WorldWideScience

Sample records for experimental protocol development

  1. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    Directory of Open Access Journals (Sweden)

    McNally James

    2009-01-01

    Full Text Available Abstract Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development, a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community.

  2. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  3. Developing experimental protocols for chronic irradiation studies: the application of a good practice guide framework

    International Nuclear Information System (INIS)

    Wood, M.D.; Knowles, J.D.; Whittaker, J.H.; Copplestone, D.; Malcolm, H.M.; Bielby, S.; Zinger, I.

    2004-01-01

    The EC-funded FASSET (Framework for Assessment of Environmental Impact) project collated information on the transfer, dosimetry, and effects of ionising radiation on wildlife. A major output from the project is the FASSET Radiation Effects Database (FRED). A review of the information contained within FRED highlighted that information on the effects of low-dose, chronic exposure was, at best, fragmentary. However, these data are required to define the dose effect relationships needed to underpin the assessment tools that are being developed. To address this requirement, a series of four Good Practice Guides (GPGs) has been produced as part of a protocol development framework. This framework aims to harmonise experimental approaches, with a view to ensuring that all necessary data on appropriate endpoints are collected, so that dose effect relationships can be determined. The GPGs cover test species selection, endpoint selection, radiation exposure and experimental design considerations. A key is used to guide researchers through the GPGs and the decisions made are recorded on an output pro-forma. The completed pro-forma forms the basis of the experimental protocol. The pro-forma also indicates the information that should be included when presenting the results of the experiment. Standardising approaches ensures that results are comparable between experiments and that they are suitable for determining dose effect relationships. This protocol development framework has been adopted by the UK Environment Agency as a document upon which future Agency-funded experimental work on the effects of chronic, low-level exposure to ionising radiation will be based. It is hoped that the framework will gain acceptance in the wider scientific community and facilitate addressing the knowledge gaps that have been identified in order that successful protection of non-human biota can be demonstrated. (author)

  4. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  5. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    International Nuclear Information System (INIS)

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-01-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution

  6. Immunosuppression for in vivo research: state-of-the-art protocols and experimental approaches

    Institute of Scientific and Technical Information of China (English)

    Rita Diehl; Fabienne Ferrara; Claudia Müller; Antje Y Dreyer; Damian D McLeod; Stephan Fricke; Johannes Boltze

    2017-01-01

    Almost every experimental treatment strategy using non-autologous cell,tissue or organ transplantation is tested in small and large animal models before clinical translation.Because these strategies require immunosuppression in most cases,immunosuppressive protocols are a key element in transplantation experiments.However,standard immunosuppressive protocols are often applied without detailed knowledge regarding their efficacy within the particular experimental setting and in the chosen model species.Optimization of such protocols is pertinent to the translation of experimental results to human patients and thus warrants further investigation.This review summarizes current knowledge regarding immunosuppressive drug classes as well as their dosages and application regimens with consideration of species-specific drug metabolization and side effects.It also summarizes contemporary knowledge of novel immunomodulatory strategies,such as the use of mesenchymal stem cells or antibodies.Thus,this review is intended to serve as a state-of-the-art compendium for researchers to refine applied experimental immunosuppression and immunomodulation strategies to enhance the predictive value of preclinical transplantation studies.

  7. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  8. Experimental quantum 'Guess my Number' protocol using multiphoton entanglement

    International Nuclear Information System (INIS)

    Zhang, Jun; Bao, Xiao-Hui; Chen, Teng-Yun; Yang, Tao; Cabello, Adan; Pan, Jian-Wei

    2007-01-01

    We present an experimental demonstration of a modified version of the entanglement-assisted 'Guess my Number' protocol for the reduction of communication complexity among three separated parties. The results of experimental measurements imply that the separated parties can compute a function of distributed inputs by exchanging less classical information than by using any classical strategy. And the results also demonstrate the advantages of entanglement-enhanced communication, which is very close to quantum communication. The advantages are based on the properties of Greenberger-Horne-Zeilinger states

  9. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  10. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  11. Quantum Strategies: Proposal to Experimentally Test a Quantum Economics Protocol

    Science.gov (United States)

    2009-04-09

    protocols can add security to competitive situations; and analyzing the feasibility of running multi-party quantum games over metro-distance optical... games of complete informa- tion. Physics Letters A, 272:291-303, August 2000. [21] D. A. Meyer. Quantum Communication in Games . In S. M. Barnett, E ...feasibility of quantum games , we proposed to implement a proof-of-principle quantum public goods game , and to experimentally demonstrate that the quantum

  12. Active SAmpling Protocol (ASAP) to Optimize Individual Neurocognitive Hypothesis Testing: A BCI-Inspired Dynamic Experimental Design.

    Science.gov (United States)

    Sanchez, Gaëtan; Lecaignard, Françoise; Otman, Anatole; Maby, Emmanuel; Mattout, Jérémie

    2016-01-01

    The relatively young field of Brain-Computer Interfaces has promoted the use of electrophysiology and neuroimaging in real-time. In the meantime, cognitive neuroscience studies, which make extensive use of functional exploration techniques, have evolved toward model-based experiments and fine hypothesis testing protocols. Although these two developments are mostly unrelated, we argue that, brought together, they may trigger an important shift in the way experimental paradigms are being designed, which should prove fruitful to both endeavors. This change simply consists in using real-time neuroimaging in order to optimize advanced neurocognitive hypothesis testing. We refer to this new approach as the instantiation of an Active SAmpling Protocol (ASAP). As opposed to classical (static) experimental protocols, ASAP implements online model comparison, enabling the optimization of design parameters (e.g., stimuli) during the course of data acquisition. This follows the well-known principle of sequential hypothesis testing. What is radically new, however, is our ability to perform online processing of the huge amount of complex data that brain imaging techniques provide. This is all the more relevant at a time when physiological and psychological processes are beginning to be approached using more realistic, generative models which may be difficult to tease apart empirically. Based upon Bayesian inference, ASAP proposes a generic and principled way to optimize experimental design adaptively. In this perspective paper, we summarize the main steps in ASAP. Using synthetic data we illustrate its superiority in selecting the right perceptual model compared to a classical design. Finally, we briefly discuss its future potential for basic and clinical neuroscience as well as some remaining challenges.

  13. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  14. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  15. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  16. The Palaeoclimate and Terrestrial Exoplanet Radiative Transfer Model Intercomparison Project (PALAEOTRIP: experimental design and protocols

    Directory of Open Access Journals (Sweden)

    C. Goldblatt

    2017-11-01

    Full Text Available Accurate radiative transfer calculation is fundamental to all climate modelling. For deep palaeoclimate, and increasingly terrestrial exoplanet climate science, this brings both the joy and the challenge of exotic atmospheric compositions. The challenge here is that most standard radiation codes for climate modelling have been developed for modern atmospheric conditions and may perform poorly away from these. The palaeoclimate or exoclimate modeller must either rely on these or use bespoke radiation codes, and in both cases rely on either blind faith or ad hoc testing of the code. In this paper, we describe the protocols for the Palaeoclimate and Terrestrial Exoplanet Radiative Transfer Model Intercomparison Project (PALAEOTRIP to systematically address this. This will compare as many radiation codes used for palaeoclimate or exoplanets as possible, with the aim of identifying the ranges of far-from-modern atmospheric compositions in which the codes perform well. This paper describes the experimental protocol and invites community participation in the project through 2017–2018.

  17. Developing a yeast-based assay protocol to monitor total ...

    African Journals Online (AJOL)

    A yeast-based assay protocol developed for detecting oestrogenic activity in activated sludge (AS) supernatant is described. The protocol used Saccharomyces cerevisiae construct RMY/ER-ERE with human oestrogen receptor (ERα) and lacZ reporter genes, and was developed by modifying existing assays for use with AS ...

  18. Computational Methodologies for Developing Structure–Morphology–Performance Relationships in Organic Solar Cells: A Protocol Review

    KAUST Repository

    Do, Khanh

    2016-09-08

    We outline a step-by-step protocol that incorporates a number of theoretical and computational methodologies to evaluate the structural and electronic properties of pi-conjugated semiconducting materials in the condensed phase. Our focus is on methodologies appropriate for the characterization, at the molecular level, of the morphology in blend systems consisting of an electron donor and electron acceptor, of importance for understanding the performance properties of bulk-heterojunction organic solar cells. The protocol is formulated as an introductory manual for investigators who aim to study the bulk-heterojunction morphology in molecular details, thereby facilitating the development of structure morphology property relationships when used in tandem with experimental results.

  19. Fiber Laser Component Testing for Space Qualification Protocol Development

    Science.gov (United States)

    Falvey, S.; Buelow, M.; Nelson, B.; Starcher, Y.; Thienel, L.; Rhodes, C.; Tull, Jackson; Drape, T.; Westfall, C.

    A test protocol for the space qualifying of Ytterbium-doped diode-pumped fiber laser (DPFL) components was developed under the Bright Light effort, sponsored by AFRL/VSE. A literature search was performed and summarized in an AMOS 2005 conference paper that formed the building blocks for the development of the test protocol. The test protocol was developed from the experience of the Bright Light team, the information in the literature search, and the results of a study of the Telcordia standards. Based on this protocol developed, test procedures and acceptance criteria for a series of vibration, thermal/vacuum, and radiation exposure tests were developed for selected fiber laser components. Northrop Grumman led the effort in vibration and thermal testing of these components at the Aerospace Engineering Facility on Kirtland Air Force Base, NM. The results of the tests conducted have been evaluated. This paper discusses the vibration and thermal testing that was executed to validate the test protocol. The lessons learned will aid in future assessments and definition of space qualification protocols. Components representative of major items within a Ytterbium-doped diode-pumped fiber laser were selected for testing; including fibers, isolators, combiners, fiber Bragg gratings, and laser diodes. Selection of the components was based on guidelines to test multiple models of typical fiber laser components. A goal of the effort was to test two models (i.e. different manufacturers) of each type of article selected, representing different technologies for the same type of device. The test articles did not include subsystems or systems. These components and parts may not be available commercial-off-the-shelf (COTS), and, in fact, many are custom articles, or newly developed by the manufacturer. The primary goal for this effort is a completed taxonomy that lists all relevant laser components, modules, subsystems, and interfaces, and cites the documentation for space

  20. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  1. International Thermonuclear Experimental Reactor (ITER). Engineering Design Activities (EDA). Agreement and protocol 1

    International Nuclear Information System (INIS)

    1992-01-01

    This document contains protocol 1 to the agreement among the European Atomic Energy Community, the government of Japan, the Government of the Russian Federation, and the Government of the United States of America on cooperation in the engineering design activities for the International Thermonuclear Experimental Reactor, which activities shall be conducted under the auspices of the International Atomic Energy Agency

  2. Protocols development for security and privacy of radio frequency identification systems

    Science.gov (United States)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  3. An Experimental Protocol for Assessing the Performance of New Ultrasound Probes Based on CMUT Technology in Application to Brain Imaging.

    Science.gov (United States)

    Matrone, Giulia; Ramalli, Alessandro; Savoia, Alessandro Stuart; Quaglia, Fabio; Castellazzi, Gloria; Morbini, Patrizia; Piastra, Marco

    2017-09-24

    The possibility to perform an early and repeatable assessment of imaging performance is fundamental in the design and development process of new ultrasound (US) probes. Particularly, a more realistic analysis with application-specific imaging targets can be extremely valuable to assess the expected performance of US probes in their potential clinical field of application. The experimental protocol presented in this work was purposely designed to provide an application-specific assessment procedure for newly-developed US probe prototypes based on Capacitive Micromachined Ultrasonic Transducer (CMUT) technology in relation to brain imaging. The protocol combines the use of a bovine brain fixed in formalin as the imaging target, which ensures both realism and repeatability of the described procedures, and of neuronavigation techniques borrowed from neurosurgery. The US probe is in fact connected to a motion tracking system which acquires position data and enables the superposition of US images to reference Magnetic Resonance (MR) images of the brain. This provides a means for human experts to perform a visual qualitative assessment of the US probe imaging performance and to compare acquisitions made with different probes. Moreover, the protocol relies on the use of a complete and open research and development system for US image acquisition, i.e. the Ultrasound Advanced Open Platform (ULA-OP) scanner. The manuscript describes in detail the instruments and procedures involved in the protocol, in particular for the calibration, image acquisition and registration of US and MR images. The obtained results prove the effectiveness of the overall protocol presented, which is entirely open (within the limits of the instrumentation involved), repeatable, and covers the entire set of acquisition and processing activities for US images.

  4. Radon in large buildings: The development of a protocol

    International Nuclear Information System (INIS)

    Wilson, D.L.; Dudney, C.S.; Gammage, R.B.

    1993-01-01

    Over the past several years, considerable research has been devoted by the US Environmental Protection Agency (USEPA) and others to develop radon sampling protocols for single family residences and schools. However, very little research has been performed on measuring radon in the work place. To evaluate possible sampling protocols, 833 buildings throughout the United States were selected for extensive radon testing. The buildings tested (warehouses, production plants and office buildings) were representative of commercial buildings across the country both in design, size and use. Based on the results, preliminary radon sampling protocols for the work place have been developed

  5. Caltech computer scientists develop FAST protocol to speed up Internet

    CERN Multimedia

    2003-01-01

    "Caltech computer scientists have developed a new data transfer protocol for the Internet fast enough to download a full-length DVD movie in less than five seconds. The protocol is called FAST, standing for Fast Active queue management Scalable Transmission Control Protocol" (1 page).

  6. Optimized energy-delay sub-network routing protocol development and implementation for wireless sensor networks

    International Nuclear Information System (INIS)

    Fonda, James W; Zawodniok, Maciej; Jagannathan, S; Watkins, Steve E

    2008-01-01

    The development and the implementation issues of a reactive optimized energy-delay sub-network routing (OEDSR) protocol for wireless sensor networks (WSN) are introduced and its performance is contrasted with the popular ad hoc on-demand distance vector (AODV) routing protocol. Analytical results illustrate the performance of the proposed OEDSR protocol, while experimental results utilizing a hardware testbed under various scenarios demonstrate improvements in energy efficiency of the OEDSR protocol. A hardware platform constructed at the University of Missouri-Rolla (UMR), now the Missouri University of Science and Technology (MST), based on the Generation 4 Smart Sensor Node (G4-SSN) prototyping platform is also described. Performance improvements are shown in terms of end-to-end (E2E) delay, throughput, route-set-up time and drop rates and energy usage is given for three topologies, including a mobile topology. Additionally, results from the hardware testbed provide valuable lessons for network deployments. Under testing OEDSR provides a factor of ten improvement in the energy used in the routing session and extends network lifetime compared to AODV. Depletion experiments show that the time until the first node failure is extended by a factor of three with the network depleting and network lifetime is extended by 6.7%

  7. Shoulder muscle endurance: the development of a standardized and reliable protocol

    Directory of Open Access Journals (Sweden)

    Roy Jean-Sébastien

    2011-01-01

    Full Text Available Abstract Background Shoulder muscle fatigue has been proposed as a possible link to explain the association between repetitive arm use and the development of rotator cuff disorders. To our knowledge, no standardized clinical endurance protocol has been developed to evaluate the effects of muscle fatigue on shoulder function. Such a test could improve clinical examination of individuals with shoulder disorders. Therefore, the purpose of this study was to establish a reliable protocol for objective assessment of shoulder muscle endurance. Methods An endurance protocol was developed on a stationary dynamometer (Biodex System 3. The endurance protocol was performed in isotonic mode with the resistance set at 50% of each subject's peak torque as measured for shoulder external (ER and internal rotation (IR. Each subject performed 60 continuous repetitions of IR/ER rotation. The endurance protocol was performed by 36 healthy individuals on two separate occasions at least two days apart. Maximal isometric shoulder strength tests were performed before and after the fatigue protocol to evaluate the effects of the endurance protocol and its reliability. Paired t-tests were used to evaluate the reduction in shoulder strength due to the protocol, while intraclass correlation coefficients (ICC and minimal detectable change (MDC were used to evaluate its reliability. Results Maximal isometric strength was significantly decreased after the endurance protocol (P 0.84. Conclusions Changes in muscular performance observed during and after the muscular endurance protocol suggests that the protocol did result in muscular fatigue. Furthermore, this study established that the resultant effects of fatigue of the proposed isotonic protocol were reproducible over time. The protocol was performed without difficulty by all volunteers and took less than 10 minutes to perform, suggesting that it might be feasible for clinical practice. This protocol could be used to induce

  8. Development and validation of a remote home safety protocol.

    Science.gov (United States)

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  9. Using the Intervention Mapping protocol to develop a family-based intervention for improving lifestyle habits among overweight and obese children: study protocol for a quasi-experimental trial

    Directory of Open Access Journals (Sweden)

    Tonje Holte Stea

    2016-10-01

    Full Text Available Abstract Background In light of the high prevalence of childhood overweight and obesity, there is a need of developing effective prevention programs to address the rising prevalence and the concomitant health consequences. The main aim of the present study is to systematically develop and implement a tailored family-based intervention for improving lifestyle habits among overweight and obese children, aged 6–10 years old, enhancing parental self-efficacy, family engagement and parent-child interaction. A subsidiary aim of the intervention study is to reduce the prevalence of overweight and obesity among those participating in the intervention study. Methods/design The Intervention Mapping protocol was used to develop a tailored family-based intervention for improving lifestyle habits among overweight and obese children. In order to gather information on local opportunities and barriers, interviews with key stakeholders and a 1-year pilot study was conducted. The main study has used a quasi-experimental controlled design. Locally based Healthy Life Centers and Public Health Clinics are responsible for recruiting families and conducting the intervention. The effect of the study will be measured both at completion of the 6 months intervention study and 6 and 18 months after the intervention period. An ecological approach was used as a basis for developing the intervention. The behavioral models and educational strategies include individual family counselling meetings, workshops focusing on regulation of family life, nutrition courses, and physical activity groups providing tailored information and practical learning sessions. Parents will be educated on how to use these strategies at home, to further support their children in improving their behaviors. Discussion A systematic and evidence-based approach was used for development of this family-based intervention study targeting overweight and obese children, 6–10 years old. This program, if

  10. Using the Intervention Mapping protocol to develop a family-based intervention for improving lifestyle habits among overweight and obese children: study protocol for a quasi-experimental trial.

    Science.gov (United States)

    Stea, Tonje Holte; Haugen, Tommy; Berntsen, Sveinung; Guttormsen, Vigdis; Øverby, Nina Cecilie; Haraldstad, Kristin; Meland, Eivind; Abildsnes, Eirik

    2016-10-18

    In light of the high prevalence of childhood overweight and obesity, there is a need of developing effective prevention programs to address the rising prevalence and the concomitant health consequences. The main aim of the present study is to systematically develop and implement a tailored family-based intervention for improving lifestyle habits among overweight and obese children, aged 6-10 years old, enhancing parental self-efficacy, family engagement and parent-child interaction. A subsidiary aim of the intervention study is to reduce the prevalence of overweight and obesity among those participating in the intervention study. The Intervention Mapping protocol was used to develop a tailored family-based intervention for improving lifestyle habits among overweight and obese children. In order to gather information on local opportunities and barriers, interviews with key stakeholders and a 1-year pilot study was conducted. The main study has used a quasi-experimental controlled design. Locally based Healthy Life Centers and Public Health Clinics are responsible for recruiting families and conducting the intervention. The effect of the study will be measured both at completion of the 6 months intervention study and 6 and 18 months after the intervention period. An ecological approach was used as a basis for developing the intervention. The behavioral models and educational strategies include individual family counselling meetings, workshops focusing on regulation of family life, nutrition courses, and physical activity groups providing tailored information and practical learning sessions. Parents will be educated on how to use these strategies at home, to further support their children in improving their behaviors. A systematic and evidence-based approach was used for development of this family-based intervention study targeting overweight and obese children, 6-10 years old. This program, if feasible and effective, may be adjusted to local contexts and

  11. Development of bull trout sampling protocols

    Science.gov (United States)

    R. F. Thurow; J. T. Peterson; J. W. Guzevich

    2001-01-01

    This report describes results of research conducted in Washington in 2000 through Interagency Agreement #134100H002 between the U.S. Fish and Wildlife Service (USFWS) and the U.S. Forest Service Rocky Mountain Research Station (RMRS). The purpose of this agreement is to develop a bull trout (Salvelinus confluentus) sampling protocol by integrating...

  12. A Review of Communications Protocol for Intelligent Remote Terminal Unit Development

    Directory of Open Access Journals (Sweden)

    Mohd Ruddin Ab. Ghani

    2013-11-01

    Full Text Available This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU. Supervisory Control and Data Acquisition (SCADA system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI and International Standard Organization (ISO. The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3, controller area network (CAN, International Electro-technical Commission (IEC 60870, transmission control protocol/internet protocol (TCP/IP.

  13. Development and implementation of the Dutch protocol for rehabilitative management in amyotrophic lateral sclerosis.

    Science.gov (United States)

    van den Berg, J P; de Groot, I J M; Joha, B C; van Haelst, J M; van Gorcom, P; Kalmijn, S

    2004-12-01

    In the Netherlands, rehabilitation care plays an important role in the symptomatic and palliative treatment of ALS patients. However, until 1999 there were no guidelines or practice parameters available for the management of ALS. Therefore, the Dutch protocol for rehabilitative management in ALS was developed. We describe the development process, the outcome and implementation of the protocol. A concept management protocol was written and the Delphi method was selected to develop the protocol further. This method comprises repetitive discussion sessions from postulates, using a combination of written questionnaires and work-conferences. Between 80 and 90 persons (rehabilitation team members of different professional backgrounds and neurologists) were involved in this process. The protocol was implemented by sending it to all consultants in rehabilitation medicine in the Netherlands; they were asked to inform all the treatment team members about the final protocol and to implement it in their treatment of ALS patients. The protocol was developed in 1999, implemented in 2000 and evaluated in 2001. Recommendations for improvement were made during the evaluation and improvements are currently being developed by an expert group. The protocol is widely used (88.9%) by consultants in rehabilitation medicine and their treatment teams in the Netherlands. The Dutch protocol for rehabilitative management was developed to provide an optimal and adequate care plan for patients with ALS. It is widely used in the Netherlands.

  14. Development of an eco-protocol for seaweed chlorophylls extraction and possible applications in dye sensitized solar cells

    International Nuclear Information System (INIS)

    Armeli Minicante, S; Ambrosi, E; Back, M; Barichello, J; Cattaruzza, E; Gonella, F; Scantamburlo, E; Trave, E

    2016-01-01

    Seaweeds are a reserve of natural dyes (chlorophylls a , b and c ), characterized by low cost and easy supply, without potential environmental load in terms of land subtraction, and also complying with the requirements of an efficient waste management policy. In particular, the brown seaweed Undaria pinnatifida is a species largely present in the Venice Lagoon area, and for it a removal strategy is actually mandatory. In this paper, we set-up an eco-protocol for the best extraction and preparation procedures of the pigment, with the aim of finding an easy and affordable method for chlorophyll c extraction, exploring at the same time the possibility of using these algae within local sustainable management integrated strategies, among which the possible use of chlorophylls as a dye source in dye sensitized solar cells (DSSCs) is investigated. Experimental results suggest that the developed protocols are useful to optimize the chlorophyll c extraction, as shown by optical absorption spectroscopy measurements. The DSSCs built with the chlorophyll extracted by the proposed eco-protocol exhibit solar energy conversion efficiencies are similar to those obtained following extraction protocols with larger environmental impacts. (paper)

  15. Thoraco-abdominal high-pitch dual-source CT angiography: Experimental evaluation of injection protocols with an anatomical human vascular phantom

    Energy Technology Data Exchange (ETDEWEB)

    Puippe, Gilbert D., E-mail: gilbert.puippe@usz.ch [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Winklehner, Anna [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Hasenclever, Peter; Plass, André [Division of Cardiac and Vascular Surgery, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Frauenfelder, Thomas; Baumueller, Stephan [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland)

    2012-10-15

    Objective: To experimentally evaluate three different contrast injection protocols at thoraco-abdominal high-pitch dual-source computed tomography angiography (CTA), with regard to level and homogeneity of vascular enhancement at different cardiac outputs. Materials and methods: A uniphasic, a biphasic as well as an individually tailored contrast protocol were tested using a human vascular phantom. Each protocol was scanned at 5 different cardiac outputs (3–5 L/min, steps of 0.5 L/min) using an extracorporeal cardiac pump. Vascular enhancement of the thoraco-abdominal aorta was measured every 5 cm. Overall mean enhancement of each protocol and mean enhancement for each cardiac output within each protocol were calculated. Enhancement homogeneity along the z-axis was evaluated for each cardiac output and protocol. Results: Overall mean enhancement was significantly higher in the uniphasic than in the other two protocols (all p < .05), whereas the difference between the biphasic and tailored protocol was not significant (p = .76). Mean enhancement among each of the 5 cardiac outputs within each protocol was significantly different (all p < .05). Only within the tailored protocol mean enhancement differed not significantly at cardiac outputs of 3.5 L/min vs. 5 L/min (484 ± 25 HU vs. 476 ± 19 HU, p = .14) and 4 vs. 5 L/min (443 ± 49 HU vs. 476 ± 19 HU, p = .05). Both, uniphasic and tailored protocol yielded homogenous enhancement at all cardiac outputs, whereas the biphasic protocol failed to achieve homogenous enhancement. Conclusion: This phantom study suggests that diagnostic and homogenous enhancement at thoraco-abdominal high-pitch dual-source CTA is feasible with either a uniphasic or an individually tailored contrast protocol.

  16. Defining standardized protocols for determining the efficacy of a postmilking teat disinfectant following experimental exposure of teats to mastitis pathogens.

