden, treatment decision-making, uncertainty and costs of treatment. In Singapore, information about the experiences of advanced cancer patients and families and the financial cost they incur for end-of-life care is lacking. Understanding of this information is needed to inform practice and policy to ensure continuity and affordability of care at the end of life. The primary objectives of the Cost of Medical Care of Patients with Advanced Serious Illness in Singapore (COMPASS) cohort study are to describe changes in quality of life and to quantify healthcare utilization and costs of patients with advanced cancer at the end of life. Secondary objectives are to investigate patient and caregiver preferences for diagnostic and prognostic information, preferences for end-of-life care, caregiver burden and perceived quality of care and to explore how these change as illness progresses and finally to measure bereavement adjustment. The purpose of this paper is to present the COMPASS protocol in order to promote scientific transparency. This cohort study recruits advanced cancer patients (n = 600) from outpatient medical oncology clinics at two public tertiary healthcare institutions in Singapore. Patients and their primary informal caregiver are surveyed every 3 months until patients' death; caregivers are followed until 6 months post patient death. Patient medical and billing records are obtained and merged with patient survey data. The treating medical oncologists of participating patients are surveyed to obtain their beliefs regarding care delivery for the patient. The study will allow combination of self-report, medical, and cost data from various sources to present a comprehensive picture of the end-of-life experience of advanced cancer patients in a unique Asian setting. This study is responsive to Singapore's National Strategy for Palliative Care which

  11. The impact of an ED-only full-capacity protocol.

    Science.gov (United States)

    Watase, Taketo; Fu, Rongwei; Foster, Denise; Langley, Denise; Handel, Daniel A

    2012-10-01

    The objective of this study was to assess the impact of an emergency department (ED)-only full-capacity protocol and diversion, controlling for patient volumes and other potential confounding factors. This was a preintervention and postintervention cohort study using data 12 months before and 12 months after the implementation of the protocol. During the implementation period, attending physicians and charge nurses were educated with clear and simple figures on the criteria for the initiation of the new protocol. A multiple logistic regression model was used to compare ambulance diversion between the 2 periods. The proportion of days when the ED went on diversion at least once during a 24-hour period was 60.4% during the preimplementation period and 20% in the postimplementation periods (P model, the use of the new protocol was significantly associated with decreased odds of diversion rate in the postimplementation period (odds ratio, 0.32; 95% confidence interval, 0.21-0.48). Our predivert/full-capacity protocol is a simple and generalizable strategy that can be implemented within the boundaries of the ED and is significantly associated with a decreased diversion rate. Copyright © 2012 Elsevier Inc. All rights reserved.

  12. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2014-07-01

    OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation. Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.

  13. Acoustic emissions and electric signal recordings, when cement mortar beams are subjected to three-point bending under various loading protocols

    Directory of Open Access Journals (Sweden)

    A. Kyriazopoulos

    2017-04-01

    Full Text Available Two experimental techniques are used study the response of cement mortar beams subjected to three-point bending under various load¬ing protocols. The techniques used are the detection of weak electric current emissions known as Pressure Stimulated Currents and the Acoustic Emissions (in particular, the cumulative AE energy and the b-value analysis. Patterns are detected that can be used to predict upcoming fracture, regard¬less of the adopted loading protocol in each experiment. The expe¬rimental results of the AE and PSC techniques lead to the conclusion that when the calculated Ib values decrease, the PSC starts increasing strongly.

  14. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  15. Using generalizability theory to develop clinical assessment protocols.

    Science.gov (United States)

    Preuss, Richard A

    2013-04-01

    Clinical assessment protocols must produce data that are reliable, with a clinically attainable minimal detectable change (MDC). In a reliability study, generalizability theory has 2 advantages over classical test theory. These advantages provide information that allows assessment protocols to be adjusted to match individual patient profiles. First, generalizability theory allows the user to simultaneously consider multiple sources of measurement error variance (facets). Second, it allows the user to generalize the findings of the main study across the different study facets and to recalculate the reliability and MDC based on different combinations of facet conditions. In doing so, clinical assessment protocols can be chosen based on minimizing the number of measures that must be taken to achieve a realistic MDC, using repeated measures to minimize the MDC, or simply based on the combination that best allows the clinician to monitor an individual patient's progress over a specified period of time.

  16. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  17. A Comparative Study On The Action Potential Simulation (APS Therapy And The Routine Physiotherapy Protocol In Knee Osteoarthritisin Elderly People

    Directory of Open Access Journals (Sweden)

    Abbas Rahimi

    2012-04-01

    Full Text Available Background and Aim: Knee osteoarthritis is the most common cause for which the elderly people refere to physiotherapy outpatient clinics. This study aimed to investigate the effects of the Action Potential Stimulation (APS Therapy and the routine physiotherapy (PT protocol on relieving pain and swelling as well as the duration of the relief period in patients with knee osteoarthritis. Materials and Methods: 69 patients (62 females & 7 males with knee osteoarthritis were recruited in this study. The subjects were divided into two groups including APS Therapy (n=37, mean age: 55±13 years old and the routine PT protocol (n=32, mean age: 61±14 years old groups. A 10-session treatment period was carried out for each group; and their pain and swelling were measured at the first, fifth and tenth sessions and also one-month after the last session (follow up. The swelling was measured using measuring the circumference of the knee on the patella, 5 Cm above and 5 Cm below the patella. The routine PT protocol consisted of hot pack, ultrasound, TENS and exercise; and the APS therapy protocol included hot pack, APS Therapy and the same exercise. During the follow up, 50 out of 61 subjects were called on the phone and any pain changes were recorded.Results: In terms of swelling, the results showed significant reduction just on the patella only in the APS Therapy group (P<0.05. Visual Analogue Pain Scale (VAPS indicated a significant pain reduction in both groups. However, the APS Therapy group showed significantly pain reduction at the end of sessions five, ten and the follow up session (P<0.05. It was also revealed that while routine PT subjects showed no significant pain changes between the tenth and the follow up session, a gradual pain reduction was seen in the APS therapy group during this period (P<0.05. A gradual dosage reduction was recorded only in the APS therapy group, indicating a slight correlation with pain reduction (r=0.4.Conclusion: The

  18. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4, Volume IV: Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols

    Science.gov (United States)

    Mueller, J. L.; Fargion, G. S.; McClain, C. R. (Editor); Pegau, S.; Zanefeld, J. R. V.; Mitchell, B. G.; Kahru, M.; Wieland, J.; Stramska, M.

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparision and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background, and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 is entirely superseded by the six volumes of Revision 4 listed above.

  19. Prospective randomized study of arthroscopic rotator cuff repair using an early versus delayed postoperative physical therapy protocol.