    Science.gov (United States)

    Schukken, Y H; Rauch, B J; Morelli, J

    2013-04-01

    The objective of this paper was to define standardized protocols for determining the efficacy of a postmilking teat disinfectant following experimental exposure of teats to both Staphylococcus aureus and Streptococcus agalactiae. The standardized protocols describe the selection of cows and herds and define the critical points in performing experimental exposure, performing bacterial culture, evaluating the culture results, and finally performing statistical analyses and reporting of the results. The protocols define both negative control and positive control trials. For negative control trials, the protocol states that an efficacy of reducing new intramammary infections (IMI) of at least 40% is required for a teat disinfectant to be considered effective. For positive control trials, noninferiority to a control disinfectant with a published efficacy of reducing new IMI of at least 70% is required. Sample sizes for both negative and positive control trials are calculated. Positive control trials are expected to require a large trial size. Statistical analysis methods are defined and, in the proposed methods, the rate of IMI may be analyzed using generalized linear mixed models. The efficacy of the test product can be evaluated while controlling for important covariates and confounders in the trial. Finally, standards for reporting are defined and reporting considerations are discussed. The use of the defined protocol is shown through presentation of the results of a recent trial of a test product against a negative control. Copyright © 2013 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  17. Histomorphometric assessment of bone necrosis produced by two cryosurgery protocols using liquid nitrogen: an experimental study on rat femurs.

    Science.gov (United States)

    Costa, Fábio Wildson Gurgel; Brito, Gerly Anne de Castro; Pessoa, Rosana Maria Andrade; Studart-Soares, Eduardo Costa

    2011-01-01

    The aim of this study was to evaluate the effects of liquid nitrogen cryosurgery on the femoral diaphysis of rats. The femoral diaphyses of 42 Wistar rats were exposed to three local and sequential applications of liquid nitrogen for 1 or 2 min, intercalated with periods of 5 min of passive thawing. The animals were sacrificed after 1, 2, 4 and 12 weeks and the specimens obtained were processed and analyzed histomorphometrically. The depth and extent of peak bone necrosis were 124.509 µm and 2087.094 µm for the 1-min protocol, respectively, and 436.424 µm and 12046.426 µm for the 2-min protocol. Peak necrosis was observed in the second experimental week with both cryotherapy protocols. The present results indicate that the 2-min protocol produced more marked bone necrosis than the 1-min protocol. Although our results cannot be entirely extrapolated to clinical practice, they contribute to the understanding of the behavior of bone tissue submitted to different cycles of liquid nitrogen freezing and may serve as a basis for new studies.

  18. BioBlocks: Programming Protocols in Biology Made Easier.

    Science.gov (United States)

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-07-21

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  19. Study and development of a remote biometric authentication protocol

    OpenAIRE

    Bistarelli, Stefano; Claudio, Viti

    2003-01-01

    This paper reports the phases of study and implementation of a remote biometric authentication protocol developed during my internship at the I.i.t. of the C.n.r. in Pisa. Starting from the study of authentication history we had a look from the first system used since the 60ies to the latest technology; this helped us understand how we could realize a demonstration working protocol that could achieve a web remote authentication granting good reliability: to do this we choosed to modify the SS...

  20. Development of a research evaluation protocol for NSD research portfolios

    International Nuclear Information System (INIS)

    Gould, J.

    1999-01-01

    This report is concerned with developing and describing a research evaluation protocol for use by the Nuclear Safety Directorate (NSD), in evaluating their various programmes of research; or aspects of those programmes. The Health and Safety Executive (HSE) has been involved with research evaluation for some considerable time and NSD, as part of HSE, wishes to develop a protocol which, while it meets their needs, is also fully compatible with other HSE approaches. It is intended that the methodology developed by this project will be used for evaluation of the Probabilistic Safety Assessment Portfolio (as a separate project). The usefulness of the methodology will be reviewed in the light of this experience

  1. An experimental study on a training support system utilizing trainee's eye gaze point and think aloud protocol for diagnosing nuclear power plant anomalies

    International Nuclear Information System (INIS)

    Ozawa, Takahisa; Samejima, Ryouta; Shimoda, Hiroshi; Yoshikawa, Hidekazu

    2003-01-01

    An experimental system has been developed for aiming at supporting the simulator training of diagnosis nuclear power plant anomaly, where an expert provides the instructions to a trainee by his/her own educational and experienced point of view. This system has several characteristics as follows: (1) the expert can provide the instruction through the local area network or the Internet, (2) the training task is the detection of the primary cause of plant anomaly, which is not including the plant operation but requires only thinking, and (3) the system can automatically detects the trainee's view-point and think aloud protocols and provide these two types of information to the expert in real time for supporting his/her instruction. A laboratory experiment using this system was conducted, where an expert, who had really engaged in plant operation as a chief operator, was employed as the instructor for novice students. As the result of analyzing the experimental data, it was found that the two types of information, trainee's viewpoints and his verbal protocols, have some potential of effectiveness for supporting the instructor to estimate the trainees diagnostic thinking process and provide the instruction. (author)

  2. Computationally Developed Sham Stimulation Protocol for Multichannel Desynchronizing Stimulation

    Directory of Open Access Journals (Sweden)

    Magteld Zeitler

    2018-05-01

    Full Text Available A characteristic pattern of abnormal brain activity is abnormally strong neuronal synchronization, as found in several brain disorders, such as tinnitus, Parkinson's disease, and epilepsy. As observed in several diseases, different therapeutic interventions may induce a placebo effect that may be strong and hinder reliable clinical evaluations. Hence, to distinguish between specific, neuromodulation-induced effects and unspecific, placebo effects, it is important to mimic the therapeutic procedure as precisely as possibly, thereby providing controls that actually lack specific effects. Coordinated Reset (CR stimulation has been developed to specifically counteract abnormally strong synchronization by desynchronization. CR is a spatio-temporally patterned multichannel stimulation which reduces the extent of coincident neuronal activity and aims at an anti-kindling, i.e., an unlearning of both synaptic connectivity and neuronal synchrony. Apart from acute desynchronizing effects, CR may cause sustained, long-lasting desynchronizing effects, as already demonstrated in pre-clinical and clinical proof of concept studies. In this computational study, we set out to computationally develop a sham stimulation protocol for multichannel desynchronizing stimulation. To this end, we compare acute effects and long-lasting effects of six different spatio-temporally patterned stimulation protocols, including three variants of CR, using a no-stimulation condition as additional control. This is to provide an inventory of different stimulation algorithms with similar fundamental stimulation parameters (e.g., mean stimulation rates but qualitatively different acute and/or long-lasting effects. Stimulation protocols sharing basic parameters, but inducing nevertheless completely different or even no acute effects and/or after-effects, might serve as controls to validate the specific effects of particular desynchronizing protocols such as CR. In particular, based on

  3. The effect of repeated laser stimuli to ink-marked skin on skin temperature—recommendations for a safe experimental protocol in humans

    Directory of Open Access Journals (Sweden)

    Victoria J. Madden

    2016-01-01

    Full Text Available Background. Nd:YAP laser is widely used to investigate the nociceptive and pain systems, generating perpetual and laser-evoked neurophysiological responses. A major procedural concern for the use of Nd:YAP laser stimuli in experimental research is the risk of skin damage. The absorption of Nd:YAP laser stimuli is greater in darker skin, or in pale skin that has been darkened with ink, prompting some ethics boards to refuse approval to experimenters wishing to track stimulus location by marking the skin with ink. Some research questions, however, require laser stimuli to be delivered at particular locations or within particular zones, a requirement that is very difficult to achieve if marking the skin is not possible. We thoroughly searched the literature for experimental evidence and protocol recommendations for safe delivery of Nd:YAP laser stimuli over marked skin, but found nothing.Methods. We designed an experimental protocol to define safe parameters for the use of Nd:YAP laser stimuli over skin that has been marked with black dots, and used thermal imaging to assess the safety of the procedure at the forearm and the back.Results. Using thermal imaging and repeated laser stimulation to ink-marked skin, we demonstrated that skin temperature did not increase progressively across the course of the experiment, and that the small change in temperature seen at the forearm was reversed during the rest periods between blocks. Furthermore, no participant experienced skin damage due to the procedure.Conclusion. This protocol offers parameters for safe, confident and effective experimentation using repeated Nd:YAP laser on skin marked with ink, thus paving the way for investigations that depend on it.

  4. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  5. An Experimental Protocol for Maternal Pulmonary Exposure in Developmental Toxicology

    DEFF Research Database (Denmark)

    Jackson, Petra; Lund, Søren P.; Kristiansen, Gitte

    2011-01-01

    To establish a protocol for studying effects of pulmonary exposure in developmental toxicity studies, the effects of intratracheal sham instillation under short-term isoflurane anaesthesia were evaluated with a protocol including multiple instillations during gestation. Twelve time-mated mice (C5...

  6. Development of protocols to inventory or monitor wildlife, fish, or rare plants

    Science.gov (United States)

    David Vesely; Brenda C. McComb; Christina D. Vojta; Lowell H. Suring; Jurai Halaj; Richard S. Holthausen; Benjamin Zuckerberg; Patricia M. Manley

    2006-01-01

    The purpose of this technical guide (hereafter referred to as the Species Protocol Technical Guide) is to provide guidelines for developing inventory and monitoring (I&M) protocols for wildlife, fish, and rare plants (WFRP) using the U.S. Department of Agriculture (USDA) Forest Service technical guide format.

  7. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures.

    Science.gov (United States)

    Renggaman, Anriansyah; Choi, Hong L; Sudiarto, Sartika Ia; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assurance Program (applicable in the United States), that mostly focuses on management- and environment-based measures. In certain cases, however, animal-based measures might not be adequate for properly assessing pig welfare status. Similarly, welfare assessment that relies only on environment- and management-based measures might not represent the actual welfare status of pigs. Therefore, the objective of this paper was to develop a new welfare protocol by integrating animal-, environment-, and management-based measures. The background for selection of certain welfare criteria and modification of the scoring systems from existing welfare assessment protocols are described. The developed pig welfare assessment protocol consists of 17 criteria that are related to four main principles of welfare (good feeding, good housing, good health, and appropriate behavior). Good feeding, good housing, and good health were assessed using a 3-point scale: 0 (good welfare), 1 (moderate welfare), and 2 (poor welfare). In certain cases, only a 2-point scale was used: 0 (certain condition is present) or 2 (certain condition is absent). Appropriate behavior was assessed by scan sampling of positive and negative social behaviors based on qualitative behavior assessment and human-animal relationship tests. Modification of the body condition score into a 3-point scale revealed pigs with a moderate body condition (score 1). Moreover, additional criteria such as feed quality confirmed that farms had moderate (score 1) or poor feed quality (score 2), especially those farms located in a high relative humidity region. The developed protocol can be

  8. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    Science.gov (United States)

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs.

  9. Experimental protocol to assess the tourism vehicles accessibility based on heart rate and access time measurements

    Energy Technology Data Exchange (ETDEWEB)

    Alcala Fazio, E.; Alvarez Fernandez, N.

    2016-07-01

    The objective of the Project is to define an experimental protocol for the accessibility assessment of the transport vehicles, by analysing the evolution of the effort and time variables consumed by a target group –Persons of Reduced Mobility (PMRs). This protocol consisted in tests of accessibility on a sample of 6 passenger cars (class M1) by 8 elderly people carrying a heart rate monitor, and whose access manoeuvres were recorded by video cameras. Based on the Hilloskorpi et al. [1] model and by developing a method of truncation of the heart rate (HR) tests records - eliminating the component of the work biologically needed by the organism to keep its basal metabolic rate from the work each person performed – it was possible to evaluate how much energy each individual invested in each access manoeuver. Immediately after each test, and after the whole round of vehicles, each participant was surveyed for a subjective assessment of the difficulty of accessing to the cars. According to each of the above results, the HR objective measurements and the subjective opinion about the ease of access experienced by each individual, the vehicles were ranked by order of accessibility to the front and rear seats. The result of both rankings showed the orders of the similar vehicles, the potential of the method and a fair closeness between its results and the subjective, but real and unequivocal, judgments of the participants. (Author)

  10. Development of a calibration protocol for quantitative imaging for molecular radiotherapy dosimetry

    International Nuclear Information System (INIS)

    Wevrett, J.; Fenwick, A.; Scuffham, J.; Nisbet, A.

    2017-01-01

    Within the field of molecular radiotherapy, there is a significant need for standardisation in dosimetry, in both quantitative imaging and dosimetry calculations. Currently, there are a wide range of techniques used by different clinical centres and as a result there is no means to compare patient doses between centres. To help address this need, a 3 year project was funded by the European Metrology Research Programme, and a number of clinical centres were involved in the project. One of the required outcomes of the project was to develop a calibration protocol for three dimensional quantitative imaging of volumes of interest. Two radionuclides were selected as being of particular interest: iodine-131 ( 131 I, used to treat thyroid disorders) and lutetium-177 ( 177 Lu, used to treat neuroendocrine tumours). A small volume of activity within a scatter medium (water), representing a lesion within a patient body, was chosen as the calibration method. To ensure ease of use in clinical centres, an “off-the-shelf” solution was proposed – to avoid the need for in-house manufacturing. The BIODEX elliptical Jaszczak phantom and 16 ml fillable sphere were selected. The protocol was developed for use on SPECT/CT gamma cameras only, where the CT dataset would be used to correct the imaging data for attenuation of the emitted photons within the phantom. The protocol corrects for scatter of emitted photons using the triple energy window correction technique utilised by most clinical systems. A number of clinical systems were tested in the development of this protocol, covering the major manufacturers of gamma camera generally used in Europe. Initial imaging was performed with 131 I and 177 Lu at a number of clinical centres, but due to time constraints in the project, some acquisitions were performed with 177 Lu only. The protocol is relatively simplistic, and does not account for the effects of dead-time in high activity patients, the presence of background activity

  11. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  12. An approach to standardization of urine sediment analysis via suggestion of a common manual protocol.

    Science.gov (United States)

    Ko, Dae-Hyun; Ji, Misuk; Kim, Sollip; Cho, Eun-Jung; Lee, Woochang; Yun, Yeo-Min; Chun, Sail; Min, Won-Ki

    2016-01-01

    The results of urine sediment analysis have been reported semiquantitatively. However, as recent guidelines recommend quantitative reporting of urine sediment, and with the development of automated urine sediment analyzers, there is an increasing need for quantitative analysis of urine sediment. Here, we developed a protocol for urine sediment analysis and quantified the results. Based on questionnaires, various reports, guidelines, and experimental results, we developed a protocol for urine sediment analysis. The results of this new protocol were compared with those obtained with a standardized chamber and an automated sediment analyzer. Reference intervals were also estimated using new protocol. We developed a protocol with centrifugation at 400 g for 5 min, with the average concentration factor of 30. The correlation between quantitative results of urine sediment analysis, the standardized chamber, and the automated sediment analyzer were generally good. The conversion factor derived from the new protocol showed a better fit with the results of manual count than the default conversion factor in the automated sediment analyzer. We developed a protocol for manual urine sediment analysis to quantitatively report the results. This protocol may provide a mean for standardization of urine sediment analysis.

  13. Quantum driving of a two level system: quantum speed limit and superadiabatic protocols – an experimental investigation

    International Nuclear Information System (INIS)

    Malossi, N; Arimondo, E; Ciampini, D; Mannella, R; Bason, M G; Viteau, M; Morsch, O

    2013-01-01

    A fundamental requirement in quantum information processing and in many other areas of science is the capability of precisely controlling a quantum system by preparing a quantum state with the highest fidelity and/or in the fastest possible way. Here we present an experimental investigation of a two level system, characterized by a time-dependent Landau-Zener Hamiltonian, aiming to test general and optimal high-fidelity control protocols. The experiment is based on a Bose-Einstein condensate (BEC) loaded into an optical lattice, then accelerated, which provides a high degree of control over the experimental parameters. We implement generalized Landau-Zener sweeps, comparing them with the well-known linear Landau-Zener sweep. We drive the system from an initial state to a final state with fidelity close to unity in the shortest possible time (quantum brachistochrone), thus reaching the ultimate speed limit imposed by quantum mechanics. On the opposite extreme of the quantum control spectrum, the aim is not to minimize the total transition time but to maximize the adiabaticity during the time-evolution, the system being constrained to the adiabatic ground state at any time. We implement such transitionless superadiabatic protocols by an appropriate transformation of the Hamiltonian parameters. This transformation is general and independent of the physical system.

  14. Development of a cryopreservation protocol for type A spermatogonia

    NARCIS (Netherlands)

    Izadyar, Fariborz; Matthijs-Rijsenbilt, J. J.; den Ouden, Krista; Creemers, Laura B.; Woelders, Henri; de Rooij, Dirk G.

    2002-01-01

    The aim of this study was to develop a cryopreservation protocol for type A spermatogonia. Testes from 5- to 7-month-old calves were collected, and type A spermatogonia were isolated using two-step enzymatic digestion and Percoll separation. Cells were resuspended in minimum essential medium (MEM)

  15. Development of a 3D remote dosimetry protocol compatible with MRgIMRT.

    Science.gov (United States)

    Mein, Stewart; Rankine, Leith; Adamovics, John; Li, Harold; Oldham, Mark

    2017-11-01

    To develop a novel remote 3D dosimetry protocol to verify Magnetic Resonance-guided Radiation Therapy (MRgRT) treatments. The protocol was applied to investigate the accuracy of TG-119 IMRT irradiations delivered by the MRIdian ® system (ViewRay ® , Oakwood Village, OH, USA) allowing for a 48-hour delay between irradiation at a field institution and subsequent readout at a base institution. The 3D dosimetry protocol utilizes a novel formulation of PRESAGE ® radiochromic dosimeters developed for high postirradiation stability and compatibility with optical-CT readout. Optical-CT readout was performed with an in-house system utilizing telecentric lenses affording high-resolution scanning. The protocol was developed from preparatory experiments to characterize PRESAGE ® response in relevant conditions. First, linearity and sensitivity of PRESAGE ® dose-response in the presence of a magnetic field was evaluated in a small volume study (4 ml cuvettes) conducted under MRgRT conditions and irradiated with doses 0-15 Gy. Temporal and spatial stability of the dose-response were investigated in large volume studies utilizing large field-of-view (FOV) 2 kg cylindrical PRESAGE ® dosimeters. Dosimeters were imaged at t = 1 hr and t = 48 hrs enabling the development of correction terms to model any observed spatial and temporal changes postirradiation. Polynomial correction factors for temporal and spatial changes in PRESAGE ® dosimeters (C T and C R respectively) were obtained by numerical fitting to time-point data acquired in six irradiated dosimeters. A remote dosimetry protocol was developed where PRESAGE ® change in optical-density (ΔOD) readings at time t = X (the irradiation to return shipment time interval) were corrected back to a convenient standard time t = 1 hr using the C T and C R corrections. This refined protocol was then applied to TG-119 (American Association of Physicists in Medicine, Task Group 119) plan deliveries on the MRIdian

  16. Development of a neuromuscular electrical stimulation protocol for sprint training.

    Science.gov (United States)

    Russ, David W; Clark, Brian C; Krause, Jodi; Hagerman, Fredrick C

    2012-09-01

    Sprint training is associated with several beneficial adaptations in skeletal muscle, including an enhancement of sarcoplasmic reticulum (SR) Ca(2+) release. Unfortunately, several patient populations (e.g., the elderly, those with cardiac dysfunction) that might derive great benefit from sprint exercise are unlikely to tolerate it. The purpose of this report was to describe the development of a tolerable neuromuscular electrical stimulation (NMES) protocol that induces skeletal muscle adaptations similar to those observed with sprint training. Our NMES protocol was modeled after a published sprint exercise protocol and used a novel electrode configuration and stimulation sequence to provide adequate training stimulus while maintaining subject tolerance. Nine young, healthy subjects (four men) began and completed the training protocol of the knee extensor muscles. All subjects completed the protocol, with ratings of discomfort far less than those reported in studies of traditional NMES. Training induced significant increases in SR Ca(2+) release and citrate synthase activity (~16% and 32%, respectively), but SR Ca(2+) uptake did not change. The percentage of myosin heavy chain IIx isoform was decreased significantly after training. At the whole muscle level, neither central activation nor maximum voluntary isometric contraction force were significantly altered, although isometric force did exhibit a trend toward an increase (~3%, P = 0.055). Surprisingly, the NMES training produced a significant increase in muscle cross-sectional area (~3%, P = 0.04). It seems that an appropriately designed NMES protocol can mimic many of the benefits of sprint exercise training, with a low overall time commitment and training volume. These findings suggest that NMES has the potential to bring the benefits of sprint exercise to individuals who are unable to tolerate traditional sprint training.

  17. Development of Characterization Protocol for Mixed Liquid Radioactive Waste Classification

    International Nuclear Information System (INIS)

    Norasalwa Zakaria; Syed Asraf Wafa; Wo, Y.M.; Sarimah Mahat; Mohamad Annuar Assadat Husain

    2017-01-01

    Mixed organic liquid waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclide posed specific challenges in its management. Often, this waste becomes legacy waste in many nuclear facilities and being considered as 'problematic' waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using analytical procedures involving gross alpha beta, and gamma spectrometry. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste. (author)

  18. Development of characterization protocol for mixed liquid radioactive waste classification

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, Norasalwa, E-mail: norasalwa@nuclearmalaysia.gov.my [Waste Technology Development Centre, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wafa, Syed Asraf [Radioisotop Technology and Innovation, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wo, Yii Mei [Radiochemistry and Environment, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Mahat, Sarimah [Material Technology Group, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia)

    2015-04-29

    Mixed liquid organic waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclides posed specific challenges in its management. Often, these wastes become legacy waste in many nuclear facilities and being considered as ‘problematic’ waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using various analytical procedures including gross alpha/ gross beta, gamma spectrometry, and LSC method. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste.

  19. Study protocol: developing a decision system for inclusive housing: applying a systematic, mixed-method quasi-experimental design.

    Science.gov (United States)

    Zeeman, Heidi; Kendall, Elizabeth; Whitty, Jennifer A; Wright, Courtney J; Townsend, Clare; Smith, Dianne; Lakhani, Ali; Kennerley, Samantha

    2016-03-15

    Identifying the housing preferences of people with complex disabilities is a much needed, but under-developed area of practice and scholarship. Despite the recognition that housing is a social determinant of health and quality of life, there is an absence of empirical methodologies that can practically and systematically involve consumers in this complex service delivery and housing design market. A rigorous process for making effective and consistent development decisions is needed to ensure resources are used effectively and the needs of consumers with complex disability are properly met. This 3-year project aims to identify how the public and private housing market in Australia can better respond to the needs of people with complex disabilities whilst simultaneously achieving key corporate objectives. First, using the Customer Relationship Management framework, qualitative (Nominal Group Technique) and quantitative (Discrete Choice Experiment) methods will be used to quantify the housing preferences of consumers and their carers. A systematic mixed-method, quasi-experimental design will then be used to quantify the development priorities of other key stakeholders (e.g., architects, developers, Government housing services etc.) in relation to inclusive housing for people with complex disabilities. Stakeholders randomly assigned to Group 1 (experimental group) will participate in a series of focus groups employing Analytical Hierarchical Process (AHP) methodology. Stakeholders randomly assigned to Group 2 (control group) will participate in focus groups employing existing decision making processes to inclusive housing development (e.g., Risk, Opportunity, Cost, Benefit considerations). Using comparative stakeholder analysis, this research design will enable the AHP methodology (a proposed tool to guide inclusive housing development decisions) to be tested. It is anticipated that the findings of this study will enable stakeholders to incorporate consumer housing

  20. Study protocol: developing a decision system for inclusive housing: applying a systematic, mixed-method quasi-experimental design

    Directory of Open Access Journals (Sweden)

    Heidi Zeeman

    2016-03-01

    Full Text Available Abstract Background Identifying the housing preferences of people with complex disabilities is a much needed, but under-developed area of practice and scholarship. Despite the recognition that housing is a social determinant of health and quality of life, there is an absence of empirical methodologies that can practically and systematically involve consumers in this complex service delivery and housing design market. A rigorous process for making effective and consistent development decisions is needed to ensure resources are used effectively and the needs of consumers with complex disability are properly met. Methods/Design This 3-year project aims to identify how the public and private housing market in Australia can better respond to the needs of people with complex disabilities whilst simultaneously achieving key corporate objectives. First, using the Customer Relationship Management framework, qualitative (Nominal Group Technique and quantitative (Discrete Choice Experiment methods will be used to quantify the housing preferences of consumers and their carers. A systematic mixed-method, quasi-experimental design will then be used to quantify the development priorities of other key stakeholders (e.g., architects, developers, Government housing services etc. in relation to inclusive housing for people with complex disabilities. Stakeholders randomly assigned to Group 1 (experimental group will participate in a series of focus groups employing Analytical Hierarchical Process (AHP methodology. Stakeholders randomly assigned to Group 2 (control group will participate in focus groups employing existing decision making processes to inclusive housing development (e.g., Risk, Opportunity, Cost, Benefit considerations. Using comparative stakeholder analysis, this research design will enable the AHP methodology (a proposed tool to guide inclusive housing development decisions to be tested. Discussion It is anticipated that the findings of this study

  1. The Promises and Challenges of Ecological Momentary Assessment in Schizophrenia: Development of an Initial Experimental Protocol

    Directory of Open Access Journals (Sweden)

    Brandon A. Gaudiano

    2015-07-01

    Full Text Available Severe mental illnesses, including schizophrenia and other psychotic-spectrum disorders, are a major cause of disability worldwide. Although efficacious pharmacological and psychosocial interventions have been developed for treating patients with schizophrenia, relapse rates are high and long-term recovery remains elusive for many individuals. Furthermore, little is still known about the underlying mechanisms of these illnesses. Thus, there is an urgent need to better understand the contextual factors that contribute to psychosis so that they can be better targeted in future interventions. Ecological Momentary Assessment (EMA is a dynamic procedure that permits the measurement of variables in natural settings in real-time through the use of brief assessments delivered via mobile electronic devices (i.e., smartphones. One advantage of EMA is that it is less subject to retrospective memory biases and highly sensitive to fluctuating environmental factors. In the current article, we describe the research-to-date using EMA to better understand fluctuating symptoms and functioning in patients with schizophrenia and other psychotic disorders and potential applications to treatment. In addition, we describe a novel EMA protocol that we have been employing to study the outcomes of patients with schizophrenia following a hospital discharge. We also report the lessons we have learned thus far using EMA methods in this challenging clinical population.

  2. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  3. Development of a standard communication protocol for an emergency situation management in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Man Cheol, E-mail: charleskim@kaeri.re.k [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Park, Jinkyun; Jung, Wondea [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Kim, Hanjeom; Kim, Yoon Joong [YGN Nuclear Power Division Training Center, Korea Hydro and Nuclear Power Company, 517 Kyemari, Hongnong-eup, Yeongkwang-gun, Chonnam 513-880 (Korea, Republic of)

    2010-06-15

    Correct communication between main control room (MCR) operators is an important factor in the management of emergency situations in nuclear power plants (NPPs). For this reason, a standard communication protocol for the management of emergency situations in NPPs has been developed, with the basic direction of enhancing the safety of NPPs and the standardization of communication protocols. To validate the newly developed standard communication protocol, validation experiments with 10 licensed NPP MCR operator teams was performed. From the validation experiments, it was found that the use of the standard communication protocol required more time, but it can contribute to the enhancement of the safety of NPPs by an operators' better grasp of the safety-related parameters and a more efficient and clearer communication between NPP operators, while imposing little additional workloads on the NPP MCR operators. The standard communication protocol is expected to be used to train existing NPP MCR operators without much aversion, as well as new operators.

  4. Using concurrent think-aloud and protocol analysis to explore student nurses' social learning information communication technology knowledge and skill development.

    Science.gov (United States)

    Todhunter, Fern

    2015-06-01

    Observations obtained through concurrent think-aloud and protocol analysis offer new understanding about the influence of social learning on student nurses' acquisition of Information and Communication Technology (ICT) knowledge and skills. The software used provides a permanent record of the underpinning study method, events and analyses. The emerging themes reflect the dimensions of social engagement, and the characteristics of positive and negative reactions to ICT. The evidence shows that given the right conditions, stronger learners will support and guide their peers. To explore the use of concurrent think-aloud and protocol analysis as a method to examine how student nurses approach ICT. To identify the benefits and challenges of using observational technology to capture learning behaviours. To show the influence of small group arrangement and student interactions on their ICT knowledge and skills development. Previous studies examining social interaction between students show how they work together and respond to interactive problem solving. Social interaction has been shown to enhance skills in both ICT and collaborative decision making. Structured observational analysis using concurrent think-aloud and protocol analysis. Students displayed varying degrees of pastoral support and emotional need, leadership, reflection, suggestion and experimentation skills. Encouraging student nurses to work in small mixed ability groups can be conducive for social and ICT skill and knowledge development. Observational software gives a permanent record of the proceedings. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Preclinical experimental stress studies: protocols, assessment and comparison.

    Science.gov (United States)

    Bali, Anjana; Jaggi, Amteshwar Singh

    2015-01-05

    Stress is a state of threatened homeostasis during which a variety of adaptive processes are activated to produce physiological and behavioral changes. Preclinical models are pivotal for understanding these physiological or pathophysiological changes in the body in response to stress. Furthermore, these models are also important for the development of novel pharmacological agents for stress management. The well described preclinical stress models include immobilization, restraint, electric foot shock and social isolation stress. Stress assessment in animals is done at the behavioral level using open field, social interaction, hole board test; at the biochemical level by measuring plasma corticosterone and ACTH; at the physiological level by measuring food intake, body weight, adrenal gland weight and gastric ulceration. Furthermore the comparison between different stressors including electric foot shock, immobilization and cold stressor is described in terms of intensity, hormonal release, protein changes in brain, adaptation and sleep pattern. This present review describes these preclinical stress protocols, and stress assessment at different levels. Copyright © 2014 Elsevier B.V. All rights reserved.

  6. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  7. Developing Tele-Operated Laboratories for Manufacturing Engineering Education. Platform for E-Learning and Telemetric Experimentation (PeTEX

    Directory of Open Access Journals (Sweden)

    A. Erman Tekkaya

    2010-09-01

    Full Text Available The aim of the PeTEX-project is to establish an e-Learning platform for the development, implementation, and delivery of educational training programs in the field of manufacturing engineering. The PeTEX team designs both: a technical platform for eLearning based on “Moodle” including distributed tele-operated experimentation facilities, and didactic and socio-technical requirements for a successful online learning community. User interfaces are deployed for remote access to instruments, data analysis and multiplexed data access via network protocols. Hence, the platform provides complex tools in order to perform various activities to support the educational process, from telemetric experimentation to virtual project groups for an entire community to the purpose of domain specific learning. This paper describes important steps of interdisciplinary participatory design and development of a remote lab-prototype in the field of manufacturing engineering.

  8. Development of a protocol that allows safe consumption of the hypoallergenic apple cultivar Santana

    OpenAIRE

    Maas, van der, M.P.; Schenk, M.F.

    2009-01-01

    The apple (Malus ×domestica) cultivar Santana was shown to have a low allergenicity in a previously reported clinical trial. A protocol was developed to validate these results outside a clinical setting and to market the Santana as a hypoallergenic apple for large-scale consumption. This protocol was designed to ensure safe consumption of the Santana by consumers suffering from apple allergy. We tested the protocol in a pilot in 100 supermarket stores and evaluated in an internet-based survey...

  9. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    Science.gov (United States)

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  10. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  11. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    Science.gov (United States)

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  12. Experimental quantum fingerprinting with weak coherent pulses

    Science.gov (United States)

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  13. The Montreal Protocol's multilateral fund and sustainable development

    International Nuclear Information System (INIS)

    Luken, Ralph; Grof, Tamas

    2006-01-01

    The 1987 Montreal Protocol is widely seen as a global environmental accord that has produced tangible results in terms of reductions in ozone-depleting substances. In addition, there have been other benefits, largely unrecognized and undocumented, that can best be characterized in a sustainable development framework based on a review of 50 out of 931 projects implemented over a 13 year period by one of the four implementing agencies of the Multilateral Fund for the Implementation of the Montreal Protocol. All investment projects have reduced ozone depleting potential and global warming potential. Some projects have reduced atmospheric emissions and contamination of groundwater. Other projects have increased the competitiveness of enterprises in domestic and international markets and have sustained and in a few cases created employment opportunities. Others, fewer in number, have potentially contributed to environmental problems, have initially created difficulties in maintaining productivity and quality standards and have decreased the number of employment opportunities because of the need to rationalize manufacturing processes. The potential contributions from Multilateral Fund investment projects to sustainable development could probably have been amplified with project design guidance for the technical staffs of all three implementing agencies executing investment projects. In thinking about other multilateral environmental agreements, one can see the need for similar guidance for Global Environment Facility funded projects supporting the focal areas of climate change, international waters, ozone depletion and persistent organic pollutants. Some of them have the potential to generate multiple beneficial impacts in addition to their stated environmental objective if designed and implemented within a sustainable development framework. (author)

  14. WelFur - mink: development of on-farm welfare assessment protocols for mink

    DEFF Research Database (Denmark)

    Møller, Steen Henrik; Hansen, Steffen W; Rousing, Tine

    2012-01-01

    European Fur Breeder's Association initiated the "WelFur" project in 2009 in order to develop a welfare assessment protocol for mink and fox farms after the Welfare Quality® standards. The assessment is based on four welfare principles (Good feeding, good housing, good health and appropriate beha...... mink production seasons: Winter, spring, and autumn, in order to cover the life cycle of mink and proved feasible for a one-day visit.......European Fur Breeder's Association initiated the "WelFur" project in 2009 in order to develop a welfare assessment protocol for mink and fox farms after the Welfare Quality® standards. The assessment is based on four welfare principles (Good feeding, good housing, good health and appropriate...

  15. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  16. A content analysis of posthumous sperm procurement protocols with considerations for developing an institutional policy.

    Science.gov (United States)

    Bahm, Sarah M; Karkazis, Katrina; Magnus, David

    2013-09-01

    To identify and analyze existing posthumous sperm procurement (PSP) protocols in order to outline central themes for institutions to consider when developing future policies. Qualitative content analysis. Large academic institutions across the United States. We performed a literature search and contacted 40 institutions to obtain nine full PSP protocols. We then performed a content analysis on these policies to identify major themes and factors to consider when developing a PSP protocol. Presence of a PSP policy. We identified six components of a thorough PSP protocol: Standard of Evidence, Terms of Eligibility, Sperm Designee, Restrictions on Use in Reproduction, Logistics, and Contraindications. We also identified two different approaches to policy structure. In the Limited Role approach, institutions have stricter consent requirements and limit their involvement to the time of procurement. In the Family-Centered approach, substituted judgment is permitted but a mandatory wait period is enforced before sperm use in reproduction. Institutions seeking to implement a PSP protocol will benefit from considering the six major building blocks of a thorough protocol and where they would like to fall on the spectrum from a Limited Role to a Family-Centered approach. Copyright © 2013 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  17. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  18. Outsourcing of experimental work

    DEFF Research Database (Denmark)

    Nielsen, Henrik

    2011-01-01

    With the development of new technologies for simultaneous analysis of many genes, transcripts, or proteins (the "omics" revolution), it has become common to outsource parts of the experimental work. In order to maintain the integrity of the research projects, it is important that the interphase...... between the researcher and the service is further developed. This involves robust protocols for sample preparation, an informed choice of analytical tool, development of standards for individual technologies, and transparent data analysis. This chapter introduces some of the problems related to analysis...

  19. 76 FR 60503 - Guidance for Industry on Target Animal Safety and Effectiveness Protocol Development and...

    Science.gov (United States)

    2011-09-29

    ... Safety and Effectiveness Protocol Development and Submission.'' The purpose of this document is to provide sponsors guidance in preparation of study protocols for review by the Center for Veterinary Medicine, Office of New Animal Drug Evaluation. The recommendations included in this guidance are intended...

  20. Experimental quantum fingerprinting with weak coherent pulses

    Science.gov (United States)

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-01-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity. PMID:26515586

  1. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    Science.gov (United States)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  2. Seismic Parameters of Mining-Induced Aftershock Sequences for Re-entry Protocol Development

    Science.gov (United States)

    Vallejos, Javier A.; Estay, Rodrigo A.

    2018-03-01

    A common characteristic of deep mines in hard rock is induced seismicity. This results from stress changes and rock failure around mining excavations. Following large seismic events, there is an increase in the levels of seismicity, which gradually decay with time. Restricting access to areas of a mine for enough time to allow this decay of seismic events is the main approach in re-entry strategies. The statistical properties of aftershock sequences can be studied with three scaling relations: (1) Gutenberg-Richter frequency magnitude, (2) the modified Omori's law (MOL) for the temporal decay, and (3) Båth's law for the magnitude of the largest aftershock. In this paper, these three scaling relations, in addition to the stochastic Reasenberg-Jones model are applied to study the characteristic parameters of 11 large magnitude mining-induced aftershock sequences in four mines in Ontario, Canada. To provide guidelines for re-entry protocol development, the dependence of the scaling relation parameters on the magnitude of the main event are studied. Some relations between the parameters and the magnitude of the main event are found. Using these relationships and the scaling relations, a space-time-magnitude re-entry protocol is developed. These findings provide a first approximation to concise and well-justified guidelines for re-entry protocol development applicable to the range of mining conditions found in Ontario, Canada.

  3. The development of standard operating protocols for paediatric radiology

    International Nuclear Information System (INIS)

    Hardwick, J.; Mencik, C.; McLaren, C.; Young, C.; Scadden, S.; Mashford, P.; McHugh, K.; Beckett, M.; Calvert, M.; Marsden, P.J.

    2001-01-01

    This paper describes how the requirement for operating protocols for standard radiological practice was expanded to provide a comprehensive aide to the operator conducting a medical exposure. The protocols adopted now include justification criteria, patient preparation, radiographic technique, standard exposure charts, diagnostic reference levels and image quality criteria. In total, the protocols have been welcomed as a tool for ensuring that medical exposures are properly optimised. (author)

  4. Development of a dynamic quality assurance testing protocol for multisite clinical trial DCE-CT accreditation

    Energy Technology Data Exchange (ETDEWEB)

    Driscoll, B. [Department of Radiation Physics, Princess Margaret Cancer Center, 610 University Avenue, Toronto, Ontario M5G 2M9 (Canada); Keller, H. [Department of Radiation Physics, Princess Margaret Cancer Center, 610 University Avenue, Toronto, Ontario M5G 2M9, Canada and Department of Radiation Oncology, University of Toronto, 150 College Street, Toronto, Ontario M5S 3E2 (Canada); Jaffray, D.; Coolens, C. [Department of Radiation Physics, Princess Margaret Cancer Center, 610 University Avenue, Toronto, Ontario M5G 2M9 (Canada); Department of Radiation Oncology, University of Toronto, 150 College Street, Toronto, Ontario M5S 3E2 (Canada); Techna Institute, University Health Network, 124-100 College Street, Toronto, Ontario M5G 1L5 (Canada)

    2013-08-15

    Purpose: Credentialing can have an impact on whether or not a clinical trial produces useful quality data that is comparable between various institutions and scanners. With the recent increase of dynamic contrast enhanced-computed tomography (DCE-CT) usage as a companion biomarker in clinical trials, effective quality assurance, and control methods are required to ensure there is minimal deviation in the results between different scanners and protocols at various institutions. This paper attempts to address this problem by utilizing a dynamic flow imaging phantom to develop and evaluate a DCE-CT quality assurance (QA) protocol.Methods: A previously designed flow phantom, capable of producing predictable and reproducible time concentration curves from contrast injection was fully validated and then utilized to design a DCE-CT QA protocol. The QA protocol involved a set of quantitative metrics including injected and total mass error, as well as goodness of fit comparison to the known truth concentration curves. An additional region of interest (ROI) sensitivity analysis was also developed to provide additional details on intrascanner variability and determine appropriate ROI sizes for quantitative analysis. Both the QA protocol and ROI sensitivity analysis were utilized to test variations in DCE-CT results using different imaging parameters (tube voltage and current) as well as alternate reconstruction methods and imaging techniques. The developed QA protocol and ROI sensitivity analysis was then applied at three institutions that were part of clinical trial involving DCE-CT and results were compared.Results: The inherent specificity of robustness of the phantom was determined through calculation of the total intraday variability and determined to be less than 2.2 ± 1.1% (total calculated output contrast mass error) with a goodness of fit (R{sup 2}) of greater than 0.99 ± 0.0035 (n= 10). The DCE-CT QA protocol was capable of detecting significant deviations from

  5. Development of a protocol to measure iron-55 in solid matrices in the environment

    International Nuclear Information System (INIS)

    Augeray, Céline; Magalie, Mouton; Nathalie, Broustet; Marie-France, Perdereau; Chloé, Laconici; Jeanne, Loyen; Corinne, Fayolle; Jean-Louis, Picolo

    2015-01-01

    The development of metrology of iron-55 in low-level radioactivity in environmental solid matrices was realised for conducting radioecological studies. A protocol was developed based on the adaptation of existing methods for the purification of iron-55 with selective chromatographic resin, which was then measured with liquid scintillation. The loss attached treatment chemical steps were quantified with elemental iron by Inductively Coupled Plasma Atomic Emission Spectrometry (ICP-AES). The tests were used to define the iron retention capacity of selective chromatographic resin, a key element in chemical treatment, and test sample size needed to reach the detection limit of 30 Bq kg −1  dry. The solid samples were analysed with the developed protocol. The activities obtained from iron-55 were below the detection limit of 30 Bq kg −1  dry. - Highlights: • To obtain the desired detection limit in environmental solid matrices, the choice of method was realised. • A protocol was thus developed with our resources to obtain a 30 Bq kg-1 dry detection limit. • The optimisation of the operating conditions is described and the activities obtained are presented

  6. The development of optimization protocol in SRS

    International Nuclear Information System (INIS)

    Oh, S. J.; Suh, T. S.; Lee, H. K.; Choe, B. Y.

    2002-01-01

    In an operation of stereotactic radiosurgery(SRS), a high dose must be delivered to a target region while a normal tissue region must be spared. Using dose distribution which fits in a target region satisfies this purpose. This is solved by using data bases through the simple patient model simulating the brain model and the tumor region. The objective of this research is to develop brain model with tumor based on pseudo coordinate and systematic optimization protocol and to construct data base(DB) about beam parameters such as position and number of isocenter and collimator size. The normal tissue region of patient can be spared by DB in a operation of SRS

  7. The development of optimization protocol in SRS

    Energy Technology Data Exchange (ETDEWEB)

    Oh, S. J.; Suh, T. S.; Lee, H. K.; Choe, B. Y. [The Catholic Univ., of Korea, Seoul (Korea, Republic of)

    2002-07-01

    In an operation of stereotactic radiosurgery(SRS), a high dose must be delivered to a target region while a normal tissue region must be spared. Using dose distribution which fits in a target region satisfies this purpose. This is solved by using data bases through the simple patient model simulating the brain model and the tumor region. The objective of this research is to develop brain model with tumor based on pseudo coordinate and systematic optimization protocol and to construct data base(DB) about beam parameters such as position and number of isocenter and collimator size. The normal tissue region of patient can be spared by DB in a operation of SRS.

  8. An Experimental and Finite Element Protocol to Investigate the Transport of Neutral and Charged Solutes across Articular Cartilage.

    Science.gov (United States)

    Arbabi, Vahid; Pouran, Behdad; Zadpoor, Amir A; Weinans, Harrie

    2017-04-23

    Osteoarthritis (OA) is a debilitating disease that is associated with degeneration of articular cartilage and subchondral bone. Degeneration of articular cartilage impairs its load-bearing function substantially as it experiences tremendous chemical degradation, i.e. proteoglycan loss and collagen fibril disruption. One promising way to investigate chemical damage mechanisms during OA is to expose the cartilage specimens to an external solute and monitor the diffusion of the molecules. The degree of cartilage damage (i.e. concentration and configuration of essential macromolecules) is associated with collisional energy loss of external solutes while moving across articular cartilage creates different diffusion characteristics compared to healthy cartilage. In this study, we introduce a protocol, which consists of several steps and is based on previously developed experimental micro-Computed Tomography (micro-CT) and finite element modeling. The transport of charged and uncharged iodinated molecules is first recorded using micro-CT, which is followed by applying biphasic-solute and multiphasic finite element models to obtain diffusion coefficients and fixed charge densities across cartilage zones.

  9. Development and implementation of intranasal naloxone opioid overdose response protocol at a homeless health clinic.

    Science.gov (United States)

    Dahlem, Chin Hwa Y; Horstman, Molly J; Williams, Brent C

    2016-01-01

    To describe the development, implementation, and preliminary evaluation of Opioid Overdose Response Protocol using intranasal (IN) naloxone in a homeless shelter. Opioid Overdose Response Protocol and training curriculum were developed using the Massachusetts Department of Public Health Opioid Overdose Education and Naloxone Distribution (OEND) flow chart, the American Heart Association (AHA) simplified adult basic life support algorithm, and resources through Harms Reduction Coalition. Intranasal naloxone offers a safe and effective method for opioid reversal. To combat the rising incidence of opioid overdose, IN naloxone should be made available at homeless shelters and other facilities with high frequency of opioid overdose, including the training of appropriate staff. This project has demonstrated the effective training and implementation of an Opioid Overdose Response Protocol, based on feedback received from cardiopulmonary resuscitation (CPR) trained nonhealthcare staff. Nurse practitioners (NPs), with our focus on patient care, prevention, and education, are well suited to the deployment of this life-saving protocol. NPs are in critical positions to integrate opioid overdose prevention education and provide naloxone rescue kits in clinical practices. ©2015 American Association of Nurse Practitioners.

  10. Experimental Protocol to Determine the Chloride Threshold Value for Corrosion in Samples Taken from Reinforced Concrete Structures.

    Science.gov (United States)

    Angst, Ueli M; Boschmann, Carolina; Wagner, Matthias; Elsener, Bernhard

    2017-08-31

    The aging of reinforced concrete infrastructure in developed countries imposes an urgent need for methods to reliably assess the condition of these structures. Corrosion of the embedded reinforcing steel is the most frequent cause for degradation. While it is well known that the ability of a structure to withstand corrosion depends strongly on factors such as the materials used or the age, it is common practice to rely on threshold values stipulated in standards or textbooks. These threshold values for corrosion initiation (Ccrit) are independent of the actual properties of a certain structure, which clearly limits the accuracy of condition assessments and service life predictions. The practice of using tabulated values can be traced to the lack of reliable methods to determine Ccrit on-site and in the laboratory. Here, an experimental protocol to determine Ccrit for individual engineering structures or structural members is presented. A number of reinforced concrete samples are taken from structures and laboratory corrosion testing is performed. The main advantage of this method is that it ensures real conditions concerning parameters that are well known to greatly influence Ccrit, such as the steel-concrete interface, which cannot be representatively mimicked in laboratory-produced samples. At the same time, the accelerated corrosion test in the laboratory permits the reliable determination of Ccrit prior to corrosion initiation on the tested structure; this is a major advantage over all common condition assessment methods that only permit estimating the conditions for corrosion after initiation, i.e., when the structure is already damaged. The protocol yields the statistical distribution of Ccrit for the tested structure. This serves as a basis for probabilistic prediction models for the remaining time to corrosion, which is needed for maintenance planning. This method can potentially be used in material testing of civil infrastructures, similar to established

  11. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  12. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  13. Development and Pilot Implementation of a Search Protocol to Improve Patient Safety on a Psychiatric Inpatient Unit.

    Science.gov (United States)

    Abela-Dimech, Frances; Johnston, Kim; Strudwick, Gillian

    A mental health organization in Ontario, Canada, noted an increase in unsafe items entering locked inpatient units. The purpose of this project was to develop and implement a search protocol to improve patient, staff, and visitor safety by preventing unsafe items from entering a locked inpatient unit. Under the guidance of a clinical nurse specialist, an interprofessional team used the Failure Mode and Effects Analysis framework to identify what items were considered unsafe, how these unsafe items were entering the unit, and what strategies could be used to prevent these items from entering the unit. A standardized search protocol was identified as a strategy to prevent items from entering the unit. The standardized search protocol was developed and piloted on 1 unit. To support the search protocol, an interprofessional team created a poster using a mnemonic aid to educate patients, staff, and visitors about which items could not be brought onto the unit. Educational sessions on the search protocol were provided for staff. The difference between the number of incidents before and after the implementation of the search protocol was statistically significant. Safety on an inpatient unit was increased as incidents of unsafe items entering the unit decreased.

  14. Photoelectrochemical water splitting standards, experimental methods, and protocols

    CERN Document Server

    Chen, Zhebo; Miller, Eric

    2014-01-01

    This book outlines many of the techniques involved in materials development and characterization for photoelectrochemical (PEC) - for example, proper metrics for describing material performance, how to assemble testing cells and prepare materials for assessment of their properties, and how to perform the experimental measurements needed to achieve reliable results towards better scientific understanding. For each technique, proper procedure, benefits, limitations, and data interpretation are discussed. Consolidating this information in a short, accessible, and easy to read reference guide will allow researchers to more rapidly immerse themselves into PEC research and also better compare their results against those of other researchers to better advance materials development. This book serves as a "how-to" guide for researchers engaged in or interested in engaging in the field of photoelectrochemical (PEC) water splitting. PEC water splitting is a rapidly growing field of research in which the goal is to deve...

  15. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  16. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    Directory of Open Access Journals (Sweden)

    de Courten Maximilian

    2006-02-01

    Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to

  17. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  18. EVA Human Health and Performance Benchmarking Study Overview and Development of a Microgravity Protocol

    Science.gov (United States)

    Norcross, Jason; Jarvis, Sarah; Bekdash, Omar; Cupples, Scott; Abercromby, Andrew

    2017-01-01

    The primary objective of this study is to develop a protocol to reliably characterize human health and performance metrics for individuals working inside various EVA suits under realistic spaceflight conditions. Expected results and methodologies developed during this study will provide the baseline benchmarking data and protocols with which future EVA suits and suit configurations (e.g., varied pressure, mass, center of gravity [CG]) and different test subject populations (e.g., deconditioned crewmembers) may be reliably assessed and compared. Results may also be used, in conjunction with subsequent testing, to inform fitness-for-duty standards, as well as design requirements and operations concepts for future EVA suits and other exploration systems.

  19. A feeding protocol for delivery of agents to assess development in Varroa mites.

    Directory of Open Access Journals (Sweden)

    Ana R Cabrera

    Full Text Available A novel feeding protocol for delivery of bio-active agents to Varroa mites was developed by providing mites with honey bee larva hemolymph supplemented with cultured insect cells and selected materials delivered on a fibrous cotton substrate. Mites were starved, fed on treated hemolymph to deliver selected agents and then returned to bee larvae. Transcript levels of two reference genes, actin and glyceraldehyde 3-phosphate dehydrogenase (GAPDH, as well as for nine selected genes involved in reproductive processes showed that the starvation and feeding protocol periods did not pose a high level of stress to the mites as transcript levels remained comparable between phoretic mites and those completing the protocol. The feeding protocol was used to deliver molecules such as hormone analogs or plasmids. Mites fed with Tebufenozide, an ecdysone analog, had higher transcript levels of shade than untreated or solvent treated mites. In order to extend this feeding protocol, cultured insect cells were incorporated to a final ratio of 1 part cells and 2 parts hemolymph. Although supplementation with Bombyx mori Bm5 cells increased the amount of hemolymph consumed per mite, there was a significant decrease in the percentage of mites that fed and survived. On the other hand, Drosophila melanogaster S2 cells reduced significantly the percentage of mites that fed and survived as well as the amount of hemolymph consumed. The feeding protocol provides a dynamic platform with which to challenge the Varroa mite to establish efficacy of control agents for this devastating honey bee pest.

  20. Who needs inpatient detox? Development and implementation of a hospitalist protocol for the evaluation of patients for alcohol detoxification.

    Science.gov (United States)

    Stephens, John R; Liles, E Allen; Dancel, Ria; Gilchrist, Michael; Kirsch, Jonathan; DeWalt, Darren A

    2014-04-01

    Clinicians caring for patients seeking alcohol detoxification face many challenges, including lack of evidence-based guidelines for treatment and high recidivism rates. To develop a standardized protocol for determining which alcohol dependent patients seeking detoxification need inpatient versus outpatient treatment, and to study the protocol's implementation. Review of best evidence by ad hoc task force and subsequent creation of standardized protocol. Prospective observational evaluation of initial protocol implementation. Patients presenting for alcohol detoxification. Development and implementation of a protocol for evaluation and treatment of patients requesting alcohol detoxification. Number of admissions per month with primary alcohol related diagnosis (DRG), 30-day readmission rate, and length of stay, all measured before and after protocol implementation. We identified one randomized clinical trial and three cohort studies to inform the choice of inpatient versus outpatient detoxification, along with one prior protocol in this population, and combined that data with clinical experience to create an institutional protocol. After implementation, the average number of alcohol related admissions was 15.9 per month, compared with 18.9 per month before implementation (p = 0.037). There was no difference in readmission rate or length of stay. Creation and utilization of a protocol led to standardization of care for patients requesting detoxification from alcohol. Initial evaluation of protocol implementation showed a decrease in number of admissions.