    Science.gov (United States)

    Cuff, Derek J; Pupello, Derek R

    2012-11-01

    This study evaluated patient outcomes and rotator cuff healing after arthroscopic rotator cuff repair using a postoperative physical therapy protocol with early passive motion compared with a delayed protocol that limited early passive motion. The study enrolled 68 patients (average age, 63.2 years) who met inclusion criteria. All patients had a full-thickness crescent-shaped tear of the supraspinatus that was repaired using a transosseous equivalent suture-bridge technique along with subacromial decompression. In the early group, 33 patients were randomized to passive elevation and rotation that began at postoperative day 2. In the delayed group, 35 patients began the same protocol at 6 weeks. Patients were monitored clinically for a minimum of 12 months, and rotator cuff healing was assessed using ultrasound imaging. Both groups had similar improvements in preoperative to postoperative American Shoulder and Elbow Surgeons scores (early group: 43.9 to 91.9, P rotator cuff healing, or range of motion between the early and delayed groups. Patients in the early group and delayed group both demonstrated very similar outcomes and range of motion at 1 year. There was a slightly higher rotator cuff healing rate in the delayed passive range of motion group compared with the early passive range of motion group (91% vs 85%). Copyright © 2012 Journal of Shoulder and Elbow Surgery Board of Trustees. Published by Mosby, Inc. All rights reserved.

  20. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol

    DEFF Research Database (Denmark)

    Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele

    2017-01-01

    We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than those required to run the test. Our definition...... of privacy-preserving verifiability is general and applies to cryptographic protocols as well as to human security protocols. In this paper we exemplify it in the domain of e-exams. We prove that the notion is meaningful by studying an existing exam protocol that is verifiable but whose verifiability tests...... are not privacy-preserving. We prove that the notion is applicable: we review the protocol using functional encryption so that it admits a verifiability test that preserves privacy according to our definition. We analyse, in ProVerif, that the verifiability holds despite malicious parties and that the new...

  1. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects

  2. Improving active Mealy machine learning for protocol conformance testing

    NARCIS (Netherlands)

    Aarts, F.; Kuppens, H.; Tretmans, J.; Vaandrager, F.; Verwer, S.

    2014-01-01

    Using a well-known industrial case study from the verification literature, the bounded retransmission protocol, we show how active learning can be used to establish the correctness of protocol implementation I relative to a given reference implementation R. Using active learning, we learn a model M

  3. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  4. Examining recombinant human TSH primed 131I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    International Nuclear Information System (INIS)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip

    2014-01-01

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed 131 I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of 131 I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but the

  5. Exploring the experiences of substitute decision-makers with an exception to consent in a paediatric resuscitation randomised controlled trial: study protocol for a qualitative research study

    Science.gov (United States)

    de Laat, Sonya; Schwartz, Lisa

    2016-01-01

    Introduction Prospective informed consent is required for most research involving human participants; however, this is impracticable under some circumstances. The Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans (TCPS) outlines the requirements for research involving human participants in Canada. The need for an exception to consent (deferred consent) is recognised and endorsed in the TCPS for research in individual medical emergencies; however, little is known about substitute decision-maker (SDM) experiences. A paediatric resuscitation trial (SQUEEZE) (NCT01973907) using an exception to consent process began enrolling at McMaster Children's Hospital in January 2014. This qualitative research study aims to generate new knowledge on SDM experiences with the exception to consent process as implemented in a randomised controlled trial. Methods and analysis The SDMs of children enrolled into the SQUEEZE pilot trial will be the sampling frame from which ethics study participants will be derived. Design: Qualitative research study involving individual interviews and grounded theory methodology. Participants: SDMs for children enrolled into the SQUEEZE pilot trial. Sample size: Up to 25 SDMs. Qualitative methodology: SDMs will be invited to participate in the qualitative ethics study. Interviews with consenting SDMs will be conducted in person or by telephone, taped and professionally transcribed. Participants will be encouraged to elaborate on their experience of being asked to consent after the fact and how this process occurred. Analysis: Data gathering and analysis will be undertaken simultaneously. The investigators will collaborate in developing the coding scheme, and data will be coded using NVivo. Emerging themes will be identified. Ethics and dissemination This research represents a rare opportunity to interview parents/guardians of critically ill children enrolled into a resuscitation trial without their knowledge or prior consent

  6. I-123 IBZM-SPECT: improved acquisition protocol with HR-collimator

    International Nuclear Information System (INIS)

    Sandrock, D.; Ivancevic, V.; Dopichaj-Menge, U.; Gruber, D.; Munz, D.

    2002-01-01

    Aim: Aim of this study was to evaluate the impact of different acquisition and reconstruction protocols on the quality of SPECT diagnostics with I-123 IBZM in patients with diseases of the dopaminergic system. Material and Methods: Overall, 30 patients (19 men, 11 women, aged 22 - 80 years) were studied with SPECT after i.v. injection of 5 mCi (185 MBq) I-123 IBZM. Acquisition was performed 60 min p.i. (protocol A) using a medium energy collimator, a 64 x 64 matrix, 64 projections, step and shoot technique, 5.6 0 and 20 seconds per step with a MultiSPECT2 double-head gamma camera (Siemens). Immediately afterwards, a second acquisition (protocol B, 90 min p.i.) using a high resolution collimator, a 128 x 128 matrix, 60 projections, step and shoot technique, 3 0 and 30 seconds per step was performed. The reconstruction was done in filtered backprojection technique and a Butterworth filter of order 7, in protocol A using a cutoff of 0.5 and in protocol B of 0.4. Finally, the net count ratios of the basal ganglia to the frontal lobe(s) were calculated and compared with the clinical diagnosis. Results: The visual analysis yielded - as expected -a better image quality for protocol B (concordant impression of 3 independent observers) with more accurate delineation of the basal ganglia. The count ratios with protocol B were (mean) 0.19 higher (equivalent to 13 %) than with protocol A. In the group of patients with count ratios > 1.55 there was the highest (and significant) difference between protocols A and B with (mean count ratio difference) 0.32 (equivalent to 20 %). Protocol B also allowed a better differentiation between patients clinically staged normal and abnormal. In patients with unilateral disease, this difference between normal and abnormal was more prominent (in comparison to the contralateral side as well as compared to the reference value [1.5]). The comparison of the count ratios with the clinical data revealed 7 patients with borderline results with

  7. A New Anaesthetic Protocol for Adult Zebrafish (Danio rerio: Propofol Combined with Lidocaine.

    Directory of Open Access Journals (Sweden)