  1. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  2. Interaction Control Protocols for Distributed Multi-user Multi-camera Environments

    Directory of Open Access Journals (Sweden)

    Gareth W Daniel

    2003-10-01

    Full Text Available Video-centred communication (e.g., video conferencing, multimedia online learning, traffic monitoring, and surveillance is becoming a customary activity in our lives. The management of interactions in such an environment is a complicated HCI issue. In this paper, we present our study on a collection of interaction control protocols for distributed multiuser multi-camera environments. These protocols facilitate different approaches to managing a user's entitlement for controlling a particular camera. We describe a web-based system that allows multiple users to manipulate multiple cameras in varying remote locations. The system was developed using the Java framework, and all protocols discussed have been incorporated into the system. Experiments were designed and conducted to evaluate the effectiveness of these protocols, and to enable the identification of various human factors in a distributed multi-user and multi-camera environment. This work provides an insight into the complexity associated with the interaction management in video-centred communication. It can also serve as a conceptual and experimental framework for further research in this area.

  3. Wireless Power Transfer Protocols in Sensor Networks: Experiments and Simulations

    Directory of Open Access Journals (Sweden)

    Sotiris Nikoletseas

    2017-04-01

    Full Text Available Rapid technological advances in the domain of Wireless Power Transfer pave the way for novel methods for power management in systems of wireless devices, and recent research works have already started considering algorithmic solutions for tackling emerging problems. In this paper, we investigate the problem of efficient and balanced Wireless Power Transfer in Wireless Sensor Networks. We employ wireless chargers that replenish the energy of network nodes. We propose two protocols that configure the activity of the chargers. One protocol performs wireless charging focused on the charging efficiency, while the other aims at proper balance of the chargers’ residual energy. We conduct detailed experiments using real devices and we validate the experimental results via larger scale simulations. We observe that, in both the experimental evaluation and the evaluation through detailed simulations, both protocols achieve their main goals. The Charging Oriented protocol achieves good charging efficiency throughout the experiment, while the Energy Balancing protocol achieves a uniform distribution of energy within the chargers.

  4. Standardization of a Videofluoroscopic Swallow Study Protocol to Investigate Dysphagia in Dogs.

    Science.gov (United States)

    Harris, R A; Grobman, M E; Allen, M J; Schachtel, J; Rawson, N E; Bennett, B; Ledyayev, J; Hopewell, B; Coates, J R; Reinero, C R; Lever, T E

    2017-03-01

    Videofluoroscopic swallow study (VFSS) is the gold standard for diagnosis of dysphagia in veterinary medicine but lacks standardized protocols that emulate physiologic feeding practices. Age impacts swallow function in humans but has not been evaluated by VFSS in dogs. To develop a protocol with custom kennels designed to allow free-feeding of 3 optimized formulations of contrast media and diets that address limitations of current VFSS protocols. We hypothesized that dogs evaluated by a free-feeding VFSS protocol would show differences in objective swallow metrics based on age. Healthy juvenile, adult, and geriatric dogs (n = 24). Prospective, experimental study. Custom kennels were developed to maintain natural feeding behaviors during VFSS. Three food consistencies (thin liquid, pureed food, and dry kibble) were formulated with either iohexol or barium to maximize palatability and voluntary prehension. Dogs were evaluated by 16 swallow metrics and compared across age groups. Development of a standardized VFSS protocol resulted in successful collection of swallow data in healthy dogs. No significant differences in swallow metrics were observed among age groups. Substantial variability was observed in healthy dogs when evaluated under these physiologic conditions. Features typically attributed to pathologic states, such as gastric reflux, were seen in healthy dogs. Development of a VFSS protocol that reflects natural feeding practices may allow emulation of physiology resulting in clinical signs of dysphagia. Age did not result in significant changes in swallow metrics, but additional studies are needed, particularly in light of substantial normal variation. Copyright © 2017 The Authors. Journal of Veterinary Internal Medicine published by Wiley Periodicals, Inc. on behalf of the American College of Veterinary Internal Medicine.

  5. Development of a systematic observation protocol of physical exposure of the back: a preliminary study.

    Science.gov (United States)

    Tousignant, M; Tougas, G; Rossignol, M; Goulet, L

    2002-04-01

    At present there is no systematic observation protocol for the assessment of the multi-factorial aspects of physical exposure related to the back used within the constraints of occupational epidemiological research. In this context, a new preliminary systematic observation protocol is proposed to assess exposure to physical loading of the back using nine categories of physical risk factors: the SOPE back protocol. The objective of this study was to investigate whether the new protocol can correctly identify the level of exposure related to measured physical loading of the back. The subjects of this closed cohort study were 451 manual workers at a natural gas distribution company. The assessment of exposure was made with the protocol using groups with different job titles. The workers were followed for a 2 yr period to establish the risk of a new occurrence of complete disability related to the back (NOCD back injury) in each job grouping. Based on the median of the total scores derived from the protocol, two levels of exposure were identified (high and low). Taking into account the limitations of this study, the protocol in development may be a good tool to establish two levels of exposure to physical loading of the back in large epidemiological studies of occupational low back pain. Further research is needed to replicate these results with larger samples and to test the reliability and predictive validity of the protocol.

  6. Interventions developed with the Intervention Mapping protocol in the field of cancer: A systematic review.

    Science.gov (United States)

    Lamort-Bouché, Marion; Sarnin, Philippe; Kok, Gerjo; Rouat, Sabrina; Péron, Julien; Letrilliart, Laurent; Fassier, Jean-Baptiste

    2018-04-01

    The Intervention Mapping (IM) protocol provides a structured framework to develop, implement, and evaluate complex interventions. The main objective of this review was to identify and describe the content of the interventions developed in the field of cancer with the IM protocol. Secondary objectives were to assess their fidelity to the IM protocol and to review their theoretical frameworks. Medline, Web of Science, PsycINFO, PASCAL, FRANCIS, and BDSP databases were searched. All titles and abstracts were reviewed. A standardized extraction form was developed. All included studies were reviewed by 2 reviewers blinded to each other. Sixteen studies were identified, and these reported 15 interventions. The objectives were to increase cancer screening participation (n = 7), early consultation (n = 1), and aftercare/quality of life among cancer survivors (n = 7). Six reported a complete participatory planning group, and 7 described a complete logic model of the problem. Ten studies described a complete logic model of change. The main theoretical frameworks used were the theory of planned behaviour (n = 8), the transtheoretical model (n = 6), the health belief model (n = 6), and the social cognitive theory (n = 6). The environment was rarely integrated in the interventions (n = 4). Five interventions were reported as effective. Culturally relevant interventions were developed with the IM protocol that were effective to increase cancer screening and reduce social disparities, particularly when they were developed through a participative approach and integrated the environment. Stakeholders' involvement and the role of the environment were heterogeneously integrated in the interventions. Copyright © 2017 John Wiley & Sons, Ltd.

  7. Experimental protocol for packaging and encrypting multiple data

    International Nuclear Information System (INIS)

    Barrera, John Fredy; Trejos, Sorayda; Tebaldi, Myrian; Torroba, Roberto

    2013-01-01

    We present a novel single optical packaging and encryption (SOPE) procedure for multiple inputs. This procedure is based on a merging of a 2f scheme with a digital holographic technique to achieve efficient handling of multiple data. Through the 2f system with a random phase mask attached in its input plane, and the holographic technique, we obtain each processed input. A posteriori filtering and repositioning protocol on each hologram followed by an addition of all processed data, allows storing these data to form a single package. The final package is digitally multiplied by a second random phase mask acting as an encryption mask. In this way, the final user receives only one encrypted information unit and a single key, instead of a conventional multiple-image collecting method and several keys. Processing of individual images is cast into an optimization problem. The proposed optimization aims to simplify the handling and recovery of images while packing all of them into a single unit. The decoding process does not have the usual cross-talk or noise problems involved in other methods, as filtering and repositioning precedes the encryption step. All data are recovered in just one step at the same time by applying a simple Fourier transform operation and the decoding key. The proposed protocol takes advantage of optical processing and the versatility of the digital format. Experiments have been conducted using a Mach–Zehnder interferometer. An application is subsequently demonstrated to illustrate the feasibility of the SOPE procedure. (paper)

  8. Experimental development of a new protocol for extraction and characterization of microplastics in fish tissues: First observations in commercial species from Adriatic Sea.

    Science.gov (United States)

    Avio, Carlo Giacomo; Gorbi, Stefania; Regoli, Francesco

    2015-10-01

    The presence of microplastics in the marine environment has raised scientific interest during the last decade. Several organisms can ingest microplastics with potentially adverse effects on the digestive tract, respiratory system and locomotory appendages. However, a clear evidence of tissue accumulation and transfer of such microparticles in wild organisms is still lacking, partially hampered by technical difficulties in isolation and characterization protocols from biological samples. In this work, we compared the efficacy of some existing approaches and we optimized a new protocol allowing an extraction yield of microplastics from fish tissues ranging between 78% and 98%, depending on the polymer size. FT-IR analyses confirmed that the extraction procedure did not affect the particles characteristics. The method was further validated on the fish mullet, Mugil cephalus, exposed under laboratory conditions to polystyrene and polyethylene; the particles were isolated and quantified in stomach and liver, and their presence in the hepatic tissue was confirmed also by histological analyses. A preliminary characterization revealed the presence and distribution of microplastics in various fish species collected along the Adriatic Sea. FT-IR analyses indicated polyethylene as the predominant polymer (65%) in the stomach of fish. The overall results confirmed the newly developed method as a reliable approach to detect and quantify microplastics in the marine biota. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Using generalizability theory to develop clinical assessment protocols.

    Science.gov (United States)

    Preuss, Richard A

    2013-04-01

    Clinical assessment protocols must produce data that are reliable, with a clinically attainable minimal detectable change (MDC). In a reliability study, generalizability theory has 2 advantages over classical test theory. These advantages provide information that allows assessment protocols to be adjusted to match individual patient profiles. First, generalizability theory allows the user to simultaneously consider multiple sources of measurement error variance (facets). Second, it allows the user to generalize the findings of the main study across the different study facets and to recalculate the reliability and MDC based on different combinations of facet conditions. In doing so, clinical assessment protocols can be chosen based on minimizing the number of measures that must be taken to achieve a realistic MDC, using repeated measures to minimize the MDC, or simply based on the combination that best allows the clinician to monitor an individual patient's progress over a specified period of time.

  10. Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations

    Energy Technology Data Exchange (ETDEWEB)

    Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

    1996-12-31

    In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

  11. Experimental investigation of quantum communication protocols in higher dimensions

    International Nuclear Information System (INIS)

    Groeblacher, S.; Stuetz, M.; Vaziri, A.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: Higher dimensional quantum systems, such as qutrits, offer unique possibilities for quantum communication. In particular, quantum key distribution may be realized with a higher security margin than with qubit systems. We plan to demonstrate quantum cryptography with entangled photonic qutrits based on orbital angular momentum (OAM). Therefore we test various methods of manipulating and transforming OAM states of photons, which is required for the implementation of quantum communication protocols. (author)

  12. New method development in prehistoric stone tool research: evaluating use duration and data analysis protocols.

    Science.gov (United States)

    Evans, Adrian A; Macdonald, Danielle A; Giusca, Claudiu L; Leach, Richard K

    2014-10-01

    Lithic microwear is a research field of prehistoric stone tool (lithic) analysis that has been developed with the aim to identify how stone tools were used. It has been shown that laser scanning confocal microscopy has the potential to be a useful quantitative tool in the study of prehistoric stone tool function. In this paper, two important lines of inquiry are investigated: (1) whether the texture of worn surfaces is constant under varying durations of tool use, and (2) the development of rapid objective data analysis protocols. This study reports on the attempt to further develop these areas of study and results in a better understanding of the complexities underlying the development of flexible analytical algorithms for surface analysis. The results show that when sampling is optimised, surface texture may be linked to contact material type, independent of use duration. Further research is needed to validate this finding and test an expanded range of contact materials. The use of automated analytical protocols has shown promise but is only reliable if sampling location and scale are defined. Results suggest that the sampling protocol reports on the degree of worn surface invasiveness, complicating the ability to investigate duration related textural characterisation. Copyright © 2014. Published by Elsevier Ltd.

  13. Security of modified Ping-Pong protocol in noisy and lossy channel

    OpenAIRE

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove ...

  14. A Generic Communication Protocol for Remote Laboratories: an Implementation on e-lab

    Energy Technology Data Exchange (ETDEWEB)

    Henriques, Rafael B.; Fernandes, H.; Duarte, Andre S.; Pereira, Tiago; Fortunato, Joao [Instituto de Plasmas e Fusao Nuclear, Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Pereira, Jose [Linkare TI - Tecnologias de Informacao Lda, Lisboa (Portugal); Dias, Francisco [Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal)

    2015-07-01

    The remote laboratories at IST (Instituto Superior Tecnico), e-lab, serve as a valuable tool for education and training based on remote control technologies. Due to the high number and increase of remotely operated experiments a generic protocol was developed to perform the communication between the software driver and the respective experimental setup in an easier and more unified way. The training in these fields of students and personnel can take advantage of such infrastructure with the purpose of deploying new experiments in a faster way. More than 10 experiments using the generic protocol are available on-line in a 24 x 7 way. (authors)

  15. Design and Implementation of a Secure Modbus Protocol

    Science.gov (United States)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  16. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  17. Development of the Lock Protocol for DEPSKY Storage System

    Directory of Open Access Journals (Sweden)

    NASCIMENTO, P. S.

    2015-06-01

    Full Text Available Data management in environments based on several clouds (cloud-of-clouds should be dependable and secure. DEPSKY may assure that characteristics through mechanisms as cryptography and data replication, however DEPSKY does not support concurrent writing, a desirable functionality for many applications. This paper presents the development and a performance analysis of a lock algorithmfor DEPSKY storage system. The paper also presents validation test and performance test of the algorithm. Such protocol allows concurrent writing, through a low contention lock mechanism that uses lock filesfi to dene who is allowed to write in a data unit.

  18. DEVELOPMENT AND APPLICATION OF PROTOCOLS FOR EVALUATION OF OIL SPILL BIOREMEDIATION (RESEARCH BRIEF)

    Science.gov (United States)

    Protocols were developed and evaluated to assess the efficacy and environmental safety of commercial oil spill bioremediation agents (CBAs). Test systems that simulate oil slicks on open water or oiled sandy beaches were used to test the effectiveness of CBAs. Gravimetric and gas...

  19. Doses from pediatric CT examinations in Norway: are pediatric scan protocols developed and in daily use?

    International Nuclear Information System (INIS)

    Friberg, Eva G.

    2008-01-01

    Doses to pediatric patients from CT examinations are known to be unnecessarily high if scan protocols developed for adult patients are adopted. This overexposure is most often not recognized by the operating radiographer, due to the digital behavior of the imaging system. Use of optimized size-specific pediatric scan protocols is therefore essential to keep the doses at an appropriate level. The aim of this study was to investigate the doses to pediatric patients from CT examinations and to evaluate the level of optimization of the scan protocols. Patient data, applied scan parameters together with the dose parameters volume computed tomography dose index (CTD vol ) and dose length product (DLP) for examinations of the head, chest and abdomen were collected by means of a questionnaire from five university hospitals. The effective dose was estimated from the total DLP by use of region-specific conversion coefficients (E DLP ). Totally 136, 108 and 82 questionnaires were received for examinations of the head, chest and abdomen, respectively. Large variations in patient doses between the hospitals were observed, addressing the need for optimization of the scan protocols in general. Most of the hospitals applied successive lower mAs with decreasing patient age for all scan areas, while the use of lower tube voltage for small patients and a higher tube voltage for large patients were more rarely. This indicates the presence, to a certain level, of size specific scan protocols at some Norwegian hospitals. Focus on developing size-specific scan protocols for pediatric patients are important to reduce the doses and risks associated with pediatric CT examinations. (author)

  20. [The intervention mapping protocol: A structured process to develop, implement and evaluate health promotion programs].

    Science.gov (United States)

    Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J

    2016-02-01

    Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.

  1. Security of modified Ping-Pong protocol in noisy and lossy channel.

    Science.gov (United States)

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  2. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  3. Biocoder: A programming language for standardizing and automating biology protocols.

    Science.gov (United States)

    Ananthanarayanan, Vaishnavi; Thies, William

    2010-11-08

    Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains.

  4. Recasting a traditional laboratory practical as a "Design-your-own protocol" to teach a universal research skill.

    Science.gov (United States)

    Whitworth, David E

    2016-07-08

    Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to develop generic practical skills. To provide an opportunity for students to develop the skills needed to create bespoke protocols for experimental benchwork, a traditional practical was repurposed. Students were given a list of available resources and an experimental goal, and directed to create a bench protocol to achieve the aim (measuring the iron in hemoglobin). In a series of teaching events students received feedback from staff, and peers prototyped the protocols, before protocols were finally implemented. Graduates highlighted this exercise as one of the most important of their degrees, primarily because of the clear relevance of the skills acquired to professional practice. The exercise exemplifies a range of pedagogic principles, but arguably its most important innovation is that it repurposed a pre-existing practical. This had the benefits of automatically providing scaffolding to direct the students' thought processes, while retaining the advantages of a "discovery learning" exercise, and allowing facile adoption of the approach across the sector. © 2016 by The International Union of Biochemistry and Molecular Biology, 44(4):377-380, 2016. © 2016 The International Union of Biochemistry and Molecular Biology.

  5. An Experimental Platform for Autonomous Bus Development

    Directory of Open Access Journals (Sweden)

    Héctor Montes

    2017-11-01

    Full Text Available Nowadays, with highly developed instrumentation, sensing and actuation technologies, it is possible to foresee an important advance in the field of autonomous and/or semi-autonomous transportation systems. Intelligent Transport Systems (ITS have been subjected to very active research for many years, and Bus Rapid Transit (BRT is one area of major interest. Among the most promising transport infrastructures, the articulated bus is an interesting, low cost, high occupancy capacity and friendly option. In this paper, an experimental platform for research on the automatic control of an articulated bus is presented. The aim of the platform is to allow full experimentation in real conditions for testing technological developments and control algorithms. The experimental platform consists of a mobile component (a commercial articulated bus fully instrumented and a ground test area composed of asphalt roads inside the Consejo Superior de Investigaciones Científicas (CSIC premises. This paper focuses also on the development of a human machine interface to ease progress in control system evaluation. Some experimental results are presented in order to show the potential of the proposed platform.

  6. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  7. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    DEFF Research Database (Denmark)

    Beran, David; Yudkin, John S; de Courten, Maximilian

    2006-01-01

    In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol...... for the gathering of other data through site visits, discussions, and document reviews....

  8. Kyoto Protocol: Debate on environment and development in the discussions on Climate Change

    International Nuclear Information System (INIS)

    Rodriguez S, Liliana

    2007-01-01

    The climatic behavior of the planet and its consequences has favored debates about the models of development of the countries responsible for the accelerated deterioration of the atmosphere and of the natural phenomena by these recurrent days. Nevertheless, countries as United States, after signing commitments as the Convention on Climatic Change, refuse to acquire the obligations of the Kyoto Protocol, from fear of undergoing deterioration in their economies. In this setting, where the nation responsible for the emission of approximately 36% of the turned out effect greenhouse gases result of the human action in the planet does not commit itself to adopt restrictive policies to make its models of production but friendly with the nature although these measures begin to be imposed to other nations as determining factors in the international commercial negotiations, seems to be that the adoption of the Kyoto Protocol for developing countries as Colombia is not absolutely beneficial

  9. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Halkes, G.P.; Langendoen, K.G.

    2010-01-01

    The evaluation ofMAC protocols forWireless Sensor Networks (WSNs) is often performed through simulation. These simulations necessarily abstract away from reality inmany ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover,

  10. Development of Network Protocol for the Integrated Safety System

    Energy Technology Data Exchange (ETDEWEB)

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M. [Hannam Univ., Daejeon (Korea, Republic of)

    2007-06-15

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants.

  11. Development of Network Protocol for the Integrated Safety System

    International Nuclear Information System (INIS)

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M.

    2007-06-01

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants

  12. Development of a product screening protocol to minimize marine environmental impacts of oil production chemicals used offshore

    International Nuclear Information System (INIS)

    Vik, E.A.; Berg, J.D.; Bakke, S.; Oefjord, G.D.; Reinhard, M.

    1992-01-01

    This paper presents the initial results of a research project initiated by Conoco Norway, Inc. (CNI) late in 1989. The objective of the project is to develop a screening protocol for determining the potential environmental impacts of five types of chemicals typically used in offshore oil and gas production operations in the North Sea. The protocol includes tests for determination of bioaccumulation potential, oil-water distribution factor, biodegradation potential, and toxicity. When fully developed, the protocol represents one possible approach to implementing the proposed PARCOM standard testing program. Only the results for the bioaccumulation potential and oil-water distribution factor are presented here. For determination of bioaccumulation potential, the High Performance Liquid Chromotography (HPLC) is recommended. The oil-water distribution factor can be determined by surrogate parameters as total organic carbon (TOC), UV-absorption or gas chromatography (GC). (Author)

  13. Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography

    International Nuclear Information System (INIS)

    Branciard, Cyril; Gisin, Nicolas; Scarani, Valerio

    2008-01-01

    The differential-phase-shift (DPS) and the coherent-one-way (COW) are among the most practical protocols for quantum cryptography, and are therefore the object of fast-paced experimental developments. The assessment of their security is also a challenge for theorists: the existing tools, that allow to prove security against the most general attacks, do not apply to these two protocols in any straightforward way. We present new upper bounds for their security in the limit of large distances (d∼>50 km with typical values in optical fibers) by considering a large class of collective attacks, namely those in which the adversary attaches ancillary quantum systems to each pulse or to each pair of pulses. We introduce also two modified versions of the COW protocol, which may prove more robust than the original one

  14. Protocol for fermionic positive-operator-valued measures

    Science.gov (United States)

    Arvidsson-Shukur, D. R. M.; Lepage, H. V.; Owen, E. T.; Ferrus, T.; Barnes, C. H. W.

    2017-11-01

    In this paper we present a protocol for the implementation of a positive-operator-valued measure (POVM) on massive fermionic qubits. We present methods for implementing nondispersive qubit transport, spin rotations, and spin polarizing beam-splitter operations. Our scheme attains linear opticslike control of the spatial extent of the qubits by considering ground-state electrons trapped in the minima of surface acoustic waves in semiconductor heterostructures. Furthermore, we numerically simulate a high-fidelity POVM that carries out Procrustean entanglement distillation in the framework of our scheme, using experimentally realistic potentials. Our protocol can be applied not only to pure ensembles with particle pairs of known identical entanglement, but also to realistic ensembles of particle pairs with a distribution of entanglement entropies. This paper provides an experimentally realizable design for future quantum technologies.

  15. Experimental plug and play quantum coin flipping

    Science.gov (United States)

    Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni

    2014-04-01

    Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.

  16. The Kyoto Protocol Emissions Trading Mechanisms - A Model for financing future nuclear development in Romania

    International Nuclear Information System (INIS)

    Purica, Ionut; John Saroudis

    2001-01-01

    At the beginning of 2001 Romania ratified the Kyoto Protocol (Law 3/2001) thus becoming the first European country to do so. The mechanisms of the Kyoto Protocol are now opening new ways to sponsor the financing of nuclear projects. In May 2001 Societatea Nationala Nuclearoelectrica S.S. (SNN) and Atomic Energy of Canada Limited and ANSALDO of Italy signed a contract to complete the second CANDU unit at Cernavoda thus giving a new momentum to the nuclear program in Romania. The Government of Romania has indicated its desire to proceed with the completion of the other units on the Cernavoda site and is open to explore every potential financing mechanism to make this a reality. Although the Kyoto Protocol was not ratified by those countries that have the greatest need to reduce emissions, a market for emissions trading has developed, Canada being one of the important players in this market. Since the emission reduction per dollar invested in the Romanian nuclear program would bring much more reduction than the marginal reduction per dollar invested in environmental protection programs in Canada, where the saturation effect is already taking place, we consider that the application of the Kyoto Protocol mechanisms represents a realistic source for a sustainable cooperation of the two countries. This trend is in line with the latest activities of the International Atomic Energy Agency (IAEA). This paper analyzes the impact that the use of emissions credits would have on a typical financing scheme for a future CANDU project in Romania given the present situation and also proposes a model for the structure of the emissions trade that would generate a source of funding for the project. The conclusion is that there is real potential in using Kyoto Protocol mechanisms for financing nuclear development with benefits for both Romania and Canada. (authors)

  17. Experimental Platform for Usability Testing of Secure Medical Sensor Network Protocols

    DEFF Research Database (Denmark)

    Andersen, Jacob; Lo, Benny P.; Yang, Guang-Zhong

    2008-01-01

    designed security mechanisms are essential. Several experimental sensor network platforms have emerged in recent years targeted for clinical use. However, few of them consider the importance of security issues such as privacy and access control, and how these can impact the usability of the platform, while......Implementing security mechanisms such as access control for clinical use is a challenging research issue in BSN due to its required heterogeneous operating responses ranging from chronic diseases management to emergency care. To ensure the clinical uptake of the BSN technology, appropriately...... others develop BSN security without considering how a prototype implementation would be received by clinicians in real-life situations. The purpose of this paper is to present our initial effort in building a flexible experimental platform for providing a basic infrastructure with symmetric AES...

  18. Nuclear power for greenhouse gas mitigation under the Kyoto protocol: The Clean Development Mechanism (CDM)

    International Nuclear Information System (INIS)

    Rogner, H.-H.

    2000-01-01

    At the 43rd regular session of the IAEA General Conference, Member States requested the IAEA to help countries in assessing nuclear power's role in light of global environmental challenges and energy needs. Such assistance should include support for implementing national case studies, and facilitating access to relevant information about nuclear power's role in achieving sustainable development in developing countries and in mitigating GHG emissions. The dissemination of information on CDM is of particular importance to developing countries, so as to enable Member States interested in the mechanism to take an active and informed role in the debate regarding the Kyoto Protocol and eligible CDM technologies. Therefore, the Secretariat organized a series of information seminars, workshops and training courses for Member States on the Kyoto Protocol, the Clean Development Mechanism, Joint Implementation and Emissions Trading with particular emphasis on the potential role of nuclear power for GHG mitigation. On request, the Secretariat also provided training and assistance to several Member States in the preparation of national case studies that explore the potential role of nuclear power as a CDM technology. These case studies will be presented by the respective national study teams during this side event at the 44th IAEA General Conference. Within the general criteria included in the Kyoto Protocol, the decision on which technologies are eligible for GHG mitigation under the flexibility mechanisms is a sovereign decision of each country

  19. Development of a waste management protocol based on assessment of knowledge and practice of healthcare personnel in surgical departments.

    Science.gov (United States)

    Mostafa, Gehan M A; Shazly, Mona M; Sherief, Wafaa I

    2009-01-01

    Good healthcare waste management in a hospital depends on a dedicated waste management team, good administration, careful planning, sound organization, underpinning legislation, adequate financing, and full participation by trained staff. Hence, waste management protocols must be convenient and sensible. To assess the knowledge and practice related to waste management among doctors, nurses, and housekeepers in the surgical departments at Al-Mansoura University Hospital, and to design and validate a waste management protocol for the health team in these settings. This cross-sectional study was carried out in the eight surgical departments at Al-Mansoura University Hospital. All health care personnel and their assistants were included: 38 doctors, 106 nurses, and 56 housekeepers. Two groups of jury were included for experts' opinions validation of the developed protocol, one from academia (30 members) and the other from service providers (30 members). Data were collected using a self-administered knowledge questionnaire for nurses and doctors, and an interview questionnaire for housekeepers. Observation checklists were used for assessment of performance. The researchers developed the first draft of the waste management protocol according to the results of the analysis of the data collected in the assessment phase. Then, the protocol was presented to the jury group for validation, and then was implemented. Only 27.4% of the nurses, 32.1% of the housekeepers, and 36.8% of the doctors had satisfactory knowledge. Concerning practice, 18.9% of the nurses, 7.1% of the housekeepers, and none of the doctors had adequate practice. Nurses' knowledge score had a statistically significant weak positive correlation with the attendance of training courses (r=0.23, pwaste management. The knowledge among nurses is positively affected by attendance of training programs. Based on the findings, a protocol for healthcare waste management was developed and validated. It is recommended to

  20. Effectiveness of a multicomponent school based intervention to reduce bullying among adolescents in Chandigarh, North India: A quasi-experimental study protocol

    Directory of Open Access Journals (Sweden)

    Monica Rana

    2018-04-01

    Full Text Available Background: Bullying perpetration and victimization is associated with significant academic, psychosocial and health related problems among adolescents. There is a need to develop effective interventions to prevent bullying among adolescents, especially in low and middle income countries. This paper presents the study protocol to develop, and evaluate the effect of multi-component school based prevention program for bullying in India. Design: Quasi-experimental study. Methods: The study will be conducted among 846 students of grade 7th and 8th in the intervention and control schools in Chandigarh, Union Territory, North India. A government and a private school will be selected purposively in each of the intervention and control arm. The intervention is based on socio-ecological model, and will be administered at individual, relationship (parents and teachers and school level. The primary study outcome will be the proportion of students experiencing any kind of bullying (bullying, victimization, or both, in each study arm. The effectiveness of the intervention will be measured by performing difference in difference analysis and generalized estimating equations. Expected impact for public health: Bullying is an aggressive behaviour with significant morbidities, including psychological or physical trauma, affecting individuals not only in their adolescence, but also later in their adulthood. This quasi-experimental study is expected to provide evidence on whether multi-component bullying prevention intervention program, can reduce the burden of bullying perpetration and victimization among school adolescents in India. The results of the study will add in the exiting literature on bullying intervention program, especially, from the low middle-income countries, as there are limited studies available on this topic in these countries.

  1. Canada and the Kyoto Protocol: Fact Sheet No. 5 - Developing countries

    International Nuclear Information System (INIS)

    2000-11-01

    This fact sheet acknowledges that global change affects developed and developing countries alike, and the fact that most developing countries do not have the human, financial and technical capacity to effectively address climate change issues without help from the industrialized nations. The fact sheet also puts Canada on record as being in agreement with the spirit of the Kyoto Protocol to encourage the participation of developing countries in global efforts to combat climate change and promote sustainable development and reaffirms Canada's willingness to provide financial and technical assistance to developing countries to enable them to play a meaningful part in this global effort. In this context, the fact sheet briefly describes the new Canada Climate Change Development Fund which has been set up to reduce the growth of GHG emissions and support carbon sink activities in developing countries, to strengthen the capacity of developing conuntries to reduce their vulnerability to adverse effects of climate change, and to participate in global efforts to combat them

  2. Protocols for the delivery of small molecules to the two-spotted spider mite, Tetranychus urticae.

    Directory of Open Access Journals (Sweden)

    Takeshi Suzuki

    Full Text Available The two-spotted spider mite, Tetranychus urticae, is a chelicerate herbivore with an extremely wide host range and an extraordinary ability to develop pesticide resistance. Due to its responsiveness to natural and synthetic xenobiotics, the spider mite is becoming a prime pest herbivore model for studies of the evolution of host range, plant-herbivore interactions and mechanisms of xenobiotic resistance. The spider mite genome has been sequenced and its transcriptional responses to developmental and various biotic and abiotic cues have been documented. However, to identify biological and evolutionary roles of T. urticae genes and proteins, it is necessary to develop methods for the efficient manipulation of mite gene function or protein activity. Here, we describe protocols developed for the delivery of small molecules into spider mites. Starting with mite maintenance and the preparation of the experimental mite populations of developmentally synchronized larvae and adults, we describe 3 methods for delivery of small molecules including artificial diet, leaf coating, and soaking. The presented results define critical steps in these methods and demonstrate that they can successfully deliver tracer dyes into mites. Described protocols provide guidelines for high-throughput setups for delivery of experimental compounds that could be used in reverse genetics platforms to modulate gene expression or protein activity, or for screens focused on discovery of new molecules for mite control. In addition, described protocols could be adapted for other Tetranychidae and related species of economic importance such as Varroa, dust and poultry mites.

  3. Maximizing potential impact of experimental research into cognitive processes in health psychology: A systematic approach to material development.

    Science.gov (United States)

    Hughes, Alicia M; Gordon, Rola; Chalder, Trudie; Hirsch, Colette R; Moss-Morris, Rona

    2016-11-01

    There is an abundance of research into cognitive processing biases in clinical psychology including the potential for applying cognitive bias modification techniques to assess the causal role of biases in maintaining anxiety and depression. Within the health psychology field, there is burgeoning interest in applying these experimental methods to assess potential cognitive biases in relation to physical health conditions and health-related behaviours. Experimental research in these areas could inform theoretical development by enabling measurement of implicit cognitive processes that may underlie unhelpful illness beliefs and help drive health-related behaviours. However, to date, there has been no systematic approach to adapting existing experimental paradigms for use within physical health research. Many studies fail to report how materials were developed for the population of interest or have used untested materials developed ad hoc. The lack of protocol for developing stimuli specificity has contributed to large heterogeneity in methodologies and findings. In this article, we emphasize the need for standardized methods for stimuli development and replication in experimental work, particularly as it extends beyond its original anxiety and depression scope to other physical conditions. We briefly describe the paradigms commonly used to assess cognitive biases in attention and interpretation and then describe the steps involved in comprehensive/robust stimuli development for attention and interpretation paradigms using illustrative examples from two conditions: chronic fatigue syndrome and breast cancer. This article highlights the value of preforming rigorous stimuli development and provides tools to aid researchers engage in this process. We believe this work is worthwhile to establish a body of high-quality and replicable experimental research within the health psychology literature. Statement of contribution What is already known on this subject? Cognitive

  4. Skill development in experimental courses

    Directory of Open Access Journals (Sweden)

    Héctor Bagán

    2015-09-01

    Full Text Available Experimental courses offer a good opportunity to work with competences, promoting the incorporation of strategies oriented towards motivating students to actively involve in the learning process, promoting reflexive learning and developing generic skills. This study presents different ways of developing and evaluating some important general skills, settle on four specific objectives: 1. To increase student motivation using samples of potential interest to students and explaining real-live application of their samples analyses; 2. To assist students’ self-regulation and learning autonomy by using the portfolio; 3. To promote group work through experiments in pairs and small-group discussions; 4. To develop communication skills through small-group discussions and oral presentations. Results show that the type of sample used and real-life application has important influence on motivation. The portfolio is a good tool to promote reflection and to evaluate both specific and generic skills in experimental courses, the dynamics of a laboratory course permit students to develop their group-work and communicative skills, and peer evaluations both improve students’ communication skills and promote metacognitive reflection. Finally, the project demonstrates that it is possible to train students in general skills using the specific course content and that the incorporation of participatory methodologies encourages students to become actively involved in the teaching-learning process.

  5. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  6. Eavesdropping on the two-way quantum communication protocols with invisible photons

    Energy Technology Data Exchange (ETDEWEB)

    Cai Qingyu [State Key Laboratory of Magnetics Resonance and Atomic and Molecular Physics, Wuhan Institution of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: qycai@wipm.ac.cn

    2006-02-20

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed00.

  7. Eavesdropping on the two-way quantum communication protocols with invisible photons

    International Nuclear Information System (INIS)

    Cai Qingyu

    2006-01-01

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed

  8. Using an intervention mapping approach to develop a discharge protocol for intensive care patients.

    Science.gov (United States)

    van Mol, Margo; Nijkamp, Marjan; Markham, Christine; Ista, Erwin

    2017-12-19

    Admission into an intensive care unit (ICU) may result in long-term physical, cognitive, and emotional consequences for patients and their relatives. The care of the critically ill patient does not end upon ICU discharge; therefore, integrated and ongoing care during and after transition to the follow-up ward is pivotal. This study described the development of an intervention that responds to this need. Intervention Mapping (IM), a six-step theory- and evidence-based approach, was used to guide intervention development. The first step, a problem analysis, comprised a literature review, six semi-structured telephone interviews with former ICU-patients and their relatives, and seven qualitative roundtable meetings for all eligible nurses (i.e., 135 specialized and 105 general ward nurses). Performance and change objectives were formulated in step two. In step three, theory-based methods and practical applications were selected and directed at the desired behaviors and the identified barriers. Step four designed a revised discharge protocol taking into account existing interventions. Adoption, implementation and evaluation of the new discharge protocol (IM steps five and six) are in progress and were not included in this study. Four former ICU patients and two relatives underlined the importance of the need for effective discharge information and supportive written material. They also reported a lack of knowledge regarding the consequences of ICU admission. 42 ICU and 19 general ward nurses identified benefits and barriers regarding discharge procedures using three vignettes framed by literature. Some discrepancies were found. For example, ICU nurses were skeptical about the impact of writing a lay summary despite extensive evidence of the known benefits for the patients. ICU nurses anticipated having insufficient skills, not knowing the patient well enough, and fearing legal consequences of their writings. The intervention was designed to target the knowledge

  9. Influence of enamel/dentin thickness on the toxic and esthetic effects of experimental in-office bleaching protocols.

    Science.gov (United States)

    de Oliveira Duque, C C; Soares, D G; Basso, F G; Hebling, J; de Souza Costa, C A

    2017-11-01

    This paper aims to assess the whitening effectiveness and toxicity of tooth-bleaching protocols applied to enamel/dentin disks simulating mandibular incisors (ICs) and premolars (PMs). A 10% hydrogen peroxide (H 2 O 2 ) gel was applied for 3 × 15, 1 × 15, or 1 × 5 min to enamel/dentin disks simulating mandibular ICs and PMs, and the trans-enamel and trans-dentinal diffusion products were applied to human dental pulp cells (1 h). Professional therapy (35% H 2 O 2 -3 × 15 min) was used as positive control, and non-bleached samples were used as negative control. Cell viability and morphology, oxidative stress generation, and odontoblastic marker expression were assessed. The H 2 O 2 diffusion and enamel color change (ΔE) were also analyzed. The 10% H 2 O 2 gel induced significant cell viability reduction only when applied 3 × 15 min, with the intensity of oxidative stress and down-regulation of odontoblastic markers being higher in the IC group. The other experimental bleaching protocols caused slight alterations regarding the cell parameters evaluated, with intensity being related to enamel/dentin thickness. These effects were also correlated with higher H 2 O 2 diffusion in the IC group. ΔE values similar as positive control were found for the 10% 3 × 15 and 1 × 15 protocols on IC group, after 4 and 6 sessions. Application of a 10% H 2 O 2 bleaching gel for 15 or 45 min to thin dental substrate significantly minimizes cell toxicity in comparison with highly concentrated gels associated with similar esthetic outcomes by increasing the number of bleaching sessions. Bleaching gels with 10% H 2 O 2 applied in small teeth for short periods may be an interesting alternative to obtain whitening effectiveness without causing toxicity to pulp cells, which may be able to reduce the tooth hypersensitivity claimed by patients.

  10. The development of human factors experimental evaluation techniques

    Energy Technology Data Exchange (ETDEWEB)

    Sim, Bong Shick; Oh, In Suk; Cha, Kyung Ho; Lee, Hyun Chul; Park, Geun Ok; Cheon, Se Woo; Suh, Sang Moon

    1997-07-01

    New human factors issues, such as evaluation of information navigation, the consideration of operator characteristics, and operator performance assessment, related to the HMI design based on VDUs are being risen. Thus, in order to solve these human factors issues, this project aims to establish the experimental technologies including the techniques for experimental design, experimental measurement, data collection and analysis, and to develop ITF (Integrated Test Facility) suitable for the experiment of HMI design evaluation. For the establish of the experimental data analysis and evaluation methodologies, we developed as the following: (1) a paradigm for human factors experimentation including experimental designs, procedures, and data analysis. (2) the methods for the assessment of operator`s mental workload (3) DAEXESS (data analysis and experiment evaluation supporting system). Also, we have established a experiment execution technologies through the preliminary experiments, such as the suitability evaluation of information display on a LSDP, the evaluation of information display on a LSDP, the evaluation of computerized operation procedure and an experiment of advanced alarm system (ADIOS). Finally, we developed the ITF including human machine simulator, telemetry system, an eye tracking system, an audio/video data measurement system, and three dimensional micro behaviour analysis system. (author). 81 refs., 68 tabs., 73 figs.

  11. Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link

    Science.gov (United States)

    Woo, Simon S.; Gao, Jay L.; Mills, David

    2010-01-01

    Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.

  12. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  13. Development of a protocol for sampling and analysis of ballast water in Jamaica

    Directory of Open Access Journals (Sweden)

    Achsah A Mitchell

    2014-09-01

    Full Text Available The transfer of ballast by the international shipping industry has negatively impacted the environment. To design such a protocol for the area, the ballast water tanks of seven bulk cargo vessels entering a Jamaican port were sampled between January 28, 2010 and August 17, 2010. Vessels originated from five ports and used three main routes, some of which conducted ballast water exchange. Twenty-six preserved and 22 live replicate zooplankton samples were obtained. Abundance and richness were higher than at temperate ports. Exchange did not alter the biotic composition but reduced the abundance. Two of the live sample replicates, containing 31.67 and 16.75 viable individuals m-3, were non-compliant with the International Convention for the Control and Management of Ships’ Ballast Water and Sediments. Approximately 12% of the species identified in the ballast water were present in the waters nearest the port in 1995 and 11% were present in the entire bay in 2005. The protocol designed from this study can be used to aid the establishment of a ballast water management system in the Caribbean or used as a foundation for the development of further protocols.

  14. Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis

    Directory of Open Access Journals (Sweden)

    Ali Ather

    2012-10-01

    Full Text Available Abstract Background Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. Methods The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists’ clinical judgment and maintaining consistency with a prior pilot study. Results The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. Conclusions The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Trial registration Clinicaltrials.gov NCT00970008 (18 August 2009

  15. Improving plant bioaccumulation science through consistent reporting of experimental data

    DEFF Research Database (Denmark)

    Fantke, Peter; Arnot, Jon A.; Doucette, William J.

    2016-01-01

    Experimental data and models for plant bioaccumulation of organic contaminants play a crucial role for assessing the potential human and ecological risks associated with chemical use. Plants are receptor organisms and direct or indirect vectors for chemical exposures to all other organisms. As new...... experimental data are generated they are used to improve our understanding of plant-chemical interactions that in turn allows for the development of better scientific knowledge and conceptual and predictive models. The interrelationship between experimental data and model development is an ongoing, never......-ending process needed to advance our ability to provide reliable quality information that can be used in various contexts including regulatory risk assessment. However, relatively few standard experimental protocols for generating plant bioaccumulation data are currently available and because of inconsistent...

  16. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists.

    Science.gov (United States)

    Russell, Rachel; Ormerod, Marcus; Newton, Rita

    2018-01-01

    Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people.

  17. Experimental methods in behavioral teratology

    Energy Technology Data Exchange (ETDEWEB)

    Zbinden, G.

    1981-09-01

    Efforts are made to develop toxicological techniques with which new behavioral teratogens can be recognized. The review describes the most important experimental methods which are presently explored, and which are based on a rich body of knowledge accumulated by experimental psychologists. Most of the tests were developed with small animals, mostly with rats. They range from the rather straightforward determination of various reflexes to complex behavioral situations involving mechanical devices, operant conditioning techniques and procedures evaluating social behavior. In applying these methods in routine toxicology, it is important to remember, that many behavioral effects determined in newborn and adult animals are subtle. Moreover, they are influenced by a large variety of environmental factors affecting the health and the behavior of the mothers and of the offspring in the early and later phases of development. Therefore, the experiments must be conducted under highly standardized conditions and must be controlled rigorously. It is concluded that the best experimental strategy for the evaluation of potential behavioral teratogens is not yet established. Therefore, it would be premature to decide on a fixed protocol to be included in routine animal safety experiments for drugs and other chemical substances.

  18. Experimental development of power reactor intelligent control

    International Nuclear Information System (INIS)

    Edwards, R.M.; Garcia, H.E.; Lee, K.Y.

    1992-01-01

    The US nuclear utility industry initiated an ambitious program to modernize the control systems at a minimum of ten existing nuclear power plants by the year 2000. That program addresses urgent needs to replace obsolete instrumentation and analog controls with highly reliable state-of-the-art computer-based digital systems. Large increases in functionality that could theoretically be achieved in a distributed digital control system are not an initial priority in the industry program but could be logically considered in later phases. This paper discusses the initial development of an experimental sequence for developing, testing, and verifying intelligent fault-accommodating control for commercial nuclear power plant application. The sequence includes an ultra-safe university research reactor (TRIGA) and a passively safe experimental power plant (Experimental Breeder Reactor 2)

  19. Literature overview highlights lack of paediatric donation protocols but identifies common themes that could guide their development.

    Science.gov (United States)

    Vileito, A; Siebelink, M J; Verhagen, Aae

    2018-05-01

    Paediatric donation is a unique and extremely sensitive process that requires specific knowledge and competencies. Most countries use protocols for organ and tissue donation to ensure optimal care for the donor and family, but these mainly focus on adults. However, the donation process for children differs from adults in many ways. An overview of the literature was performed to identify protocols for the paediatric population. PubMed, Web of Science, EMBASE and the Internet were searched up to March 2016 for papers or other sources in English related to specific organ and tissue donation protocols for children and neonates. This comprised title, abstract and then full-text screening of relevant data. We included 12 papers and two electronic sources that were mainly from North America and Europe. Most discussed donations after cardiac death. The recurring themes included identifying potential donors, approaching parents, palliative care and collaboration with organ procurement organisations. Most papers called for paediatric donation policies to be standardised. Scientific publications in English on paediatric donation protocols are very scarce. No comprehensive paediatric donation protocol was found. We identified several recurring themes in the literature that could be used to develop such protocols. ©2018 The Authors. Acta Paediatrica published by John Wiley & Sons Ltd on behalf of Foundation Acta Paediatrica.

  20. Development of a new Emergency Medicine Spinal Immobilization Protocol for trauma patients and a test of applicability by German emergency care providers.

    Science.gov (United States)

    Kreinest, Michael; Gliwitzky, Bernhard; Schüler, Svenja; Grützner, Paul A; Münzberg, Matthias

    2016-05-14

    In order to match the challenges of quickly recognizing and treating any life-threatening injuries, the ABCDE principles were established for the assessment and treatment of trauma patients. The high priority of spine protection is emphasized by the fact that immobilization of the cervical spine is performed at the very first step in the ABCDE principles. Immobilization is typically performed to prevent or minimize secondary damage to the spinal cord if instability of the spinal column is suspected. Due to increasing reports about disadvantages of spinal immobilization, the indications for performing spinal immobilization must be refined. The aim of this study was (i) to develop a protocol that supports decision-making for spinal immobilization in adult trauma patients and (ii) to carry out the first applicability test by emergency medical personnel. A structured literature search considering the literature from 1980 to 2014 was performed. Based on this literature and on the current guidelines, a new protocol that supports on scene decision-making for spinal immobilization has been developed. Parameters found in the literature concerning mechanisms and factors increasing the likelihood of spinal injury have been included in the new protocol. In order to test the applicability of the new protocol two surveys were performed on German emergency care providers by means of a questionnaire focused on correct decision-making if applying the protocol. Based on the current literature and guidelines, the Emergency Medicine Spinal Immobilization Protocol (E.M.S. IMMO Protocol) for adult trauma patients was developed. Following a fist applicability test involving 21 participants, the first version of the E.M.S. IMMO Protocol has to be graphically re-organized. A second applicability test comprised 50 participants with the current version of the protocol confirmed good applicability. Questions regarding immobilization of trauma patients could be answered properly using the E

  1. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  2. Development of a new CARD-FISH protocol for quantification of Legionella pneumophila and its application in two hospital cooling towers.

    Science.gov (United States)

    Kirschner, A K T; Rameder, A; Schrammel, B; Indra, A; Farnleitner, A H; Sommer, R

    2012-06-01

    Open cooling towers are frequent sources of infections with Legionella pneumophila. The gold standard for the detection of Leg. pneumophila is based on cultivation lasting up to 10 days and detecting only culturable cells. Alternative fluorescence in situ hybridization (FISH) protocols have been proposed, but they result in faint fluorescence signals and lack specificity because of cross-hybridization with other Legionella species. Our aim was thus to develop a new FISH protocol for rapid and specific detection of Leg. pneumophila in water samples. A novel catalysed reporter deposition FISH (CARD-FISH) protocol for the detection of Leg. pneumophila was developed, which significantly enhanced signal intensity as well as specificity of the probe through the use of a novel competitor probe. The developed protocol was compared with the culture method for monitoring the seasonal development of culturable and nonculturable Leg. pneumophila in two hospital cooling tower systems. Seasonal fluctuations of Leg. pneumophila concentrations detected via CARD-FISH were related to the development of the total bacterial community in both cooling towers, with temperature and biocide as the main factors controlling this development. Our results clearly showed that the majority of the Leg. pneumophila cells were in a nonculturable state. Thus, detection of Leg. pneumophila with culture methods may underestimate the total numbers of Leg. pneumophila present. Rapid, sensitive and specific detection and quantification of Leg. pneumophila in water systems is prerequisite for reliable risk estimation. The new protocol significantly improves current methodology and can be used to monitor and screen for Leg. pneumophila concentrations in cooling towers or other water systems. © 2012 The Authors. Journal of Applied Microbiology © 2012 The Society for Applied Microbiology.

  3. Developing of the protocol for electron beam food irradiation facility

    International Nuclear Information System (INIS)

    Petreska, Svetlana

    2012-01-01

    By establishing the needs for institution of new technologies in the process of food processing, in this case a randomized choice of electron beam accelerator facility, arises the need for designing a protocol for safe and secure performance of the facility. The protocol encompasses safety and security measures for protection from ionizing radiation of the individuals who work at the facility, as well as, the population and the environment in the immediate neighborhood of the facility. Thus, the adopted approach is the establishment of appropriate systems responding to the protocol. Dosimetry system, which includes appropriate procedures for accurate measure and recording of the absorbed dose values, according to the provisions for protection from ionizing radiation. Ionizing radiation protection system and providing the safety and security of the facility for food processing by means of ionizing radiation. System for providing quality and safety control of the facility for food processing by means of ionizing radiation. Pursuant to the designed a protocol for safe and secure performance of the facility for electron beam food processing, contributes to protection against ionizing radiation as occupationally exposed persons as well the population. (Author)

  4. A Mechanically Proved and an Incremental Development of the Session Initiation Protocol INVITE Transaction

    Directory of Open Access Journals (Sweden)

    Rajaa Filali

    2014-01-01

    Full Text Available The Session Initiation Protocol (SIP is an application layer signaling protocol used to create, manage, and terminate sessions in an IP based network. SIP is considered as a transactional protocol. There are two main SIP transactions, the INVITE transaction and the non-INVITE transaction. The SIP INVITE transaction specification is described in an informal way in Request for Comments (RFC 3261 and modified in RFC 6026. In this paper we focus on the INVITE transaction of SIP, over reliable and unreliable transport mediums, which is used to initiate a session. In order to ensure the correctness of SIP, the INVITE transaction is modeled and verified using event-B method and its Rodin platform. The Event-B refinement concept allows an incremental development by defining the studied system at different levels of abstraction, and Rodin discharges almost all proof obligations at each level. This interaction between modeling and proving reduces the complexity and helps in assuring that the INVITE transaction SIP specification is correct, unambiguous, and easy to understand.