    Ana M Valentim

    Full Text Available The increasing use of zebrafish model has not been accompanied by the evolution of proper anaesthesia for this species in research. The most used anaesthetic in fishes, MS222, may induce aversion, reduction of heart rate, and consequently high mortality, especially during long exposures. Therefore, we aim to explore new anaesthetic protocols to be used in zebrafish by studying the quality of anaesthesia and recovery induced by different concentrations of propofol alone and in combination with different concentrations of lidocaine.In experiment A, eighty-three AB zebrafish were randomly assigned to 7 different groups: control, 2.5 (2.5P, 5 (5P or 7.5 μg/ml (7.5P of propofol; and 2.5 μg/ml of propofol combined with 50, (P/50L, 100 (P/100L or 150 μg/ml (P/150L of lidocaine. Zebrafish were placed in an anaesthetic water bath and time to lose the equilibrium, reflex to touch, reflex to a tail pinch, and respiratory rate were measured. Time to gain equilibrium was also assessed in a clean tank. Five and 24 hours after anaesthesia recovery, zebrafish were evaluated concerning activity and reactivity. Afterwards, in a second phase of experiments (experiment B, the best protocol of the experiment A was compared with a new group of 8 fishes treated with 100 mg/L of MS222 (100M.In experiment A, only different concentrations of propofol/lidocaine combination induced full anaesthesia in all animals. Thus only these groups were compared with a standard dose of MS222 in experiment B. Propofol/lidocaine induced a quicker loss of equilibrium, and loss of response to light and painful stimuli compared with MS222. However zebrafish treated with MS222 recovered quickly than the ones treated with propofol/lidocaine.In conclusion, propofol/lidocaine combination and MS222 have advantages in different situations. MS222 is ideal for minor procedures when a quick recovery is important, while propofol/lidocaine is best to induce a quick and complete anaesthesia.

  8. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  9. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  10. Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review.

    Science.gov (United States)

    van Rein, Eveline A J; Houwert, R Marijn; Gunning, Amy C; Lichtveld, Rob A; Leenen, Luke P H; van Heijl, Mark

    2017-08-01

    Prehospital trauma triage ensures proper transport of patients at risk of severe injury to hospitals with an appropriate corresponding level of trauma care. Incorrect triage results in undertriage and overtriage. The American College of Surgeons Committee on Trauma recommends an undertriage rate below 5% and an overtriage rate below 50% for prehospital trauma triage protocols. To find the most accurate prehospital trauma triage protocol, a clear overview of all currently available protocols and corresponding outcomes is necessary. The aim of this systematic review was to evaluate the current literature on all available prehospital trauma triage protocols and determine accuracy of protocol-based triage quality in terms of sensitivity and specificity. A search of Pubmed, Embase, and Cochrane Library databases was performed to identify all studies describing prehospital trauma triage protocols before November 2016. The search terms included "trauma," "trauma center," or "trauma system" combined with "triage," "undertriage," or "overtriage." All studies describing protocol-based triage quality were reviewed. To assess the quality of these type of studies, a new critical appraisal tool was developed. In this review, 21 articles were included with numbers of patients ranging from 130 to over 1 million. Significant predictors for severe injury were: vital signs, suspicion of certain anatomic injuries, mechanism of injury, and age. Sensitivity ranged from 10% to 100%; specificity from 9% to 100%. Nearly all protocols had a low sensitivity, thereby failing to identify severely injured patients. Additionally, the critical appraisal showed poor quality of the majority of included studies. This systematic review shows that nearly all protocols are incapable of identifying severely injured patients. Future studies of high methodological quality should be performed to improve prehospital trauma triage protocols. Systematic review, level III.

  11. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  12. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  13. A shortened protocol for assessing cognitive bias in rats.

    Science.gov (United States)

    Brydges, Nichola M; Hall, Lynsey

    2017-07-15

    Reliable measurement of affective state in animals is a significant goal of animal welfare. Such measurements would also improve the validity of pre-clinical mental health research which relies on animal models. However, at present, affective states in animals are inaccessible to direct measurement. In humans, changes in cognitive processing can give reliable indications of emotional state. Therefore, similar techniques are increasingly being used to gain proxy measures of affective states in animals. In particular, the 'cognitive bias' assay has gained popularity in recent years. Major disadvantages of this technique include length of time taken for animals to acquire the task (typically several weeks), negative experiences associated with task training, and issues of motivation. Here we present a shortened cognitive bias protocol using only positive reinforcers which must actively be responded to. The protocol took an average of 4days to complete, and produced similar results to previous, longer methods (minimum 30days). Specifically, rats housed in standard laboratory conditions demonstrated negative cognitive biases when presented with ambiguous stimuli, and took longer to make a decision when faced with an ambiguous stimulus. Compared to previous methods, this protocol is significantly shorter (average 4days vs. minimum 30days), utilises only positive reinforcers to avoid inducing negative affective states, and requires active responses to all cues, avoiding potential confounds of motivational state. We have successfully developed a shortened cognitive bias protocol, suitable for use with laboratory rats. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  14. Implementing the GBT data transmission protocol in FPGAs

    CERN Document Server

    Baron, S; Marin, F; Moreira, P; Soos, C

    2009-01-01

    The GBT chip [1] is a radiation tolerant ASIC that can be used to implement bidirectional multipurpose 4.8Gb/s optical links for high-energy physics experiments. It will be proposed to the LHC experiments for combined transmission of physics data, trigger, timing, fast and slow control and monitoring. Although radiation hardness is required on detectors, it is not necessary for the electronics located in the counting rooms, where the GBT functionality can be realized using Commercial Off-The-Shelf (COTS) components. This paper describes efficient physical implementation of the GBT protocol achieved for FPGA devices on Altera and Xilinx devices with source codes developed in Verilog and VHDL. The current platforms are based on Altera StratixIIGX and Xilinx Virtex5.

  15. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  16. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  17. GnRH antagonist versus long agonist protocols in IVF

    DEFF Research Database (Denmark)

    Lambalk, C B; Banga, F R; Huirne, J A

    2017-01-01

    BACKGROUND: Most reviews of IVF ovarian stimulation protocols have insufficiently accounted for various patient populations, such as ovulatory women, women with polycystic ovary syndrome (PCOS) or women with poor ovarian response, and have included studies in which the agonist or antagonist...... was not the only variable between the compared study arms. OBJECTIVE AND RATIONALE: The aim of the current study was to compare GnRH antagonist protocols versus standard long agonist protocols in couples undergoing IVF or ICSI, while accounting for various patient populations and treatment schedules. SEARCH...... in couples undergoing IVF or ICSI. The primary outcome was ongoing pregnancy rate. Secondary outcomes were: live birth rate, clinical pregnancy rate, number of oocytes retrieved and safety with regard to ovarian hyperstimulation syndrome (OHSS). Separate comparisons were performed for the general IVF...

  18. Maternal antecedents of adiposity and studying the transgenerational role of hyperglycemia and insulin (MAASTHI): a prospective cohort study : Protocol of birth cohort at Bangalore, India.