  5. Development of low-dose protocols for thin-section CT assessment of cystic fibrosis in pediatric patients.

    LENUS (Irish Health Repository)

    O'Connor, Owen J

    2010-12-01

    To develop low-dose thin-section computed tomographic (CT) protocols for assessment of cystic fibrosis (CF) in pediatric patients and determine the clinical usefulness thereof compared with chest radiography.

  6. Development of an experimental activity for teaching cooperativity and allosterism

    Directory of Open Access Journals (Sweden)

    B. Manta

    2006-07-01

    Full Text Available Although  enzyme  control  and  regulation  is  an  important  topic  in  most  Biochemistry  and  Enzymology  courses, laboratory  activities  that  allow  an  experimental  approach  to  cooperativity  and  allosterism  are  difficult  to  implement. The objective of this work was to develop a simple and inexpensive experimental activity to teach this topic in basic courses.  We  decided  to  use  the  enzyme  glucosamine-6-phosphate  deaminase  (GNPD,  E.C.  3.5.99.6  from Escherichia coli,  that  is  both  kinetically  and  structurally  well-known.  GNPD  is  an  allosteric  enzyme,  activated  by  N-acetylglucosamine 6-phosphate, that catalyzes the conversion of glucosamine 6-phosphate into fructose 6-phosphate and  ammonia.  The  enzyme  is  a  typical  allosteric  K-system  and  can  be  well  described  by  the  Monod-Wyman-Changeux  (MWC  model.  GNPD  was  partially  purified  through  anionic-exchange  chromatography  from  a  mutant E.coli strain  which  expresses  constitutively  high  levels  of the  enzyme.  In  order  to  measure  activity  we  used  an end point  method  which  consists  in  stopping  the  reaction  at  a  certain  time  point  with  HCl  10  N,  and  quantifying  the fructose-6-phosphate  formed  with  resorcinol  (Selliwanoff  reaction  through  the  formation  of  a  red  color  that  is measured  spectrophotometrically.  We  developed  a  protocol  that  consisted  in  a  4-hour  experiment  in  which  the students  measured  the  activity  of  the  GNPD  with  increasing  concentrations  of  the  substrate,  in  the  presence  or absence  of  allosteric  modulator.  The  students  obtained  a  good  quality  data  set  that  they  analyzed  based  on  the equations  of  Hill,  MWC  and  Acerenza-Mirzaji

  7. Effect of different BNCT protocols on DNA synthesis in precancerous and normal tissues in an experimental model of oral cancer

    International Nuclear Information System (INIS)

    Heber, Elisa M.; Aromando, Romina; Trivillin, Veronica A.; Itoiz, Maria E.; Kreimann, Erica L.; Schwint, Amanda E.; Nigg, David W.

    2006-01-01

    We previously reported the therapeutic success of different BNCT protocols in the treatment of oral cancer, employing the hamster cheek pouch model. The aim of the present study was to evaluate the effect of these BNCT protocols on DNA synthesis in precancerous and normal tissue in this model and assess the potential lag in the development of second primary tumors in precancerous tissue. The data are relevant to potential control of field cancerized tissue and tolerance of normal tissue. We evaluated DNA synthesis in precancerous and normal pouch tissue 1-30 days post-BNCT mediated by BPA, GB-10 or BPA + GB-10 employing incorporation of bromo-deoxyuridine as an end-point. The BNCT-induced potential lag in the development of second primary tumors in precancerous tissue was monitored. A drastic, statistically significant reduction in DNA synthesis occurred in pacancerous tissue as early as 1 day post-BNCT and was sustained at virtually all time points until 30 days post-BNCT for all protocols. The histological categories evaluated individually within precancerous tissue (dysplasia, hyperplasia and NUMF [no unusual microscopic features]) responded similarly. DNA synthesis in normal tissue treated with BNCT oscillated around the very low pre-treatment values. A BNCT-induced lag in the development of second primary tumors was observed. BNCT induced a drastic fall in DNA synthesis in precancerous tissue that would be associated to the observed lag in the development of second primary tumors. The minimum variations in DNA synthesis in BNCT-treated normal tissue would correlate with the absence of normal tissue radiotoxicity. The present data would contribute to optimize therapeutic efficacy in the treatment of field-cancerized areas. (author)

  8. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  9. Dental-CT: image quality and absorbed radiation dose of different scan protocols

    International Nuclear Information System (INIS)

    Schorn, C.; Alamo, L.; Funke, M.; Grabbe, E.; Visser, H.; Hermann, K.P.

    1999-01-01

    Purpose: To develop a scan protocol for dental-CT which guarantees good image quality at the lowest possible radiation dose. Methods: In an experimental investigation Dental-CT (HSA, GE, Milwaukee, USA) of the mandible of two human skeletons positioned in a water tank were performed in order to define the most advantageous scan protocol. Tube currents ranged from 40 to 200 mA and the scan technique was modified (axial mode or helical mode with pitches of 1 to 3 and corresponding increments of 0.4 to 1.0 mm). 39 patients underwent a dental-CT with decreased current (80 mA) in the helical scan mode (pitch 2, slice thickness 1 mm). Dose measurements were performed for two different scan protocols (A: axial, 130 mAs, B: helical, 80 mA, pitch 2). Results: The preliminary investigations of image quality showed only a minor effect of the applied current. For the helical scan mode, pitches of more than 2 impaired image quality. A low increment had no advantages. There were no disadvantages in clinical practice using protocol B with decreased tube current. Absorbed radiation dose of dental CT performed with protocol B was decreased to one third in comparison to protocol A. Conclusions: A scan protocol with a low tube current (e.g., 80 mA, for a rotation time of 1 s) and a helical scan mode (e.g., for a slice thickness of 1 mm with a pitch of 2 and an increment of 1 mm) is recommended for performing dental-CT. (orig.) [de

  10. Nasa's International Space Station: A Testbed for Planetary Protection Protocol Development

    Science.gov (United States)

    Bell, M. S.; Rucker, M.; Love, S.; Johnson, J.; Chambliss, J.; Pierson, D.; Ott, M.; Mary, N.; Glass, B.; Lupisella, M.; hide

    2015-01-01

    Wherever humans go, they inevitably carry along the critters that live in and on them. Conventional wisdom has long held that it is unlikely those critters could survive the space environment, but in 2007 some microscopic aquatic animals called Tardigrades survived exposure to space and in 2008 Cyanobacteria lived for 548 days outside the ISS. Unlike the Mars rovers that were cleaned once and sent on their way, crew members will provide a constantly regenerating contaminant source. Are we prepared to certify that we can meet forward contamination protocols as we search for life at new destinations? What about the organisms we might reasonably expect a crewed spacecraft to leak or vent? Do we even know what they are? How long might our tiny hitch-hikers survive in close proximity to a warm spacecraft that periodically leaks/vents water or oxygen and how might they mutate with long-duration exposure? How will these contaminants migrate from their source in conditions encountered in space or on other planetary surfaces? This project aims to answer some of these questions by bringing together key stakeholder communities to develop a human forward contamination test, analysis, and integration plan. A system engineering approach to identify the experiments, analysis, and modeling needed to develop the contamination control protocols required will be used as a roadmap to integrate the many different parts of this problem - from launch to landing, living, and working on another planetary surface.

  11. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  12. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists

    Directory of Open Access Journals (Sweden)

    Rachel Russell

    2018-01-01

    Full Text Available Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people.

  13. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass.

    Science.gov (United States)

    Paris, Michael T; Lafleur, Benoit; Dubin, Joel A; Mourtzakis, Marina

    2017-10-01

    Ultrasound is a non-invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four-site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole-body reference methods. Our primary objectives were to (i) compare the four-site protocol's ability to predict appendicular lean tissue mass from dual-energy X-ray absorptiometry; (ii) optimize the predictability of the four-site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. This observational cross-sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole-body dual-energy X-ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine-site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four-site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. The four-site protocol was strongly associated (R 2  = 0.72) with appendicular lean tissue mass, but Bland-Altman analysis displayed wide limits of agreement (-5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four-site protocol, improved the association (R 2  = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (-3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). The four-site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass

  14. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  15. Towards an Experimental Protocol for the Study of Induction Heating in Asphalt Mastics

    NARCIS (Netherlands)

    Apostolidis, P.; Liu, X.; Scarpas, Athanasios; van Bochove, G; van de Ven, M.F.C.

    2016-01-01

    The development of asphalt mixtures with improved electrical and thermal properties is crucial in terms of producing suitable mixtures for the induction heating without losing their durability. The main scope of this research is to evaluate experimentally the impact of filler-sized electrically

  16. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  17. Application of Protocol-Oriented MVVM Architecture in iOS Development

    OpenAIRE

    Luong Nguyen, Khoi Nguyen

    2017-01-01

    The mobile application industry is fast paced. Requirements change, additions of new features occur on a daily basis and demand frequent code structure adjustment. Thus, a flexible and maintainable software architecture is often a key factor for an application’s success. The major objective of this thesis is to propose a practical use case of Protocol Oriented Model View View Model, an architecture inspired by the Protocol Oriented Programming paradigm. This thesis explains the architectur...

  18. Development of DOE complexwide authorized release protocols for radioactive scrap metals

    International Nuclear Information System (INIS)

    Chen, S. Y.

    1998-01-01

    Within the next few decades, several hundred thousand tons of metal are expected to be removed from nuclear facilities across the U.S. Department of Energy (DOE) complex as a result of decontamination and decommissioning (D and D) activities. These materials, together with large quantities of tools, equipment, and other items that are commonly recovered from site cleanup or D and D activities, constitute non-real properties that warrant consideration for reuse or recycle, as permitted and practiced under the current DOE policy. The provisions for supporting this policy are contained in the Draft Handbook for Controlling Release for Reuse or Recycle of Property Containing Residual Radioactive Material published by DOE in 1997 and distributed to DOE field offices for interim use and implementation. The authorized release of such property is intended to permit its beneficial use across the entire DOE complex. The objective of this study is to develop readily usable computer-based release protocols to facilitate implementation of the Handbook in evaluating the scrap metals for reuse and recycle. The protocols provide DOE with an effective oversight tool for managing release activities

  19. Quantum driving protocols for a two-level system: From generalized Landau-Zener sweeps to transitionless control

    DEFF Research Database (Denmark)

    Malossi, Nicola; Bason, Mark George; Viteau, Matthieu

    2013-01-01

    We present experimental results on the preparation of a desired quantum state in a two-level system with the maximum possible fidelity using driving protocols ranging from generalizations of the linear Landau-Zener protocol to transitionless driving protocols that ensure perfect following of the ...

  20. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  1. Blind quantum computation protocol in which Alice only makes measurements

    Science.gov (United States)

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-05-01

    Blind quantum computation is a new secure quantum computing protocol which enables Alice (who does not have sufficient quantum technology) to delegate her quantum computation to Bob (who has a full-fledged quantum computer) in such a way that Bob cannot learn anything about Alice's input, output, and algorithm. In previous protocols, Alice needs to have a device which generates quantum states, such as single-photon states. Here we propose another type of blind computing protocol where Alice does only measurements, such as the polarization measurements with a threshold detector. In several experimental setups, such as optical systems, the measurement of a state is much easier than the generation of a single-qubit state. Therefore our protocols ease Alice's burden. Furthermore, the security of our protocol is based on the no-signaling principle, which is more fundamental than quantum physics. Finally, our protocols are device independent in the sense that Alice does not need to trust her measurement device in order to guarantee the security.

  2. Why standard brain-computer interface (BCI) training protocols should be changed: an experimental study

    Science.gov (United States)

    Jeunet, Camille; Jahanpour, Emilie; Lotte, Fabien

    2016-06-01

    Objective. While promising, electroencephaloraphy based brain-computer interfaces (BCIs) are barely used due to their lack of reliability: 15% to 30% of users are unable to control a BCI. Standard training protocols may be partly responsible as they do not satisfy recommendations from psychology. Our main objective was to determine in practice to what extent standard training protocols impact users’ motor imagery based BCI (MI-BCI) control performance. Approach. We performed two experiments. The first consisted in evaluating the efficiency of a standard BCI training protocol for the acquisition of non-BCI related skills in a BCI-free context, which enabled us to rule out the possible impact of BCIs on the training outcome. Thus, participants (N = 54) were asked to perform simple motor tasks. The second experiment was aimed at measuring the correlations between motor tasks and MI-BCI performance. The ten best and ten worst performers of the first study were recruited for an MI-BCI experiment during which they had to learn to perform two MI tasks. We also assessed users’ spatial ability and pre-training μ rhythm amplitude, as both have been related to MI-BCI performance in the literature. Main results. Around 17% of the participants were unable to learn to perform the motor tasks, which is close to the BCI illiteracy rate. This suggests that standard training protocols are suboptimal for skill teaching. No correlation was found between motor tasks and MI-BCI performance. However, spatial ability played an important role in MI-BCI performance. In addition, once the spatial ability covariable had been controlled for, using an ANCOVA, it appeared that participants who faced difficulty during the first experiment improved during the second while the others did not. Significance. These studies suggest that (1) standard MI-BCI training protocols are suboptimal for skill teaching, (2) spatial ability is confirmed as impacting on MI-BCI performance, and (3) when faced

  3. Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Claudio S. Malavenda

    2012-01-01

    Full Text Available This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. The paper is organized as follows: first we give an overview on delay-tolerant wireless sensor networking (DTN; then we perform a simulation-based comparative analysis of state-of-the-art DTN approaches and illustrate the improvement offered by the proposed protocol; finally we present experimental data gathered from the implementation of the proposed protocol on a proprietary hardware node.

  4. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  5. Development of a comprehensive performance-testing protocol for competitive surfers.

    Science.gov (United States)

    Sheppard, Jeremy M; Nimphius, Sophia; Haff, Greg G; Tran, Tai T; Spiteri, Tania; Brooks, Hedda; Slater, Gary; Newton, Robert U

    2013-09-01

    Appropriate and valid testing protocols for evaluating the physical performances of surfing athletes are not well refined. The purpose of this project was to develop, refine, and evaluate a testing protocol for use with elite surfers, including measures of anthropometry, strength and power, and endurance. After pilot testing and consultation with athletes, coaches, and sport scientists, a specific suite of tests was developed. Forty-four competitive junior surfers (16.2 ± 1.3 y, 166.3 ± 7.3 cm, 57.9 ± 8.5 kg) participated in this study involving a within-day repeated-measures analysis, using an elite junior group of 22 international competitors (EJG), to establish reliability of the measures. To reflect validity of the testing measures, a comparison of performance results was then undertaken between the EJG and an age-matched competitive junior group of 22 nationally competitive surfers (CJG). Percent typical error of measurement (%TEM) for primary variables gained from the assessments ranged from 1.1% to 3.0%, with intraclass correlation coefficients ranging from .96 to .99. One-way analysis of variance revealed that the EJG had lower skinfolds (P = .005, d = 0.9) than the CJG, despite no difference in stature (P = .102) or body mass (P = .827). The EJG were faster in 15-m sprint-paddle velocity (P < .001, d = 1.3) and had higher lower-body isometric peak force (P = .04, d = 0.7) and superior endurance-paddling velocity (P = .008, d = 0.9). The relatively low %TEM of these tests in this population allows for high sensitivity to detect change. The results of this study suggest that competitively superior junior surfers are leaner and possess superior strength, paddling power, and paddling endurance.

  6. The experimental and technological developments reactor

    International Nuclear Information System (INIS)

    Carbonnier, J.L.

    2003-01-01

    THis presentation concerns the REDT, gas coolant reactor for experimental and technological developments. The specifications and the research programs concerning this reactor are detailed;: materials, safety aspects, core physic, the corresponding fuel cycle, the reactor cycle and the program management. (A.L.B.)

  7. A protocol for developing a clinical practice guideline for intra-articular injection for treating knee osteoarthritis

    Directory of Open Access Journals (Sweden)

    Dan Xing

    2018-01-01

    Ethics and dissemination: The protocol will provide us a roadmap to systematically develop evidence-based CPG for intra-articular injection for knee OA. The work will be disseminated electronically and in print. The guideline would be the first CPG that is developed primarily by orthopedic specialists in China and strictly based on systematic methodology.

  8. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  9. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  10. Development of the protocol for purification of artemisinin based on combination of commercial and computationally designed adsorbents.

    Science.gov (United States)

    Piletska, Elena V; Karim, Kal; Cutler, Malcolm; Piletsky, Sergey A

    2013-01-01

    A polymeric adsorbent for extraction of the antimalarial drug artemisinin from Artemisia annua L. was computationally designed. This polymer demonstrated a high capacity for artemisinin (120 mg g(-1) ), quantitative recovery (87%) and was found to be an effective material for purification of artemisinin from complex plant matrix. The artemisinin quantification was conducted using an optimised HPLC-MS protocol, which was characterised by high precision and linearity in the concentration range between 0.05 and 2 μg mL(-1) . Optimisation of the purification protocol also involved screening of commercial adsorbents for the removal of waxes and other interfering natural compounds, which inhibit the crystallisation of artemisinin. As a result of a two step-purification protocol crystals of artemisinin were obtained, and artemisinin purity was evaluated as 75%. By performing the second stage of purification twice, the purity of artemisinin can be further improved to 99%. The developed protocol produced high-purity artemisinin using only a few purification steps that makes it suitable for large scale industrial manufacturing process. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  12. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  13. Boron neutron capture therapy (BNCT) inhibits tumor development from precancerous tissue: An experimental study that supports a potential new application of BNCT

    International Nuclear Information System (INIS)

    Monti Hughes, A.; Heber, E.M.; Pozzi, E.; Nigg, D.W.; Calzetta, O.; Blaumann, H.; Longhino, J.; Nievas, S.I.; Aromando, R.F.; Itoiz, M.E.; Trivillin, V.A.; Schwint, A.E.

    2009-01-01

    We previously demonstrated the efficacy of boron neutron capture therapy (BNCT) mediated by boronophenylalanine (BPA), GB-10 (Na 2 10 B 10 H 10 ) and (GB-10+BPA) to control tumors, with no normal tissue radiotoxicity, in the hamster cheek pouch oral cancer model. Herein we developed a novel experimental model of field-cancerization and precancerous lesions (globally termed herein precancerous tissue) in the hamster cheek pouch to explore the long-term potential inhibitory effect of the same BNCT protocols on the development of second primary tumors from precancerous tissue. Clinically, second primary tumor recurrences occur in field-cancerized tissue, causing therapeutic failure. We performed boron biodistribution studies followed by in vivo BNCT studies, with 8 months follow-up. All 3 BNCT protocols induced a statistically significant reduction in tumor development from precancerous tissue, reaching a maximum inhibition of 77-100%. The inhibitory effect of BPA-BNCT and (GB-10+BPA)-BNCT persisted at 51% at the end of follow-up (8 months), whereas for GB-10-BNCT it faded after 2 months. Likewise, beam-only elicited a significant but transient reduction in tumor development. No normal tissue radiotoxicity was observed. At 8 months post-treatment with BPA-BNCT or (GB-10+BPA)-BNCT, the precancerous pouches that did not develop tumors had regained the macroscopic and histological appearance of normal (non-cancerized) pouches. A potential new clinical application of BNCT would lie in its capacity to inhibit local regional recurrences.

  14. Boron neutron capture therapy (BNCT) inhibits tumor development from precancerous tissue: An experimental study that supports a potential new application of BNCT

    Energy Technology Data Exchange (ETDEWEB)

    Monti Hughes, A.; Heber, E.M. [Department of Radiobiology, National Atomic Energy Commission (CNEA), Buenos Aires (Argentina); Pozzi, E. [Department of Radiobiology, National Atomic Energy Commission (CNEA), Buenos Aires (Argentina); Department of Research and Production Reactors, Ezeiza Atomic Center, CNEA, Buenos Aires (Argentina); Nigg, D.W. [Idaho National Laboratory, Idaho Falls, Idaho (United States); Calzetta, O.; Blaumann, H.; Longhino, J. [Department of Nuclear Engineering, Bariloche Atomic Center, CNEA, Rio Negro (Argentina); Nievas, S.I. [Department of Chemistry, CNEA, Buenos Aires (Argentina); Aromando, R.F. [Department of Oral Pathology, Faculty of Dentistry, University of Buenos Aires, Buenos Aires (Argentina); Itoiz, M.E. [Department of Radiobiology, National Atomic Energy Commission (CNEA), Buenos Aires (Argentina); Department of Oral Pathology, Faculty of Dentistry, University of Buenos Aires, Buenos Aires (Argentina); Trivillin, V.A. [Department of Radiobiology, National Atomic Energy Commission (CNEA), Buenos Aires (Argentina); Schwint, A.E. [Department of Radiobiology, National Atomic Energy Commission (CNEA), Buenos Aires (Argentina)], E-mail: schwint@cnea.gov.ar

    2009-07-15

    We previously demonstrated the efficacy of boron neutron capture therapy (BNCT) mediated by boronophenylalanine (BPA), GB-10 (Na{sub 2}{sup 10}B{sub 10}H{sub 10}) and (GB-10+BPA) to control tumors, with no normal tissue radiotoxicity, in the hamster cheek pouch oral cancer model. Herein we developed a novel experimental model of field-cancerization and precancerous lesions (globally termed herein precancerous tissue) in the hamster cheek pouch to explore the long-term potential inhibitory effect of the same BNCT protocols on the development of second primary tumors from precancerous tissue. Clinically, second primary tumor recurrences occur in field-cancerized tissue, causing therapeutic failure. We performed boron biodistribution studies followed by in vivo BNCT studies, with 8 months follow-up. All 3 BNCT protocols induced a statistically significant reduction in tumor development from precancerous tissue, reaching a maximum inhibition of 77-100%. The inhibitory effect of BPA-BNCT and (GB-10+BPA)-BNCT persisted at 51% at the end of follow-up (8 months), whereas for GB-10-BNCT it faded after 2 months. Likewise, beam-only elicited a significant but transient reduction in tumor development. No normal tissue radiotoxicity was observed. At 8 months post-treatment with BPA-BNCT or (GB-10+BPA)-BNCT, the precancerous pouches that did not develop tumors had regained the macroscopic and histological appearance of normal (non-cancerized) pouches. A potential new clinical application of BNCT would lie in its capacity to inhibit local regional recurrences.

  15. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  16. Development of a Ground Test and Analysis Protocol for NASA's NextSTEP Phase 2 Habitation Concepts

    Science.gov (United States)

    Gernhardt, Michael L.; Beaton, Kara H.; Chappell, Steven P.; Bekdash, Omar S.; Abercromby, Andrew F. J.

    2018-01-01

    The NASA Next Space Technologies for Exploration Partnerships (NextSTEP) program is a public-private partnership model that seeks commercial development of deep space exploration capabilities to support human spaceflight missions around and beyond cislunar space. NASA first issued the Phase 1 NextSTEP Broad Agency Announcement to U.S. industries in 2014, which called for innovative cislunar habitation concepts that leveraged commercialization plans for low-Earth orbit. These habitats will be part of the Deep Space Gateway (DSG), the cislunar space station planned by NASA for construction in the 2020s. In 2016, Phase 2 of the NextSTEP program selected five commercial partners to develop ground prototypes. A team of NASA research engineers and subject matter experts (SMEs) have been tasked with developing the ground-test protocol that will serve as the primary means by which these Phase 2 prototypes will be evaluated. Since 2008, this core test team has successfully conducted multiple spaceflight analog mission evaluations utilizing a consistent set of operational tools, methods, and metrics to enable the iterative development, testing, analysis, and validation of evolving exploration architectures, operations concepts, and vehicle designs. The purpose of implementing a similar evaluation process for the Phase 2 Habitation Concepts is to consistently evaluate different commercial partner ground prototypes to provide data-driven, actionable recommendations for Phase 3. This paper describes the process by which the ground test protocol was developed and the objectives, methods, and metrics by which the NextSTEP Phase 2 Habitation Concepts will be rigorously and systematically evaluated. The protocol has been developed using both a top-down and bottom-up approach. Top-down development began with the Human Exploration and Operations Mission Directorate (HEOMD) exploration objectives and ISS Exploration Capability Study Team (IECST) candidate flight objectives. Strategic

  17. Establishment of experimental equipments in irradiation technology development building

    International Nuclear Information System (INIS)

    Ishida, Takuya; Tanimoto, Masataka; Shibata, Akira; Kitagishi, Shigeru; Saito, Takashi; Ohmi, Masao; Nakamura, Jinichi; Tsuchiya, Kunihiko

    2011-06-01

    The Neutron Irradiation and Testing Reactor Center has developed new irradiation technologies to provide irradiation data with high technical value for the resume of the Japan Materials Testing Reactor (JMTR). For the purpose to perform assembling of capsules, materials tests, materials inspection and analysis of irradiation specimens for the development of irradiation capsules, improvement and maintenance of facilities were performed. From the viewpoint of effective use of existing buildings in the Oarai research and development center, the RI application development building was refurbished and maintained for above-mentioned purpose. The RI application development building is a released controlled area, and was used as storage of experimental equipments and stationeries. The building was named 'Irradiation Technology Development Building' after it refurbished and maintained. Eight laboratories were maintained based on the purpose of use, and the installation of the experimental apparatuses was started. A basic management procedure of the Irradiation Technology Development Building was established and has been operated. This report describes the refurbish work of the RI application development building, the installation and operation method of the experimental apparatuses and the basic management procedure of the Irradiation Technology Development Building. (author)

  18. A Pilot Study on the effects of Music Therapy on Frontotemporal Dementia - developing a research protocol

    DEFF Research Database (Denmark)

    Ridder, Hanne Mette Ochsner; Wigram, Tony; Ottesen, Anne Marie

    2009-01-01

    , and pharmacological treatment of the psychiatric symptoms is difficult, requiring specialist proficiency in the field. Pilot study: As there is not yet sufficient research that examines the effects of non-pharmacologic treatment with this group there is a need to develop valid and reliable research protocols....... As an example of a non-pharmacologic treatment procedure music therapy was investigated. With the focus to develop a research protocol for a future larger population study a pilot study was carried out. In two case studies a combination of data collection methods were examined with the overall goal to document...... changes in intersubjectivity. In this pilot testing there was a specific interest in selecting a relevant and manageable dementia specific instrument for measuring quality of life and relating it with other instruments. Following three instruments were tested: the Altzheimers Disease-Related Quality...