    Science.gov (United States)

    Babu, Giridhara R; Murthy, Gvs; Deepa, R; Yamuna; Prafulla; Kumar, H Kiran; Karthik, Maithili; Deshpande, Keerti; Benjamin Neelon, Sara E; Prabhakaran, D; Kurpad, Anura; Kinra, Sanjay

    2016-10-14

    India is experiencing an epidemic of obesity-hyperglycaemia, which coincides with child bearing age for women. The epidemic can be sustained and augmented through transgenerational transmission of adiposity and glucose intolerance in women. This presents an opportunity for exploring a clear strategy for the control of this epidemic in India. We conducted a study between November 2013 and May 2015 to inform the design of a large pregnancy cohort study. Based on the findings of this pilot, we developed the protocol for the proposed birth cohort of 5000 women, the recruitment for which will start in April 2016. The protocol of the study documents the processes which aim at advancing the available knowledge, linking several steps in the evolution of obesity led hyperglycemia. Maternal Antecedents of Adiposity and Studying the Transgenerational role of Hyperglycemia and Insulin (MAASTHI) is a cohort study in the public health facilities in Bangalore, India. The objective of MAASTHI is to prospectively assess the effects of glucose levels in pregnancy on the risk of adverse infant outcomes, especially in predicting the possible risk markers of later chronic diseases. The primary objective of the proposed study is to investigate the effect of glucose levels in pregnancy on skinfold thickness (adiposity) in infancy as a marker of future obesity and diabetes in offspring. The secondary objective is to assess the association between psychosocial environment of mothers and adverse neonatal outcomes including adiposity. The study aims to recruit 5000 pregnant women and follow them and their offspring for a period of 4 years. The institutional review board at The Indian Institute of Public Health (IIPH)-H, Bangalore, Public Health Foundation of India has approved the protocol. All participants are required to provide written informed consent. The findings from this study may help to address important questions on screening and management of high blood sugar in pregnancy. It

  19. Plant DNA Detection from Grasshopper Guts: A Step-by-Step Protocol, from Tissue Preparation to Obtaining Plant DNA Sequences

    Directory of Open Access Journals (Sweden)

    Alina Avanesyan

    2014-02-01

    Full Text Available Premise of the study: A PCR-based method of identifying ingested plant DNA in gut contents of Melanoplus grasshoppers was developed. Although previous investigations have focused on a variety of insects, there are no protocols available for plant DNA detection developed for grasshoppers, agricultural pests that significantly influence plant community composition. Methods and Results: The developed protocol successfully used the noncoding region of the chloroplast trnL (UAA gene and was tested in several feeding experiments. Plant DNA was obtained at seven time points post-ingestion from whole guts and separate gut sections, and was detectable up to 12 h post-ingestion in nymphs and 22 h post-ingestion in adult grasshoppers. Conclusions: The proposed protocol is an effective, relatively quick, and low-cost method of detecting plant DNA from the grasshopper gut and its different sections. This has important applications, from exploring plant “movement” during food consumption, to detecting plant–insect interactions.

  20. Neuroimaging for non-accidental head injury in childhood: A proposed protocol

    International Nuclear Information System (INIS)

    Jaspan, T.; Griffiths, P.D.; McConachie, N.S.; Punt, J.A.G.

    2003-01-01

    Non-accidental head injury (NAHI) is a major cause of neurological disability and death during infancy. Radiological imaging plays a crucial role in evaluating craniospinal injury, both for guiding medical management and the forensic aspects of abusive trauma. The damage sustained is varied, complex and may be accompanied by an evolving pattern of brain injury secondary to a cascade of metabolic and physiological derangements. Regrettably, many cases are poorly or incompletely evaluated leading to diagnostic errors and difficulties in executing subsequent child care or criminal proceedings. It is evident, from cases referred to the authors, that imaging protocols for NAHI are lacking (or only loosely adhered to, if present) in many centres throughout the U.K. Future research in this field will also be hampered if there is a lack of consistent and reliable radiological data. There is no nationally agreed protocol for imaging NAHI. We propose such a protocol, based upon a wide experience in the medical management of child abuse and extensive involvement in the medicolegal aspects of NAHI. Jaspan, T., et al. (2003). Clinical Radiology58, 44--53

  1. Neuroimaging for non-accidental head injury in childhood: A proposed protocol

    Energy Technology Data Exchange (ETDEWEB)

    Jaspan, T.; Griffiths, P.D.; McConachie, N.S.; Punt, J.A.G

    2003-01-01

    Non-accidental head injury (NAHI) is a major cause of neurological disability and death during infancy. Radiological imaging plays a crucial role in evaluating craniospinal injury, both for guiding medical management and the forensic aspects of abusive trauma. The damage sustained is varied, complex and may be accompanied by an evolving pattern of brain injury secondary to a cascade of metabolic and physiological derangements. Regrettably, many cases are poorly or incompletely evaluated leading to diagnostic errors and difficulties in executing subsequent child care or criminal proceedings. It is evident, from cases referred to the authors, that imaging protocols for NAHI are lacking (or only loosely adhered to, if present) in many centres throughout the U.K. Future research in this field will also be hampered if there is a lack of consistent and reliable radiological data. There is no nationally agreed protocol for imaging NAHI. We propose such a protocol, based upon a wide experience in the medical management of child abuse and extensive involvement in the medicolegal aspects of NAHI. Jaspan, T., et al. (2003). Clinical Radiology58, 44--53.

  2. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  3. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  4. Cryotherapy for acute ankle sprains: a randomised controlled study of two different icing protocols.

    Science.gov (United States)

    Bleakley, C M; McDonough, S M; MacAuley, D C; Bjordal, J

    2006-08-01

    The use of cryotherapy in the management of acute soft tissue injury is largely based on anecdotal evidence. Preliminary evidence suggests that intermittent cryotherapy applications are most effective at reducing tissue temperature to optimal therapeutic levels. However, its efficacy in treating injured human subjects is not yet known. To compare the efficacy of an intermittent cryotherapy treatment protocol with a standard cryotherapy treatment protocol in the management of acute ankle sprains. Sportsmen (n = 44) and members of the general public (n = 45) with mild/moderate acute ankle sprains. Subjects were randomly allocated, under strictly controlled double blind conditions, to one of two treatment groups: standard ice application (n = 46) or intermittent ice application (n = 43). The mode of cryotherapy was standardised across groups and consisted of melting iced water (0 degrees C) in a standardised pack. Function, pain, and swelling were recorded at baseline and one, two, three, four, and six weeks after injury. Subjects treated with the intermittent protocol had significantly (p<0.05) less ankle pain on activity than those using a standard 20 minute protocol; however, one week after ankle injury, there were no significant differences between groups in terms of function, swelling, or pain at rest. Intermittent applications may enhance the therapeutic effect of ice in pain relief after acute soft tissue injury.

  5. Danish method study on cervical screening in women offered HPV vaccination as girls (Trial23): a study protocol.

    Science.gov (United States)

    Thamsborg, Lise Holst; Andersen, Berit; Larsen, Lise Grupe; Christensen, Jette; Johansen, Tonje; Hariri, Jalil; Christiansen, Sanne; Rygaard, Carsten; Lynge, Elsebeth

    2018-05-26

    The first birth cohorts of women offered human papillomavirus (HPV) vaccination as girls are now entering cervical screening. However, there is no international consensus on how to screen HPV vaccinated women. These women are better protected against cervical cancer and could therefore be offered less intensive screening. Primary HPV testing is more sensitive than cytology, allowing for a longer screening interval. The aim of Trial23 is to investigate if primary HPV testing with cytology triage of HPV positive samples is a reasonable screening scheme for women offered HPV vaccination as girls. Trial23 is a method study embedded in the existing cervical screening programme in four out of five Danish regions. Without affecting the screening programme, women born in 1994 are randomised to present screening with liquid-based cytology every third year (present programme arm) or present screening plus an HPV test (HPV arm). The study started 1 February 2017 and will run over three screening rounds corresponding to 7-8 years. The primary endpoint is cervical intraepithelial neoplasia grade 3 or above. The trial is undertaken as a non-inferiority study including intention-to-treat and per-protocol analyses. The potential effect of primary HPV screening with a 6-year interval will be calculated from the observed data. The study protocol has been submitted to the ethical committee and deemed a method study. All women are screened according to routine guidelines. The study will contribute new evidence on the future screening of HPV vaccinated birth cohorts of women. All results will be published in open-access journal. NCT03049553; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  6. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  7. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    Science.gov (United States)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  8. SIMULASI INTERKONEKSI ANTARA AUTONOMOUS SYSTEM (AS MENGGUNAKAN BORDER GATEWAY PROTOCOL (BGP

    Directory of Open Access Journals (Sweden)

    Hari Antoni Musril

    2017-09-01

    Full Text Available An autonomous system (AS is the collection of networks having the same set of routing policies. Each AS has administrative control to its own inter-domain routing policy. Computer networks consisting of a bunch of AS's with different routing will not be able to interconnecttion one another. This is causes communication in the network to be inhibited. For that we need a protocol that can connect each different AS. Border Gateway Protocol (BGP is an inter-domain routing protocol i.e. between different AS  that is used to exchange routing information between them. In a typical inter-network (and in the Internet each autonomous system designates one or more routers that run BGP software. BGP routers in each AS are linked to those in one or more other AS. The ability to exchange table routing information between Autonomous System (AS is one of the advantages BGP. BGP implements routing policies based a set of attributes accompanying each route used to pick the “shortest” path across multiple ASs, along with one or more routing policies. BGP uses an algorithm which cannot be classified as a pure "Distance Vector", or pure "Link State". It is a path vector routing protocol as it defines a route as a collection of a number of AS that is passes through from source AS to destination AS. This paper discusses the implementation of the BGP routing protocol in the network that have different AS in order to interconnect. Its application using Packet Tracer 7.0 software for prototyping and simulating network. So that later can be applied to the actual network. Based on experiments that have been carried out, the BGP routing protocol can connect two routers that have different autonomous system.

  9. Understanding the role of contrasting urban contexts in healthy aging: an international cohort study using wearable sensor devices (the CURHA study protocol).

    Science.gov (United States)

    Kestens, Yan; Chaix, Basile; Gerber, Philippe; Desprès, Michel; Gauvin, Lise; Klein, Olivier; Klein, Sylvain; Köppen, Bernhard; Lord, Sébastien; Naud, Alexandre; Payette, Hélène; Richard, Lucie; Rondier, Pierre; Shareck, Martine; Sueur, Cédric; Thierry, Benoit; Vallée, Julie; Wasfi, Rania

    2016-05-05

    Given the challenges of aging populations, calls have been issued for more sustainable urban re-development and implementation of local solutions to address global environmental and healthy aging issues. However, few studies have considered older adults' daily mobility to better understand how local built and social environments may contribute to healthy aging. Meanwhile, wearable sensors and interactive map-based applications offer novel means for gathering information on people's mobility, levels of physical activity, or social network structure. Combining such data with classical questionnaires on well-being, physical activity, perceived environments and qualitative assessment of experience of places opens new opportunities to assess the complex interplay between individuals and environments. In line with current gaps and novel analytical capabilities, this research proposes an international research agenda to collect and analyse detailed data on daily mobility, social networks and health outcomes among older adults using interactive web-based questionnaires and wearable sensors. Our study resorts to a battery of innovative data collection methods including use of a novel multisensor device for collection of location and physical activity, interactive map-based questionnaires on regular destinations and social networks, and qualitative assessment of experience of places. This rich data will allow advanced quantitative and qualitative analyses in the aim to disentangle the complex people-environment interactions linking urban local contexts to healthy aging, with a focus on active living, social networks and participation, and well-being. This project will generate evidence about what characteristics of urban environments relate to active mobility, social participation, and well-being, three important dimensions of healthy aging. It also sets the basis for an international research agenda on built environment and healthy aging based on a shared and comprehensive

  10. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  11. Protocol notions from the bibliography of his authorities

    Directory of Open Access Journals (Sweden)

    Dra. María Luz Álvarez Rodríguez

    2008-01-01

    Full Text Available Protocol is a subject that has suffered great changes over the last years in Spain. Its presence at university training has shifted from being a mere anecdote to becoming one more subject to be taught in postgraduate courses endorsed by a big social and professional demand. With the aim of announcing Protocol as a subject to the Spanish academic field, the present article carries out a study of the theoretical situation of this subject and profession in Spain. This research means to get to know the scientific character of Protocol, at the same time as it tries to found such professional side in the current offer of courses and of training. For this reason, this research could be interesting for the Spanish academic field, by helping to explain the reality of Protocol in Spain and to impel its theoretical development in our country.

  12. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  13. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  14. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  15. Optimization of an Efficient and Sustainable Sonogashira Cross-Coupling Protocol

    KAUST Repository

    Walter, Philipp E.