  19. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  20. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  1. Developing Phenomena Models from Experimental Data

    DEFF Research Database (Denmark)

    Kristensen, Niels Rode; Madsen, Henrik; Jørgensen, Sten Bay

    2003-01-01

    A systematic approach for developing phenomena models from experimental data is presented. The approach is based on integrated application of stochastic differential equation (SDE) modelling and multivariate nonparametric regression, and it is shown how these techniques can be used to uncover...... unknown functionality behind various phenomena in first engineering principles models using experimental data. The proposed modelling approach has significant application potential, e.g. for determining unknown reaction kinetics in both chemical and biological processes. To illustrate the performance...... of the approach, a case study is presented, which shows how an appropriate phenomena model for the growth rate of biomass in a fed-batch bioreactor can be inferred from data....

  2. Developing Phenomena Models from Experimental Data

    DEFF Research Database (Denmark)

    A systematic approach for developing phenomena models from experimental data is presented. The approach is based on integrated application of stochastic differential equation (SDE) modelling and multivariate nonparametric regression, and it is shown how these techniques can be used to uncover...... unknown functionality behind various phenomena in first engineering principles models using experimental data. The proposed modelling approach has significant application potential, e.g. for determining unknown reaction kinetics in both chemical and biological processes. To illustrate the performance...... of the approach, a case study is presented, which shows how an appropriate phenomena model for the growth rate of biomass in a fed-batch bioreactor can be inferred from data....

  3. Studying frequency processing of the brain to enhance long-term memory and develop a human brain protocol.

    Science.gov (United States)

    Friedrich, Wernher; Du, Shengzhi; Balt, Karlien

    2015-01-01

    The temporal lobe in conjunction with the hippocampus is responsible for memory processing. The gamma wave is involved with this process. To develop a human brain protocol, a better understanding of the relationship between gamma and long-term memory is vital. A more comprehensive understanding of the human brain and specific analogue waves it uses will support the development of a human brain protocol. Fifty-eight participants aged between 6 and 60 years participated in long-term memory experiments. It is envisaged that the brain could be stimulated through binaural beats (sound frequency) at 40 Hz (gamma) to enhance long-term memory capacity. EEG recordings have been transformed to sound and then to an information standard, namely ASCII. Statistical analysis showed a proportional relationship between long-term memory and gamma activity. Results from EEG recordings indicate a pattern. The pattern was obtained through the de-codification of an EEG recording to sound and then to ASCII. Stimulation of gamma should enhance long term memory capacity. More research is required to unlock the human brains' protocol key. This key will enable the processing of information directly to and from human memory via gamma, the hippocampus and the temporal lobe.

  4. Implementation of two-party protocols in the noisy-storage model

    International Nuclear Information System (INIS)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-01-01

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  5. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  6. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  7. The UNC/UMN Baby Connectome Project (BCP): An overview of the study design and protocol development.

    Science.gov (United States)

    Howell, Brittany R; Styner, Martin A; Gao, Wei; Yap, Pew-Thian; Wang, Li; Baluyot, Kristine; Yacoub, Essa; Chen, Geng; Potts, Taylor; Salzwedel, Andrew; Li, Gang; Gilmore, John H; Piven, Joseph; Smith, J Keith; Shen, Dinggang; Ugurbil, Kamil; Zhu, Hongtu; Lin, Weili; Elison, Jed T

    2018-03-22

    The human brain undergoes extensive and dynamic growth during the first years of life. The UNC/UMN Baby Connectome Project (BCP), one of the Lifespan Connectome Projects funded by NIH, is an ongoing study jointly conducted by investigators at the University of North Carolina at Chapel Hill and the University of Minnesota. The primary objective of the BCP is to characterize brain and behavioral development in typically developing infants across the first 5 years of life. The ultimate goals are to chart emerging patterns of structural and functional connectivity during this period, map brain-behavior associations, and establish a foundation from which to further explore trajectories of health and disease. To accomplish these goals, we are combining state of the art MRI acquisition and analysis techniques, including high-resolution structural MRI (T1-and T2-weighted images), diffusion imaging (dMRI), and resting state functional connectivity MRI (rfMRI). While the overall design of the BCP largely is built on the protocol developed by the Lifespan Human Connectome Project (HCP), given the unique age range of the BCP cohort, additional optimization of imaging parameters and consideration of an age appropriate battery of behavioral assessments were needed. Here we provide the overall study protocol, including approaches for subject recruitment, strategies for imaging typically developing children 0-5 years of age without sedation, imaging protocol and optimization, a description of the battery of behavioral assessments, and QA/QC procedures. Combining HCP inspired neuroimaging data with well-established behavioral assessments during this time period will yield an invaluable resource for the scientific community. Copyright © 2018 Elsevier Inc. All rights reserved.

  8. An improved machine learning protocol for the identification of correct Sequest search results

    Directory of Open Access Journals (Sweden)

    Lu Hui

    2010-12-01

    Full Text Available Abstract Background Mass spectrometry has become a standard method by which the proteomic profile of cell or tissue samples is characterized. To fully take advantage of tandem mass spectrometry (MS/MS techniques in large scale protein characterization studies robust and consistent data analysis procedures are crucial. In this work we present a machine learning based protocol for the identification of correct peptide-spectrum matches from Sequest database search results, improving on previously published protocols. Results The developed model improves on published machine learning classification procedures by 6% as measured by the area under the ROC curve. Further, we show how the developed model can be presented as an interpretable tree of additive rules, thereby effectively removing the 'black-box' notion often associated with machine learning classifiers, allowing for comparison with expert rule-of-thumb. Finally, a method for extending the developed peptide identification protocol to give probabilistic estimates of the presence of a given protein is proposed and tested. Conclusions We demonstrate the construction of a high accuracy classification model for Sequest search results from MS/MS spectra obtained by using the MALDI ionization. The developed model performs well in identifying correct peptide-spectrum matches and is easily extendable to the protein identification problem. The relative ease with which additional experimental parameters can be incorporated into the classification framework, to give additional discriminatory power, allows for future tailoring of the model to take advantage of information from specific instrument set-ups.

  9. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  10. From human monocytes to genome-wide binding sites--a protocol for small amounts of blood: monocyte isolation/ChIP-protocol/library amplification/genome wide computational data analysis.

    Directory of Open Access Journals (Sweden)

    Sebastian Weiterer

    Full Text Available Chromatin immunoprecipitation in combination with a genome-wide analysis via high-throughput sequencing is the state of the art method to gain genome-wide representation of histone modification or transcription factor binding profiles. However, chromatin immunoprecipitation analysis in the context of human experimental samples is limited, especially in the case of blood cells. The typically extremely low yields of precipitated DNA are usually not compatible with library amplification for next generation sequencing. We developed a highly reproducible protocol to present a guideline from the first step of isolating monocytes from a blood sample to analyse the distribution of histone modifications in a genome-wide manner.The protocol describes the whole work flow from isolating monocytes from human blood samples followed by a high-sensitivity and small-scale chromatin immunoprecipitation assay with guidance for generating libraries compatible with next generation sequencing from small amounts of immunoprecipitated DNA.

  11. Prevention of cervical cancer in HIV-seropositive women from developing countries: a systematic review protocol.

    Science.gov (United States)

    Mapanga, Witness; Elhakeem, Ahmed; Feresu, Shingairai A; Maseko, Fresier; Chipato, Tsungai

    2017-04-24

    Over 85% of cervical cancer cases and deaths occur in developing countries. HIV-seropositive women are more likely to develop precancerous lesions that lead to cervical cancer than HIV-negative women. However, the literature on cervical cancer prevention in seropositive women in developing countries has not been reviewed. The aim of this study is to systematically review cervical cancer prevention modalities available for HIV-seropositive women in developing countries. This protocol was developed by following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P) statement, and the systematic review will be reported in accordance with the PRISMA guidelines. Embase, MEDLINE, PubMed, CINAHL and Cochrane Library will be searched from inception up to date of final search, and additional studies will be located through citation and reference list tracking. Eligible studies will be randomised controlled trials, prospective and retrospective cohort studies, case-control and cross-sectional studies carried out in developing countries. Studies will be included if they are published in English and examine cervical cancer prevention modalities in HIV-seropositive women. Results will be summarised in tables and, where appropriate, combined using meta-analysis. This review will address the gap in evidence by systematically reviewing the published literature on the different prevention modalities being used to prevent cervical cancer in HIV-seropositive women in developing countries. The findings may be used to inform evidence-based guidelines for prevention of cervical cancer in seropositive women as well as future research. PROSPERO CRD42017054678 .

  12. Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol

    NARCIS (Netherlands)

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    BACKGROUND AND AIM: In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to

  13. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  14. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  15. Development of wide area environment accelerator operation and diagnostics method

    Science.gov (United States)

    Uchiyama, Akito; Furukawa, Kazuro

    2015-08-01

    Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  16. Development of wide area environment accelerator operation and diagnostics method

    Directory of Open Access Journals (Sweden)

    Akito Uchiyama

    2015-08-01

    Full Text Available Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs, the use of standard protocols such as the hypertext transfer protocol (HTTP is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  17. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  18. The development of human factors experimental evaluation techniques -The development of human factors technologies-

    International Nuclear Information System (INIS)

    Sim, Bong Shick; Oh, In Seok; Cha, Kyeong Ho; Lee, Hyun Chul

    1994-04-01

    In the 2nd year of the research project for the development of human factors evaluation techniques, we first defined the experimental target systems by the comparison study of the advanced control rooms proposed by foreign countries in order to make the experiment feasible and realistic for the 10 experimental items selected in the first year of the project. Then we have decided to confine our research on the big board overview panel and operator workstations. Following the development of selection criteria for our research interest, we have identified the design variables which may influence the performance of the operator by the functional analysis. The experimental variables which will be used for the evaluation of the proposed items are then defined by the relational analysis between evaluation items and design variables and they are classified by the characteristics of the measurement data. The functional requirements of ITF are developed to accommodate the necessary functions for carrying out the 10 evaluation items. The functional requirements for each sub-system of ITF have been developed with the experimental paradigm of APTEA. Finally we have reviewed the compact nuclear simulator (CNS) at KAERI from the point of view of jyman factors guidelines/principles and proposed the two possible layouts for the experimental apparatus for the evaluation of display alternative and operational procedure. (Author)

  19. Clean Development Mechanism” projects in the developing countries within the Kyoto protocol: problem analysis of a case study in Morocco

    Directory of Open Access Journals (Sweden)

    Gaglioppa P

    2009-11-01

    Full Text Available An internship period spent in the north of Morocco kingdom (Tetouan gave a contribute to the organization activity in promoting sustainable development in the rural areas under the Kyoto Protocol. The multitasking project will increase biodiversity planting trees for wood, forage and fruits productions. The paper show a first step study to evaluate the possibility to reach an agreement with the propriety and the manager of these areas in a multifunctional reforestation project. The eligible site suitable for reforestation in accordance with the CDM international scheme is a large plateau (more than 5000 hectares 600 meters high on the sea level far from the Cannabis crops area. The evaluation of the project costs and of the social benefits for the population consider (using different species the indigenous communities necessity. The evaluation of carbon sequestration show the small scale of the reforestation project on behalf of the Kyoto Protocol, but give also an idea about the people rights and necessities. The normal afforestation and reforestation projects, under the Kyoto Protocol, try to maximize the CO2 sequestration in a short time, than business laws usually require. A small scale project could be self-managing, less expensive (international certification costs and more interesting for local communities.

  20. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    Science.gov (United States)

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with

  1. Development and layout of a protocol for the field performance of concrete deck and crack sealers.

    Science.gov (United States)

    2009-09-01

    The main objective of this project was to develop and layout a protocol for the long-term monitoring and assessment of the performance of concrete deck and crack sealants in the field. To accomplish this goal, a total of six bridge decks were chosen ...

  2. Development of a greenhouse-based inoculation protocol for the fungus Colletotrichum cereale pathogenic to annual bluegrass (Poa annua

    Directory of Open Access Journals (Sweden)

    Lisa A. Beirn

    2015-08-01

    Full Text Available The fungus Colletotrichum cereale incites anthracnose disease on Poa annua (annual bluegrass turfgrass. Anthracnose disease is geographically widespread throughout the world and highly destructive to cool-season turfgrasses, with infections by C. cereale resulting in extensive turf loss. Comprehensive research aimed at controlling turfgrass anthracnose has been performed in the field, but knowledge of the causal organism and its basic biology is still needed. In particular, the lack of a reliable greenhouse-based inoculation protocol performed under controlled environmental conditions is an obstacle to the study of C. cereale and anthracnose disease. Our objective was to develop a consistent and reproducible inoculation protocol for the two major genetic lineages of C. cereale. By adapting previously successful field-based protocols and combining with components of existing inoculation procedures, the method we developed consistently produced C. cereale infection on two susceptible P. annua biotypes. Approximately 7 to 10 days post-inoculation, plants exhibited chlorosis and thinning consistent with anthracnose disease symptomology. Morphological inspection of inoculated plants revealed visual signs of the fungus (appressoria and acervuli, although acervuli were not always present. After stringent surface sterilization of inoculated host tissue, C. cereale was consistently re-isolated from symptomatic tissue. Real-time PCR detection analysis based on the Apn2 marker confirmed the presence of the pathogen in host tissue, with both lineages of C. cereale detected from all inoculated plants. When a humidifier was not used, no infection developed for any biotypes or fungal isolates tested. The inoculation protocol described here marks significant progress for in planta studies of C. cereale, and will enable scientifically reproducible investigations of the biology, infectivity and lifestyle of this important grass pathogen.

  3. Interaction systems design and the protocol- and middleware-centred paradigms in distributed application development

    OpenAIRE

    Andrade Almeida, João; van Sinderen, Marten J.; Quartel, Dick; Ferreira Pires, Luis

    2003-01-01

    This paper aims at demonstrating the benefits and importance of interaction systems design in the development of distributed applications. We position interaction systems design with respect to two paradigms that have influenced the design of distributed applications: the middleware-centred and the protocol-centred paradigm. We argue that interaction systems that support application-level interactions should be explicitly designed, using the externally observable behaviour of the interaction ...

  4. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    Energy Technology Data Exchange (ETDEWEB)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Federation Academy of Cryptography (Russian Federation)

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Three protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.

  5. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  6. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    2004-01-01

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  7. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  8. Multiple-specimen absolute paleointensity determination with the MSP-DSC protocol: Advantages and drawbacks.

    Science.gov (United States)

    Camps, P.; Fanjat, G.; Poidras, T.; Carvallo, C.; Nicol, P.

    2012-04-01

    The MSP-DSC protocol (Dekkers & Bohnel, 2006, EPSL; Fabian & Leonhardt, 2010, EPSL) is a recent development in the methodology for documenting the intensity of the ancient Earth magnetic field. Applicable both on rocks or archaeological artifacts it allows us to use samples that until now were not measured because their magnetic properties do not meet selection criteria required by conventional methods. However, this new experimental protocol requires that samples be heated and cooled under a field parallel to its natural remanent magnetization (NRM). Currently, standard paleointensity furnaces do not match precisely this constraint. Yet, such new measurement protocol seems very promising since it would possibly double the number of available data. We are developing in Montpellier (France), a very fast-heating oven with infrared dedicated to this protocol. Two key points determine its characteristics. The first is to heat uniformly a rock sample of a 10-cc-standard volume as fast as possible. The second is to apply to the sample during the heating (and the cooling) a precise magnetic induction field, perfectly controlled in 3D. We tested and calibrated a preliminary version of this oven along with the MSP-DSC protocol with 3 historical lava flows, 2 from Reunion Island (erupted in 2002 and 2007) and one from Etna (erupted in 1983). These lava flows were selected because they have different magnetic behaviors. Reunion 2002 is rather SD-PSD-like, while Reunion 2007 is PSD-MD-like, and Etna 1983 is MD-like. The paleointensity determinations obtained with the original protocol of Dekkers and Bohnel (2006, EPSL) are within +- 1 μT of the known field for the three lava flows. The same precision is obtained when we applied the fraction correction (MSP-FC protocol). However, we systematically observed a loss in the linearity of the MSP-FC plots. In addition, like Muxworthy and Taylor (2011, GJI), we found that the Domain State Correction is difficult to apply since alpha

  9. The effects of prenatal cannabis exposure on fetal development and pregnancy outcomes: a protocol.

    Science.gov (United States)

    Gunn, Jayleen K L; Rosales, Cecilia B; Center, Katherine E; Nuñez, Annabelle V; Gibson, Steven J; Ehiri, John E

    2015-03-13

    The effects of exposure to marijuana in utero on fetal development are not clear. Given that the recent legislation on cannabis in the US is likely to result in increased use, there is a need to assess the effects of prenatal cannabis exposure on fetal development and pregnancy outcomes. The objective of this review is to assess the effects of prenatal exposure to cannabis on pregnancy outcomes (including maternal and child outcomes). Major databases will be searched from inception to the latest issue, with the aim of identifying studies that reported the effects of prenatal exposure to cannabis on fetal development and pregnancy outcomes. Two investigators will independently review all titles and abstracts to identify potential articles. Discrepancies will be resolved by repeated review, discussion and consensus. Study quality assessment will be undertaken, using standard protocols. To qualify for inclusion, studies must report at least one maternal or neonatal outcome post partum. Cross-sectional, case-control, cohort and randomised controlled trials published in English will be included. In order to rule out the effects of other drugs that may affect fetal development and pregnancy outcomes, studies will only be included if they report outcomes of prenatal exposure to cannabis while excluding other illicit substances. Data from eligible studies will be extracted, and data analysis will include a systematic review and critical appraisal of evidence, and meta-analysis if data permit. Meta-analysis will be conducted if three or more studies report comparable statistics on the same outcome. The review which will result from this protocol has not already been conducted. Preparation of the review will follow the procedures stated in this protocol, and will adhere to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. Ethical approval of data will not be required since the review will use data that are already available in the

  10. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  11. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  12. Development, appraisal, validation and implementation of a consensus protocol for the assessment of cerebral amyloid angiopathy in post-mortem brain tissue

    Science.gov (United States)

    Love, Seth; Chalmers, Katy; Ince, Paul; Esiri, Margaret; Attems, Johannes; Jellinger, Kurt; Yamada, Masahito; McCarron, Mark; Minett, Thais; Matthews, Fiona; Greenberg, Steven; Mann, David; Kehoe, Patrick Gavin

    2014-01-01

    In a collaboration involving 11 groups with research interests in cerebral amyloid angiopathy (CAA), we used a two-stage process to develop and in turn validate a new consensus protocol and scoring scheme for the assessment of CAA and associated vasculopathic abnormalities in post-mortem brain tissue. Stage one used an iterative Delphi-style survey to develop the consensus protocol. The resultant scoring scheme was tested on a series of digital images and paraffin sections that were circulated blind to a number of scorers. The scoring scheme and choice of staining methods were refined by open-forum discussion. The agreed protocol scored parenchymal and meningeal CAA on a 0-3 scale, capillary CAA as present/absent and vasculopathy on 0-2 scale, in the 4 cortical lobes that were scored separately. A further assessment involving three centres was then undertaken. Neuropathologists in three centres (Bristol, Oxford and Sheffield) independently scored sections from 75 cases (25 from each centre) and high inter-rater reliability was demonstrated. Stage two used the results of the three-centre assessment to validate the protocol by investigating previously described associations between APOE genotype (previously determined), and both CAA and vasculopathy. Association of capillary CAA with or without arteriolar CAA with APOE ε4 was confirmed. However APOE ε2 was also found to be a strong risk factor for the development of CAA, not only in AD but also in elderly non-demented controls. Further validation of this protocol and scoring scheme is encouraged, to aid its wider adoption to facilitate collaborative and replication studies of CAA. PMID:24754000

  13. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  14. New amides for uranium extraction: comparison between in silico predictions and experimental data

    International Nuclear Information System (INIS)

    Klimshuk, O.; Ouadi, A.; Billard, I.; Varnek, A.; Fourches, D.; Solov'ev, V.

    2006-01-01

    New methods and original software tools for computer-aided molecular design have been used to develop 'in silico' new monoamides which efficiently extract U(VI). A set of available experimental values of the uranyl partition coefficient (log D) in water/toluene system for 22 monoamides have been used by the ISIDA program in order to establish quantitative relationships between structure of the molecules and their extraction properties. Then, developed structure-property models have been applied to screen a virtual combinatorial library containing more than 2000 molecules. Selected hits have been synthesized and studied experimentally as extractants using the same protocol as for the molecules from the initial data set. Comparison between predicted and experimentally obtained log D values for new extractants is discussed. (author)

  15. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  16. Development of an experimental apparatus for nucleate boiling analysis

    International Nuclear Information System (INIS)

    Castro, A.J.A. de.

    1984-01-01

    An experimental apparatus is developed for the study of the parameters that affect nucleate boiling. The experimental set up is tested for nucleate boiling in an annular test section with subcooled water flow. The following parameters are analysed: pressure, fluid velocity and the fluid temperature at the test section entrance. The performance of the experimental apparatus is analysed by the results and by the problems raised by the operation of the setup. (Author) [pt

  17. Development of the NSRR experimental data bank system, (1)

    International Nuclear Information System (INIS)

    Ishijima, Kiyomi; Uemura, Mutsumi; Ohnishi, Nobuaki

    1981-01-01

    To promote collection, arrangement, and utilization of the NSRR experimental data, development of the NSRR experimental data bank system was intended. Fundamental parts of the NSRR experimental data bank system, including the processing program DTBNK, have been completed. Data of the experiments performed so far have been collected and stored. Outline of the processing program and the method of utilization and the present status of the data bank system are discussed. (author)

  18. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    Directory of Open Access Journals (Sweden)

    Shane Ó Conchúir

    Full Text Available The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  19. Fractional optical cryptographic protocol for data containers in a noise-free multiuser environment

    Science.gov (United States)

    Jaramillo, Alexis; Barrera, John Fredy; Zea, Alejandro Vélez; Torroba, Roberto

    2018-03-01

    Optical encryption systems have great potential for flexible and high-performance data protection, making them an area of rapid development. However, most approaches present two main issues, namely, the presence of speckle noise, and the degree of security they offer. Here we introduce an experimental implementation of an optical encrypting protocol that tackles these issues by taking advantage of recent developments in the field. These developments include the introduction of information containers for noise free information retrieval, the use of multiplexing to allow for a multiple user environment and an architecture based on the Joint fractional Fourier transform that allows increased degrees of freedom and simplifies the experimental requirements. Thus, data handling via QR code containers involving multiple users processed in a fractional joint transform correlator produce coded information with increased security and ease of use. In this way, we can guarantee that only the user with the correct combination of encryption key and security parameters can achieve noise free information after deciphering. We analyze the performance of the system when the order of the fractional Fourier transform is changed during decryption. We show experimental results that confirm the validity of our proposal.

  20. Sponge-Like: A New Protocol for Preparing Bacterial Ghosts

    Directory of Open Access Journals (Sweden)

    Amro A. Amara

    2013-01-01

    Full Text Available Bacterial Ghosts (BGs received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3 pLysS (Promega was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC. Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ. Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications.

  1. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    Science.gov (United States)

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  2. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  3. Development of a monitoring protocol to enhance mentoring in the IRIS REU site

    Science.gov (United States)

    Hubenthal, M.; Brudzinski, M. R.; Colella, H.

    2013-12-01

    Research Experiences for Undergraduate (REU) sites pair interns with scientists expected to oversee and guide an intern's scientific research, and assist in the development of skills, knowledge, and connections that will enhance the intern's professional and personal growth. This aspect of REU sites is generally recognized as a powerful, yet complicated, component that has a strong influence on the overall success of the intern's experience. Evaluations indicate that the quality and consistency of mentoring in REU sites can be highly variable. Traditional strategies to influence mentorship generally include reading lists or short trainings at the beginning of the summer. The efficacy of these approaches is questionable. As a result many REU Site facilitators are deeply interested in the question 'How can REU programs challenge scientists to raise their participation to the level of (truly) mentoring?' The Incorporated Research Institutions for Seismology (IRIS) REU site is developing a 13-item rubric measuring research skills, and a protocol of training and intern-mentor meetings to discuss progress. The goal of the intervention is to both increase the extent to which the mentoring relationship is centered on the intern, and to enable interns and mentors to feel more effective monitoring interns' personal/professional growth. This intervention was piloted in 2011, refined, and fully implemented in 2012. During the initial week of the program, interns assess their skills, complete the rubric independently, and discuss the completed rubric with their mentor. Midway through the summer interns and mentors each review the rubric and assess the intern's skills. The intern-mentor pairs then meet to collaborate and complete the rubric together. Finally, in the last week of the program, interns and mentors independently assess the intern's skills and complete the rubric, and the pairs again meet to discuss and negotiate these independent assessments. Survey data from 2012

  4. Evaluation and development the routing protocol of a fully functional simulation environment for VANETs

    Science.gov (United States)

    Ali, Azhar Tareq; Warip, Mohd Nazri Mohd; Yaakob, Naimah; Abduljabbar, Waleed Khalid; Atta, Abdu Mohammed Ali

    2017-11-01

    Vehicular Ad-hoc Networks (VANETs) is an area of wireless technologies that is attracting a great deal of interest. There are still several areas of VANETS, such as security and routing protocols, medium access control, that lack large amounts of research. There is also a lack of freely available simulators that can quickly and accurately simulate VANETs. The main goal of this paper is to develop a freely available VANETS simulator and to evaluate popular mobile ad-hoc network routing protocols in several VANETS scenarios. The VANETS simulator consisted of a network simulator, traffic (mobility simulator) and used a client-server application to keep the two simulators in sync. The VANETS simulator also models buildings to create a more realistic wireless network environment. Ad-Hoc Distance Vector routing (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) were initially simulated in a city, country, and highway environment to provide an overall evaluation.