    2012-12-01

    Cross coupling reactions are a well-established tool in modern organic synthesis and play a crucial role in the synthesis of a high number of organic compounds. Their importance is highlighted by the Nobel Prize in chemistry to Suzuki, Heck and Negishi in 2010. The increasing importance of sustainability requirements in chemical production has furthermore promoted the development of cross-coupling protocols that comply with the principles of “Green Chemistry”1. The Sonogashira reaction is today the most versatile and powerful way to generate aryl alkynes, a moiety recurring in many pharmaceutical and natural products. Despite many improvements to the original reaction, reports on generally applicable protocols that work under sustainable conditions are scarce. Our group recently reported an efficient protocol for a copperfree Sonogashira cross-coupling at low temperature, in aqueous medium and with no addition of organic solvents or additives2. The goal of this work was to further investigate the effects of different reaction parameters on the catalytic activity in order to optimize the protocol. Limitations of the protocol were tested in respect to reaction temperature, heating method, atmosphere, base type and amount, catalyst loading, reaction time and work up procedure. The reaction worked successfully under air and results were not affected by the presence of oxygen in the water phase. Among a variety of bases tested, triethylamine was confirmed to give the best results and its required excess could be reduced from nine to four equivalents. Catalyst loading could also be reduced by up to 90%: Good to near quantitative yields for a broad range of substrates were achieved using a catalyst concentration of 0.25mol% and 5 eq of Et3N at 50°C while more reactive substrates could be coupled with a catalyst concentration as low as 0.025mol%. Filtration experiments showed the possibility of a simplified work up procedure and a protocol completely free of organic

  16. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  17. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  18. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  19. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair

    Science.gov (United States)

    Lightsey, Harry M.; Kantrowitz, David E.; Swindell, Hasani W.; Trofa, David P.; Ahmad, Christopher S.; Lynch, T. Sean

    2018-01-01

    Background: The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. Purpose: To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Study Design: Cross-sectional study. Methods: Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Results: Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises

  20. The introduction of a protocol for the use of biobrane for facial burns in children.

    Science.gov (United States)

    Rogers, A D; Adams, S; Rode, H

    2011-01-01

    BIOBRANE HAS BECOME AN INDISPENSIBLE DRESSING WITH THREE ESTABLISHED INDICATIONS IN ACUTE BURNS CARE AT OUR INSTITUTION: (1) as the definitive dressing of superficial partial thickness facial burns, (2) after tangential excision of deep burns when autograft or cadaver skin is unavailable, and (3) for graft reduction. This paper details our initial experience of Biobrane for the management of superficial partial thickness facial burns in children and the protocol that was compiled for its optimal use. A retrospective analysis of theatre records, case notes and photographs was performed to evaluate our experience with Biobrane over a one-year period. Endpoints included length of stay, analgesic requirements, time to application of Biobrane, healing times, and aesthetic results. Historical controls were used to compare the results with our previous standard of care. 87 patients with superficial partial thickness burns of the face had Biobrane applied during this period. By adhering to the protocol we were able to demonstrate significant reductions in hospital stay, healing time, analgesic requirements, nursing care, with excellent cosmetic results. The protocol is widely accepted by all involved in the optimal management of these patients, including parents, anaesthetists, and nursing staff.

  1. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  2. The "Healthy Habits, Healthy Girls" randomized controlled trial for girls: study design, protocol, and baseline results.

    Science.gov (United States)

    Leme, Ana Carolina Barco; Philippi, Sonia Tucunduva

    2015-07-01

    The purpose of this article is to describe the study design, protocol, and baseline results of the "Healthy Habits, Healthy Girls" program. The intervention is being evaluated through a randomized controlled trial in 10 public schools in the city of São Paulo, Brazil. Data on the following variables were collected and assessed at baseline and will be reevaluated at 7 and 12 months: body mass index, waist circumference, dietary intake, nutrition, physical activity, social cognitive mediators, physical activity level, sedentary behaviors, self-rated physical status, and overall self-esteem. According to the baseline results, 32.4% and 23.4% of girls were overweight in the intervention and control groups, respectively, and in both groups a higher percentage failed to meet daily recommendations for moderate and vigorous physical activity and maximum screen time (TV, computer, mobile devices). There were no significant differences between the groups for most of the variables, except age (p = 0.000) and waist circumference (p = 0.014). The study showed a gap in the Brazilian literature on protocols for randomized controlled trials to prevent obesity among youth. The current study may thus be an important initial contribution to the field.

  3. A Pilot Study Involving the Effect of Two Different Complex Training Protocols on Lower Body Power

    OpenAIRE

    Smith Chad E.; Lyons Brian; Hannon James C.

    2014-01-01

    Purpose. Complex training (CT) involves the coupling of two exercises ostensibly to enhance the effect of the second exercise. Typically, the first exercise is a strength exercise and the second exercise is a power exercise involving similar muscles. In most cases, CT is designed to enhance power. The purpose of this study was twofold. First, this study was designed to determine if lower body power could be enhanced using complex training protocols. Second, this study investigated whether the...

  4. Silanization of silica and glass slides for DNA microarrays by impregnation and gas phase protocols: A comparative study

    International Nuclear Information System (INIS)

    Phaner-Goutorbe, Magali; Dugas, Vincent; Chevolot, Yann; Souteyrand, Eliane

    2011-01-01

    Surface immobilization of oligonucleotide probes (oligoprobes) is a key issue in the development of DNA-chips. The immobilization protocol should guarantee good availability of the probes, low non-specific adsorption and reproducibility. We have previously reported a silanization protocol with tert-butyl-11-(dimethylamino)silylundecanoate performed by impregnation (Impregnation Protocol, IP) of silica substrates from dilute silane solutions, leading to surfaces bearing carboxylic groups. In this paper, the Impregnation protocol is compared with a Gas phase Protocol (GP) which is more suited to industrial requirements such as reliable and robust processing, cost efficiency, etc.... The morphology of the oligoprobe films at the nanoscale (characterized by Atomic Force Microscopy) and the reproducibility of subsequent oligoprobes immobilization steps have been investigated for the two protocols on thermal silica (Si/SiO 2 ) and glass slide substrates. IP leads to smooth surfaces whereas GP induces the formation of islands features suggesting a non-continuous silane layer. The reproducibility of the overall surface layer (18.75 mm 2 ) has been evaluated through the covalent immobilization of a fluorescent oligoprobes. Average fluorescent signals of 6 (a.u.) and 4 (a.u.) were observed for IP and GP, respectively, with a standard deviation of 1 for both protocols. Thus, despite a morphological difference of the silane layer at the nanometer scale, the density of the immobilized probes remained similar.

  5. Safety and efficacy of an intensive insulin protocol in a burn-trauma intensive care unit.

    Science.gov (United States)

    Cochran, Amalia; Davis, Lynn; Morris, Stephen E; Saffle, Jeffrey R

    2008-01-01

    Aggressive glycemic management in critically ill patients with acute burn injury or life-threatening soft-tissue infections has not been thoroughly evaluated. An intensive insulin protocol with target glucose values of less than 120 mg/dl was implemented in October 2005 in our regional Burn-Trauma intensive care unit. We reviewed our initial experience with this protocol to evaluate the safety and efficacy of aggressive glycemic control in these patient groups. Patients were placed on the intensive insulin protocol based upon the need for glycemic management during their hospitalization for burn or soft-tissue disease. Patient information prospectively collected while on protocol included all measured blood glucose values, total daily insulin use, and incidence of hypoglycemic episodes, defined as serum glucose patients (17 burns, 13 soft-tissue infections) were placed on the intensive insulin protocol during the first 16 months of use. The mean daily blood glucose level for burn patients was 115.9 mg/dl and for soft-tissue disease patients was 119.5 mg/dl. There was a 5% incidence of hypoglycemic episodes per protocol day. All hypoglycemic episodes were treated by holding the insulin infusion, and no episode had known adverse effects. Hyperglycemia in critically ill patients with burns and extensive soft-tissue disease can be effectively managed with an insulin protocol that targets blood glucose values of less than 120 mg/dl with minimal incidence of hypoglycemia. A multicenter prospective randomized trial would provide the ideal forum for evaluating clinical outcome benefits of using an intensive insulin protocol.

  6. A Flow Cytometry Protocol to Estimate DNA Content in the Yellowtail Tetra Astyanax altiparanae

    Directory of Open Access Journals (Sweden)

    Pedro L. P. Xavier

    2017-09-01

    Full Text Available The production of triploid yellowtail tetra Astyanax altiparanae is a key factor to obtain permanently sterile individuals by chromosome set manipulation. Flow cytometric analysis is the main tool for confirmation of the resultant triploids individuals, but very few protocols are specific for A. altiparanae species. The current study has developed a protocol to estimate DNA content in this species. Furthermore, a protocol for long-term storage of dorsal fins used for flow cytometry analysis was established. The combination of five solutions with three detergents (Nonidet P-40 Substitute, Tween 20, and Triton X-100 at 0.1, 0.2, and 0.4% concentration was evaluated. Using the best solution from this first experiment, the addition of trypsin (0.125, 0.25, and 0.5% and sucrose (74 mM and the effects of increased concentrations of the detergents at 0.6 and 1.2% concentration were also evaluated. After adjustment of the protocol for flow cytometry, preservation of somatic tissue or isolated nuclei was also evaluated by freezing (at −20°C and fixation in saturated NaCl solution, acetic methanol (1:3, ethanol, and formalin at 10% for 30 or 60 days of storage at 25°C. Flow cytometry analysis in yellowtail tetra species was optimized using the following conditions: lysis solution: 9.53 mM MgCl2.7H20; 47.67 mM KCl; 15 mM Tris; 74 mM sucrose, 0.6% Triton X-100, pH 8.0; staining solution: Dulbecco's PBS with DAPI 1 μg mL−1; preservation procedure: somatic cells (dorsal fin samples frozen at −20°C. Using this protocol, samples may be stored up to 60 days with good accuracy for flow cytometry analysis.

  7. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  8. Dosimetry study comparing NCS report-2 versus IAEA TRS-398 protocol for high energy photon beams

    International Nuclear Information System (INIS)

    Attalaa, E.M.; Khaled, N.E.; Abou Elenein, H.S.; Elsayed, A.A.

    2005-01-01

    In this work a dosimetry study is presented in which the results of absorbed dose determined at reference condition according to the IAEA TRS-398 protocol and the NCS report-2 are compared. The IAEA TRS-398 protocol for absorbed dose calibration is based on ionization chamber having absorbed dose to water calibration factor N d w, while the NCS-2 dosimetry report for absorbed dose calibration is based on an ionization chamber having air- kerma calibration factor N k . This study shows that the absorbed dose which is calculated with The IAEA TRS-398 formalisms is higher than that calculated with NCS report-2 formalisms within range from 0.4 to 0.9% in cobalt-60 beam as sensed by different ionization chambers, and from 0.2 to 1.1% for different higher energy photon beams of 6, 8 and 18 MV. The chambers used are PTW 30001, 30004, and NE-2571; which have calibration factors N k and N d w traceable to the BIPM (Bureau International des Poids et Mesures)

  9. Remote Viewing and Computer Communications--An Experiment.

    Science.gov (United States)

    Vallee, Jacques

    1988-01-01

    A series of remote viewing experiments were run with 12 participants who communicated through a computer conferencing network. The correct target sample was identified in 8 out of 33 cases. This represented more than double the pure chance expectation. Appendices present protocol, instructions, and results of the experiments. (Author/YP)

  10. Physical Trauma Patients with Symptoms of an Acute and Posttraumatic Stress Disorder: Protocol for an Observational Prospective Cohort Study.

    Science.gov (United States)

    Visser, Eva; Gosens, Taco; Den Oudsten, Brenda; De Vries, Jolanda

    2018-03-29

    underway. Data collection will be completed in November 2018. The first results will be expected in the first trimester of 2019. This is the first multi-method study in trauma patients that examines patients' experiences (qualitative design) as well as psychological disorders (observational prospective). This study will contribute to necessary information on psychological consequences after injury. Moreover, it provides knowledge about which patients to include in future psychological intervention research. Finally, awareness in clinicians about the psychological consequences can be created, so they are able to act more effectively to provide patient-oriented care. Netherlands Trial Registry NTR6258; http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=6258 (Archived by WebCite at http://www.webcitation.org/6xSCiO1bS). ©Eva Visser, Taco Gosens, Brenda Den Oudsten, Jolanda De Vries. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 29.03.2018.

  11. An optimized DNA extraction protocol for benthic Didymosphenia geminata.

    Science.gov (United States)

    Uyua, Noelia Mariel; Manrique, Julieta Marina; Jones, Leandro Roberto

    2014-09-01

    Didymosphenia geminata mats display few cells in relation to extracellular material and contain polysaccharides and heavy metals that interfere with molecular studies. We describe an optimized DNA extraction protocol that help to overcome these difficulties. Our protocol outperformed five previously described DNA extraction techniques. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Acupuncture, Counseling, and Usual care for Depression (ACUDep: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    MacPherson Hugh

    2012-11-01

    Full Text Available Abstract Background The evidence on the effect of acupuncture or counseling for depression is not conclusive yet is sufficient to warrant further research. Our aim is to conduct a full-scale RCT to determine the clinical and cost effectiveness of acupuncture and counseling compared to usual care alone. We will explore the experiences and perspectives of patients and practitioners. Methods/Design Randomized controlled trial with three parallel arms: acupuncture plus usual care, counseling plus usual care, and usual care alone, in conjunction with a nested qualitative study using in-depth interviews with purposive samples of trial participants. Participants: Patients aged over 18 years diagnosed with depression or mood disorder by their GP and with a score of 20 or above on the Beck Depression Inventory (BDI-II. Randomization: Computer randomization by York Trials Unit to acupuncture, counseling, and usual care alone in proportions of 2:2:1, respectively, with secure allocation concealment. Interventions: Patients allocated to acupuncture and counseling groups receive the offer of up to 12 weekly sessions. Both interventions allow flexibility to address patient variation, yet are constrained within defined protocols. Acupuncture is based on traditional Chinese medicine and counseling is non-directive within the humanistic tradition. Outcome: The PHQ-9 is the primary outcome measure, collected at baseline, 3, 6, 9, and 12 months. Also measured is BDI-II, SF-36 Bodily pain subscale, and EQ-5D. Texted mood scores are collected weekly over the first 15 weeks. Health-related resource use is collected over 12 months. Analysis: The sample size target was for 640 participants, calculated for an effect size of 0.32 on the PHQ-9 when comparing acupuncture with counseling given 90% power, 5% significance, and 20% loss to follow-up. Analysis of covariance will be used on an intention-to-treat basis. Thematic analysis will be used for qualitative data. We will

  13. An expert protocol for immunofluorescent detection of calcium channels in tsA-201 cells.

    Science.gov (United States)

    Koch, Peter; Herzig, Stefan; Matthes, Jan

    Pore-forming subunits of voltage gated calcium channels (VGCC) are large membrane proteins (260kDa) containing 24 transmembrane domains. Despite transfection with viral promoter driven vectors, biochemical analysis of VGCC is often hampered by rather low expression levels in heterologous systems rendering VGCC challenging targets. Especially in immunofluorescent detection, calcium channels are demanding proteins. We provide an expert step-by-step protocol with adapted conditions for handling procedures (tsA-201 cell culture, transient transfection, incubation time and temperature at 28°C or 37°C and immunostaining) to address the L-type calcium-channel pore Ca v 1.2 in an immunofluorescent approach. We performed immunocytochemical analysis of Ca v 1.2 expression at single-cell level in combination with detection of different markers for cellular organelles. We show confluency levels and shapes of tsA-201 cells at different time points during an experiment. Our experiments reveal sufficient levels of Ca v 1.2 protein and a correct Ca v 1.2 expression pattern in polygonal shaped cells already 12h after transfection. A sequence of elaborated protocol modifications allows subcellular localization analysis of Ca v 1.2 in an immunocytochemical approach. We provide a protocol that may be used to achieve insights into physiological and pathophysiological processes involving voltage gated calcium channels. Our protocol may be used for expression analysis of other challenging proteins and efficient overexpression may be exploited in related biochemical techniques requiring immunolabels. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  15. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  16. Application of biodegradation screening protocol to contaminated soils from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Smith, J.R.; Nakles, D.V.; Cushey, M.A.; Morgan, D.J.; Linz, D.G.

    1990-01-01

    Bioremediation (i.e., land treatment) has been demonstrated to be a viable option for treating a variety of soils contamianted with organics. Conventional treatability studies utilize soil microcosm experiments to evaluate the potential for bioremediation of specific contaminated soils. Unfortunately, soil microcosms take from 4- to 6-months to complete and do not fully exploit the current understanding of the bioremediation process. This paper describes a treatability protocol that investigates underlying mechanisms and can be completed in 2- to 3-months. It is believed that soil bioremediation is governed by the sequential processes of contanate desorption from the soil into the aqueous phase and subsequent oxidation by microorganisms. The relative importance of each process depends upon the contaminant and soil. Accordingly, the treatability protocol has three steps. In the first step, tests are performed to determine soil characteristics. In the second step, tests are performed to characterize the desorption of contaminants from the soil. In the third step, the potential for biological oxidaiton is evaluated with a soil-water slurry reactor that maximizes desorption and provides an optimum environment for microbial growth. This paper provides a thorough discussion of the laboratory protocol including the primary theoretical tenets which serve as its basis. Preliminary procedures and results are presented for soils contaminated with manufactured gas plant (MGP) wastes. Particular attention is focused on biodegradation of polynuclear aromatic hydrocarbons (PAHs)

  17. Electroacupuncture versus sham electroacupuncture for urinary retention in poststroke patients: study protocol for a multicenter, randomized controlled trial.

    Science.gov (United States)

    Shin, Seungwon; Lee, Jiwon; Yoo, Junghee; Lim, Sung Min; Lee, Euiju

    2016-04-12

    This study protocol evaluates the effectiveness of adjuvant electroacupuncture (EA) for urinary retention in poststroke patients undergoing conventional treatments, in comparison with that of a sham control. A multicenter, blinded, randomized controlled trial will be conducted in three hospitals in the Republic of Korea. We are recruiting 54 stroke survivors (aged >19 years), who were diagnosed with urinary retention based on the results of two consecutive post-void residual (PVR) tests, and dividing them randomly into two arms: the EA and Park-sham control groups. They will receive ten sessions of EA or sham treatment for 2 weeks. The participants will be blinded with non-penetrating needles and fake sounds of EA stimulators. The daily PVR ratio will be primarily measured at baseline and at the end of the study to statistically test the effectiveness of EA for poststroke urinary retention. Then, the Korean version of the Qualiveen Questionnaire, the Korean version of the International Prostate Symptom Score, and the blinding index will be assessed. After each EA session or sham EA, adverse events will be reported to evaluate the safety of EA. Results will be analyzed by using the independent t-test or Mann-Whitney U test, based on both intention-to-treat and per-protocol principles. The findings will provide clinical evidence for the effectiveness of EA treatment to improve urinary retention in stroke survivors. This study protocol was registered in ClinicalTrials.gov (NCT02472288) on 10 June 2015.

  18. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  19. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  20. Reality of near-death-experience memories: Evidence from a psychodynamic and electrophysiological integrated study

    Directory of Open Access Journals (Sweden)

    Arianna ePalmieri

    2014-06-01

    Full Text Available The nature of near-death experiences (NDEs is largely unknown but recent evidence suggests the intriguing possibility that NDEs may refer to actually perceived, and stored, experiences (although not necessarily in relation to the external physical world. We adopted an integrated approach involving a hypnosis-based clinical protocol to improve recall and decrease memory inaccuracy together with Electroencephalography (EEG recording in order to investigate the characteristics of NDE memories and their neural markers compared to memories of both real and imagined events. We included 10 participants with NDEs, defined by the Greyson NDE scale, and 10 control subjects without NDE. Memories were assessed using the Memory Characteristics Questionnaire.Our hypnosis-based protocol increased the amount of details in the recall of all kind of memories considered (NDE, real, and imagined events. Findings showed that NDE memories were similar to real memories in terms of detail richness, self-referential, and emotional information. Moreover, NDE memories were significantly different from memories of imagined events. The pattern of EEG results indicated that real memories recall was positively associated with two memory-related frequency bands, i.e., high alpha and gamma. NDE memories were linked with theta band, a well-known marker of episodic memory. The recall of NDE memories was also related to delta band, which indexes processes such as the recollection of the past, as well as trance states, hallucinations, and other related portals to transpersonal experience. It is notable that the EEG pattern of correlations for NDE memories recall differed from the pattern for memories of imagined events. In conclusion, our findings suggest that, at a phenomenological level, NDE memories cannot be considered equivalent to imagined memories, and at a neural level, NDE memories are stored as episodic memories of events experienced in a peculiar state of consciousness.