  5. Clinical Simulation: A Protocol for Evaluation of Mobile Technology.

    Science.gov (United States)

    Mather, Carey; Jensen, Sanne; Cummings, Elizabeth

    2017-01-01

    For mobile technology to be accepted at point of care in healthcare environments there is a need to demonstrate benefits whilst ameliorating the risks and challenges. To provide a standardised approach to evaluation of mobile technology a simulation protocol was developed to provide guidance for its use in healthcare environments. Simulated conditions provide the opportunity to assess intended and unintended consequences and identify potential workarounds when using technology. The protocol can also be used to demonstrate the importance of the development of digital professionalism by end-users prior to students entering the clinical practice setting. The mobile technology protocol was adapted from a health information systems protocol developed and used at the ITX Lab, Denmark for use in other simulation laboratories. Use case scenarios were developed to enable evaluation of mobile technology for mobile learning of nurses, nurse supervisors, students and patients. The scenarios can be used in a range of simulated environments including hospital bedside, outpatient clinic or community settings. A case study exemplar of a nurse and patient is included to demonstrate how the mobile technology protocol can be applied.

  6. The Alpine convention and protocols - the starting points for sustainable development in the Slovenian Alps and its neighbouring regions

    Directory of Open Access Journals (Sweden)

    Vesna Kolar-Planinšič

    1999-12-01

    Full Text Available The article presents the international agreement Alpine Convention. The states which have signed the agreement have undertaken to the common politics for the preservation and sustainable use of sources. The areas covered by the convention: population and culture, physical planning, prevention of air polution, soil conservation, water management, nature conservation and landscape planning, mountain farming, mountain forestry, tourism and recreation, transport, energy and waste management are presented as well as their aims. The primary stress is given to the protocols: "Physical Planning and Sustainable Development" and "Nature Conservation and Landscape Planning",with the emphasis to the sustainable development. They represent cover and their aims are implemented in all the others protocols.

  7. Contribution to the experimental study of the hydraulic jump in ...

    African Journals Online (AJOL)

    The purpose of this study is to study experimentally the hydraulic jump evolving in a symmetric trapezoidal channel with a positive slope, requires the use of an experimental protocol, and to find experimental relations linking the characteristics of the formed projection. The experimental study investigated the variation of the ...

  8. Development of standardized bioassay protocols for the toxicity assessment of waste, manufactured products, and effluents in Latin America: Venezuela, a Case Study

    International Nuclear Information System (INIS)

    Rodriquez-Grau, J.

    1993-01-01

    The present status of the toxicity assessment of industrial products in Latin America is well below North America/EC standards. As an example, most of Latin America regulatory laws regarding effluent discharge are still based upon concentration limits of certain major pollutants, and BOD/COD measurements; no reference is made to the necessity of aquatic bioassay toxicity data. Aware of this imperative need, the Venezuelan Petroleum Industry (PDVSA), through its R ampersand D Corporative branch (INTEVEP) gave priority to the development of standardized acute/sublethal toxicity test protocols as sound means of evaluating their products and wastes. Throughout this presentation, the Venezuelan case will be studied, showing strategies undertaken to accelerate protocol development. Results will show the assessment of 14 different protocols encompassing a variety of species of aquatic/terrestrial organisms, and a series of toxicity test endpoints including mortality, reproductive, biological and immunological measurements, most of which are currently in use or being developed. These protocols have already yielded useful results in numerous cases where toxicity assessment was required, including evaluations of effluent, oil dispersants, drilling fluids, toxic wastes, fossil fuels and newly developed products. The Venezuelan case demonstrates that the integration of Industry, Academia and Government, which is an essential part of SETAC's philosophy, is absolutely necessary for the successful advancement of environmental scientific/regulatory issues

  9. Development of a fault test experimental facility model using Matlab

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, Iraci Martinez; Moraes, Davi Almeida, E-mail: martinez@ipen.br, E-mail: dmoraes@dk8.com.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2015-07-01

    The Fault Test Experimental Facility was developed to simulate a PWR nuclear power plant and is instrumented with temperature, level and pressure sensors. The Fault Test Experimental Facility can be operated to generate normal and fault data, and these failures can be added initially small, and their magnitude being increasing gradually. This work presents the Fault Test Experimental Facility model developed using the Matlab GUIDE (Graphical User Interface Development Environment) toolbox that consists of a set of functions designed to create interfaces in an easy and fast way. The system model is based on the mass and energy inventory balance equations. Physical as well as operational aspects are taken into consideration. The interface layout looks like a process flowchart and the user can set the input variables. Besides the normal operation conditions, there is the possibility to choose a faulty variable from a list. The program also allows the user to set the noise level for the input variables. Using the model, data were generated for different operational conditions, both under normal and fault conditions with different noise levels added to the input variables. Data generated by the model will be compared with Fault Test Experimental Facility data. The Fault Test Experimental Facility theoretical model results will be used for the development of a Monitoring and Fault Detection System. (author)

  10. Development of a fault test experimental facility model using Matlab

    International Nuclear Information System (INIS)

    Pereira, Iraci Martinez; Moraes, Davi Almeida

    2015-01-01

    The Fault Test Experimental Facility was developed to simulate a PWR nuclear power plant and is instrumented with temperature, level and pressure sensors. The Fault Test Experimental Facility can be operated to generate normal and fault data, and these failures can be added initially small, and their magnitude being increasing gradually. This work presents the Fault Test Experimental Facility model developed using the Matlab GUIDE (Graphical User Interface Development Environment) toolbox that consists of a set of functions designed to create interfaces in an easy and fast way. The system model is based on the mass and energy inventory balance equations. Physical as well as operational aspects are taken into consideration. The interface layout looks like a process flowchart and the user can set the input variables. Besides the normal operation conditions, there is the possibility to choose a faulty variable from a list. The program also allows the user to set the noise level for the input variables. Using the model, data were generated for different operational conditions, both under normal and fault conditions with different noise levels added to the input variables. Data generated by the model will be compared with Fault Test Experimental Facility data. The Fault Test Experimental Facility theoretical model results will be used for the development of a Monitoring and Fault Detection System. (author)

  11. The Healthy Primary School of the Future: study protocol of a quasi-experimental study.

    Science.gov (United States)

    Willeboordse, M; Jansen, M W; van den Heijkant, S N; Simons, A; Winkens, B; de Groot, R H M; Bartelink, N; Kremers, S P; van Assema, P; Savelberg, H H; de Neubourg, E; Borghans, L; Schils, T; Coppens, K M; Dietvorst, R; Ten Hoopen, R; Coomans, F; Klosse, S; Conjaerts, M H J; Oosterhoff, M; Joore, M A; Ferreira, I; Muris, P; Bosma, H; Toppenberg, H L; van Schayck, C P

    2016-07-26

    Unhealthy lifestyles in early childhood are a major global health challenge. These lifestyles often persist from generation to generation and contribute to a vicious cycle of health-related and social problems. This design article presents a study evaluating the effects of two novel healthy school interventions. The main outcome measure will be changes in children's body mass index (BMI). In addition, lifestyle behaviours, academic achievement, child well-being, socio-economic differences, and societal costs will be examined. In close collaboration with various stakeholders, a quasi-experimental study was developed, for which children of four intervention schools (n = 1200) in the southern part of the Netherlands are compared with children of four control schools (n = 1200) in the same region. The interventions started in November 2015. In two of the four intervention schools, a whole-school approach named 'The Healthy Primary School of the Future', is implemented with the aim of improving physical activity and dietary behaviour. For this intervention, pupils are offered an extended curriculum, including a healthy lunch, more physical exercises, and social and educational activities, next to the regular school curriculum. In the two other intervention schools, a physical-activity school approach called 'The Physical Activity School', is implemented, which is essentially similar to the other intervention, except that no lunch is provided. The interventions proceed during a period of 4 years. Apart from the effectiveness of both interventions, the process, the cost-effectiveness, and the expected legal implications are studied. Data collection is conducted within the school system. The baseline measurements started in September 2015 and yearly follow-up measurements are taking place until 2019. A whole-school approach is a new concept in the Netherlands. Due to its innovative, multifaceted nature and sound scientific foundation, these integrated programmes

  12. The Healthy Primary School of the Future: study protocol of a quasi-experimental study

    Directory of Open Access Journals (Sweden)

    M. Willeboordse

    2016-07-01

    Full Text Available Abstract Background Unhealthy lifestyles in early childhood are a major global health challenge. These lifestyles often persist from generation to generation and contribute to a vicious cycle of health-related and social problems. This design article presents a study evaluating the effects of two novel healthy school interventions. The main outcome measure will be changes in children’s body mass index (BMI. In addition, lifestyle behaviours, academic achievement, child well-being, socio-economic differences, and societal costs will be examined. Methods In close collaboration with various stakeholders, a quasi-experimental study was developed, for which children of four intervention schools (n = 1200 in the southern part of the Netherlands are compared with children of four control schools (n = 1200 in the same region. The interventions started in November 2015. In two of the four intervention schools, a whole-school approach named ‘The Healthy Primary School of the Future’, is implemented with the aim of improving physical activity and dietary behaviour. For this intervention, pupils are offered an extended curriculum, including a healthy lunch, more physical exercises, and social and educational activities, next to the regular school curriculum. In the two other intervention schools, a physical-activity school approach called ‘The Physical Activity School’, is implemented, which is essentially similar to the other intervention, except that no lunch is provided. The interventions proceed during a period of 4 years. Apart from the effectiveness of both interventions, the process, the cost-effectiveness, and the expected legal implications are studied. Data collection is conducted within the school system. The baseline measurements started in September 2015 and yearly follow-up measurements are taking place until 2019. Discussion A whole-school approach is a new concept in the Netherlands. Due to its innovative, multifaceted

  13. Creatine Kinase and Lactate Dehydrogenase Responses After Different Resistance and Aerobic Exercise Protocols

    Directory of Open Access Journals (Sweden)

    Callegari Gustavo A.

    2017-08-01

    Full Text Available The aim of this study was to investigate the responses of creatine kinase (CK and lactate dehydrogenase (LDH after performing different resistance and aerobic exercise protocols. Twelve recreationally trained men (age, 23.2 ± 5.6 years; body mass, 84.3 ± 9.3 kg; body height, 178.9 ± 4.5 cm; and BMI, 26.3 ± 2.3 kg·m2 volunteered to participate in this study. All subjects were randomly assigned to four experimental protocols (crossover: (a aerobic training at 60% of VO2max, (b aerobic training at 80% of VO2max, (c a resistance exercise (RE session with a bi-set protocol, and (d an RE session with a multiple sets protocol. Blood samples were collected before, immediately after and 24 hours following the experimental protocols. After 24 hours, there was a significant increase in CK for the 80% of VO2max protocol vs. the bi-set RE session (p = 0.016. Immediately after the protocols, we observed a significant increase in LDH among certain groups compared to others, as follows: multiple sets RE session vs. 60% of VO2max, bi-set RE session vs. 60% of VO2max, multiple sets RE session vs. 80% of VO2max, and bi-set RE session vs. 80% of VO2max (p = 0.008, p = 0.013; p = 0.002, p = 0.004, respectively. In conclusion, aerobic exercise performed at 80% of VO2max appears to elevate plasma CK levels more than bi-set RE sessions. However, the bi-set and multiple sets RE sessions appeared to trigger greater levels of blood LDH compared to aerobic protocols performed at 60% and 80% of VO2max.

  14. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  15. The micro-step motor controller protocol and driver

    International Nuclear Information System (INIS)

    Hong, Kwang Pyo; Lee, Chang Hee; Moon, Myung Kook; Choi, Bung Hun; Choi, Young Hyun; Cheon, Jong Gu

    2004-11-01

    We developed the communication protocol which is a main kernel of motor control firmware program that is used at HANARO neutron spectrometer now. This protocol driver divide into as a 4 group(Serial protocol, DLL, Active-X, Labview driver), so end-user can control the motor control as easily by PC RS232/422 port and have a merits as follows: Support a Low Level/High level driver, Support a Network Connectivity function by using High level Driver, One Server can services many client request. By using this protocol, The End-user can be easily makes a application motor control program and developed another application system program by using several kinds of programming tools under Widows and Linux based operation systems

  16. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  17. Development of Taiwanese government’s climate policy after the Kyoto protocol: Applying policy network theory as an analytical framework

    International Nuclear Information System (INIS)

    Shyu, Chian-Woei

    2014-01-01

    Given its limited involvement in and recognition by international organizations, Taiwan is not presently a signatory to the United Nations Framework Convention on Climate Change (UNFCCC) or the Kyoto Protocol. The objective of this study is to analyze how and the extent to which changes in an exogenous factor, namely the Kyoto Protocol and Post-Kyoto climate negotiations, affect and ultimately lead to the formulation of and changes in the Taiwanese government's climate policy. This study applies policy network theory to examine the development of and changes in the Taiwanese government's climate policy. The results demonstrate that international climate agreements and negotiations play a key role in the development of, changes to, and transformation of Taiwan's climate policy. Scarce evidence was found in this study to demonstrate that domestic or internal factors affect climate change policy. Despite its lack of participation in the UNFCCC and the Kyoto Protocol, Taiwan has adopted national climate change strategies, action plans, and programs to reduce greenhouse gas emissions. However, these climate policies and measures are fairly passive and aim to only conform to the minimal requirements for developing countries under international climate agreements and negotiations. This process results in inconsistent and variable climate policies, targets, and regulations. - Highlights: • Taiwan is not a signatory to the UNFCCC or its Kyoto Protocol. • International climate agreements strongly affected Taiwan's climate policy. • Little evidence was found that domestic factors affect Taiwan's climate policy. • New climate policies, regulations, and laws are formulated and implemented. • Climate policies, targets, and regulations change frequently and are inconsistent

  18. Development of the Biological Experimental Design Concept Inventory (BEDCI)

    Science.gov (United States)

    Deane, Thomas; Nomme, Kathy; Jeffery, Erica; Pollock, Carol; Birol, Gulnur

    2014-01-01

    Interest in student conception of experimentation inspired the development of a fully validated 14-question inventory on experimental design in biology (BEDCI) by following established best practices in concept inventory (CI) design. This CI can be used to diagnose specific examples of non-expert-like thinking in students and to evaluate the…

  19. Developing a dynamic virtual stimulation protocol to induce linear egomotion during orthostatic posture control test

    Directory of Open Access Journals (Sweden)

    Paulo José Guimarães Da-Silva

    Full Text Available Abstract Introduction In this work, the effect of a dynamic visual stimulation (DS protocol was used to induce egomotion, the center of pressure (COP displacement response. Methods DS was developed concerning the scenario structure (chessboard-pattern floor and furniture and luminance. To move the scenario in a discrete forward (or backward direction, the furniture is expanded (or reduced and the black and white background is reversed during floor translation while the luminance is increased (or reduced by steps of 2 cd/m2. This protocol was evaluated using COP signals from 29 healthy volunteers: standing on a force platform observing the virtual scene (1.72 × 1.16 m projected 1 m ahead (visual incidence angle: θl = 81.4° and θv = 60.2°, which moves with constant velocity (2 m/s during 250 ms. A set of 100 DS was applied in random order, interspersed by a 10 s of static scene. Results The Tukey post-hoc test (p < 0.001 indicated egomotion in the same direction of DS. COP displacement increased over stimulation (8.4 ± 1.7 to 22.6 ±5.3 mm, as well as time to recover stability (4.1 ± 0.4 to 7.2 ± 0.6 s. The peak of egomotion during DSF occurred 200 ms after DSB (Wilcoxon, p = 0.002. Conclusion The dynamic configuration of this protocol establishes virtual flow effects of linear egomotion dependent on the direction of the dynamic visual stimulation. This finding indicates the potential application of the proposed virtual dynamic stimulation protocol to investigate the cortical visual evoked response in postural control studies.

  20. Experimental protocols for behavioral imaging: seeing animal models of drug abuse in a new light.

    Science.gov (United States)

    Aarons, Alexandra R; Talan, Amanda; Schiffer, Wynne K

    2012-01-01

    Behavioral neuroimaging is a rapidly evolving discipline that represents a marriage between the fields of behavioral neuroscience and preclinical molecular imaging. This union highlights the changing role of imaging in translational research. Techniques developed for humans are now widely applied in the study of animal models of brain disorders such as drug addiction. Small animal or preclinical imaging allows us to interrogate core features of addiction from both behavioral and biological endpoints. Snapshots of brain activity allow us to better understand changes in brain function and behavior associated with initial drug exposure, the emergence of drug escalation, and repeated bouts of drug withdrawal and relapse. Here we review the development and validation of new behavioral imaging paradigms and several clinically relevant radiotracers used to capture dynamic molecular events in behaving animals. We will discuss ways in which behavioral imaging protocols can be optimized to increase throughput and quantitative methods. Finally, we discuss our experience with the practical aspects of behavioral neuroimaging, so investigators can utilize effective animal models to better understand the addicted brain and behavior.

  1. Development of a data entry auditing protocol and quality assurance for a tissue bank database.

    Science.gov (United States)

    Khushi, Matloob; Carpenter, Jane E; Balleine, Rosemary L; Clarke, Christine L

    2012-03-01

    Human transcription error is an acknowledged risk when extracting information from paper records for entry into a database. For a tissue bank, it is critical that accurate data are provided to researchers with approved access to tissue bank material. The challenges of tissue bank data collection include manual extraction of data from complex medical reports that are accessed from a number of sources and that differ in style and layout. As a quality assurance measure, the Breast Cancer Tissue Bank (http:\\\\www.abctb.org.au) has implemented an auditing protocol and in order to efficiently execute the process, has developed an open source database plug-in tool (eAuditor) to assist in auditing of data held in our tissue bank database. Using eAuditor, we have identified that human entry errors range from 0.01% when entering donor's clinical follow-up details, to 0.53% when entering pathological details, highlighting the importance of an audit protocol tool such as eAuditor in a tissue bank database. eAuditor was developed and tested on the Caisis open source clinical-research database; however, it can be integrated in other databases where similar functionality is required.

  2. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  3. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  4. Development of a versatile user-friendly IBA experimental chamber

    Energy Technology Data Exchange (ETDEWEB)

    Kakuee, Omidreza; Fathollahi, Vahid; Lamehi-Rachti, Mohammad

    2016-03-15

    Reliable performance of the Ion Beam Analysis (IBA) techniques is based on the accurate geometry of the experimental setup, employment of the reliable nuclear data and implementation of dedicated analysis software for each of the IBA techniques. It has already been shown that geometrical imperfections lead to significant uncertainties in quantifications of IBA measurements. To minimize these uncertainties, a user-friendly experimental chamber with a heuristic sample positioning system for IBA analysis was recently developed in the Van de Graaff laboratory in Tehran. This system enhances IBA capabilities and in particular Nuclear Reaction Analysis (NRA) and Elastic Recoil Detection Analysis (ERDA) techniques. The newly developed sample manipulator provides the possibility of both controlling the tilt angle of the sample and analyzing samples with different thicknesses. Moreover, a reasonable number of samples can be loaded in the sample wheel. A comparison of the measured cross section data of the {sup 16}O(d,p{sub 1}){sup 17}O reaction with the data reported in the literature confirms the performance and capability of the newly developed experimental chamber.

  5. Development of a versatile user-friendly IBA experimental chamber

    Science.gov (United States)

    Kakuee, Omidreza; Fathollahi, Vahid; Lamehi-Rachti, Mohammad

    2016-03-01

    Reliable performance of the Ion Beam Analysis (IBA) techniques is based on the accurate geometry of the experimental setup, employment of the reliable nuclear data and implementation of dedicated analysis software for each of the IBA techniques. It has already been shown that geometrical imperfections lead to significant uncertainties in quantifications of IBA measurements. To minimize these uncertainties, a user-friendly experimental chamber with a heuristic sample positioning system for IBA analysis was recently developed in the Van de Graaff laboratory in Tehran. This system enhances IBA capabilities and in particular Nuclear Reaction Analysis (NRA) and Elastic Recoil Detection Analysis (ERDA) techniques. The newly developed sample manipulator provides the possibility of both controlling the tilt angle of the sample and analyzing samples with different thicknesses. Moreover, a reasonable number of samples can be loaded in the sample wheel. A comparison of the measured cross section data of the 16O(d,p1)17O reaction with the data reported in the literature confirms the performance and capability of the newly developed experimental chamber.

  6. Improving plant bioaccumulation science through consistent reporting of experimental data.

    Science.gov (United States)

    Fantke, Peter; Arnot, Jon A; Doucette, William J

    2016-10-01

    Experimental data and models for plant bioaccumulation of organic contaminants play a crucial role for assessing the potential human and ecological risks associated with chemical use. Plants are receptor organisms and direct or indirect vectors for chemical exposures to all other organisms. As new experimental data are generated they are used to improve our understanding of plant-chemical interactions that in turn allows for the development of better scientific knowledge and conceptual and predictive models. The interrelationship between experimental data and model development is an ongoing, never-ending process needed to advance our ability to provide reliable quality information that can be used in various contexts including regulatory risk assessment. However, relatively few standard experimental protocols for generating plant bioaccumulation data are currently available and because of inconsistent data collection and reporting requirements, the information generated is often less useful than it could be for direct applications in chemical assessments and for model development and refinement. We review existing testing guidelines, common data reporting practices, and provide recommendations for revising testing guidelines and reporting requirements to improve bioaccumulation knowledge and models. This analysis provides a list of experimental parameters that will help to develop high quality datasets and support modeling tools for assessing bioaccumulation of organic chemicals in plants and ultimately addressing uncertainty in ecological and human health risk assessments. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Development of exercise design, development and implementation protocol in the utilization of simulators for response management training

    International Nuclear Information System (INIS)

    Giesen, J. H.

    1997-01-01

    Development and operation of a marine oil spill management simulator system at Texas A and M University's Galveston Center for Marine Training and Safety was described. The Spill Management Simulator is a multi-year joint program between the U. S. Coast Guard and the Center. Essentially, it is a a computer-based modelling and scenario generator for conducting and evaluating incident management training. An independent evaluation group has been set up by the U.S.Coast Guard to evaluate the Galveston and similar programs established under the same legislation throughout the United States. This paper discusses the creation of a development and implementation protocol for Spill Management Team simulation as a foundation upon which to integrate available and future technology and for making it available to the response community as a whole. 12 refs.,1 tab., 4 figs

  8. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects

  9. Validation of protocol of experimental necrotizing enterocolitis in rats and the pitfalls during the procedure Validação do modelo de enterocolite necrotizante experimental em ratos e as armadilhas durante sua execução

    Directory of Open Access Journals (Sweden)

    Frances Lilian Lanhellas Gonçalves

    2013-01-01

    Full Text Available PURPOSE: To describe the difficulties of implementing the protocol of experimental necrotizing enterocolitis (NEC in order to obtain a larger number of newborns affected with the disease and a lower mortality. METHODS: Term Sprague-Dawley newborns rats (22 days were divided into four groups of 12 fetuses each (n = 48: EC - breastfed newborns; IH - breastfed newborns and subjected to a stress protocol by ischemia and hypothermia; ESB - formula-fed newborns (Esbilac®, PetAg, Hampshire, IL, USA and NEC - formula-fed newborns and subjected to stress protocol. The parameters set for the study protocol were: milk concentration (0.19 g ml or 0.34 g/ml, diet instilled volume (according to body weight - 200 kcal/day/Kg - or progressive, according to acceptance, weight (gain, loss or maintenance and duration of the experiment (72 hours or 96 hours. Data of body weight (BW, intestinal weight (IW and the IW/BW ratio were obtained. Samples of terminal ileum were collected and analyzed by the degree of injury to the intestinal wall. Statistically significance was set to pOBJETIVO: Relatar as dificuldades da execução do protocolo de enterocolite necrosante (ECN experimental a fim de obter um maior número de neonatos comprometidos com a doença e menor mortalidade. MÉTODOS: Neonatos de ratas Sprague-Dawley nascidos a termo (22 dias foram divididos em 4 grupos de 12 fetos cada (n=48: EC - neonatos amamentados pela mãe; IH - neonatos amamentados pela mãe e submetidos a estresse por isquemia e hipotermia, ESB - neonatos alimentados por leite artificial (Esbilac®, PetAg, Hampshire, IL, USA e NEC - neonatos alimentados com fórmula e submetidos a protocolo de estresse. Os parâmetros estabelecidos para o protocolo de estudo foram: concentração do leite (0,19 g/ml ou 0,34 g/ml, volume de dieta instilada (de acordo com ganho de peso - 200 kcal/dia/kg - ou progressivo, de acordo com aceitação, peso (ganho, perda ou manutenção e duração do experimento

  10. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  11. Development of an experimental apparatus for boiling analysis

    International Nuclear Information System (INIS)

    Castro, A.J.A. de.

    1984-04-01

    The nucleate boiling is the most interesting boiling regime for practical appliccations, including nuclear reactor engineering. such regime is characterized by very high heat transfer rates with only small surface superheating. An experimental apparatus is developed for studying parameters which affect nucleate boiling. The following parameters are analysed: pressure, fluid velocity and the fluid temperature at the test section entrance. The performance of experimental apparatus is analysed by results and by problems raised by the oeration of setup. (Author) [pt

  12. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  13. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    International Nuclear Information System (INIS)

    Wu, D; France, E; Lambert, J; Hinkle, J

    2016-01-01

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articles were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse

  14. SU-F-R-06: Traumatic Brachial Plexus Injury Imaging, Developing a Coherent Clinical Protocol From Literature Review Through Practice

    Energy Technology Data Exchange (ETDEWEB)

    Wu, D; France, E; Lambert, J; Hinkle, J [The University of Oklahoma Health Sciences Center, Oklahoma City, OK (United States)

    2016-06-15

    Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articles were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse

  15. Implementation of a two-state quantum bit commitment protocol in optical fibers

    International Nuclear Information System (INIS)

    Almeida, Á J; Stojanovic, A D; Paunković, N; Loura, R; Mateus, P; Muga, N J; Silva, N A; André, P S; Pinto, A N

    2016-01-01

    We demonstrate experimentally the feasibility of a two-state quantum bit commitment protocol, which is both concealing and partially binding, assuming technological limitations. The security of this protocol is based on the lack of long-term stable quantum memories. We use a polarization-encoding scheme and optical fiber as a quantum channel. The measurement probability for the commitment is obtained and the optimal cheating strategy demonstrated. The average success rates for an honest player in the case where the measurements are performed using equal bases are 93.4%, when the rectilinear basis is measured, and 96.7%, when the diagonal basis is measured. The rates for the case when the measurements are performed in different bases are 52.9%, when the rectilinear basis is measured, and 55.4% when the diagonal basis is measured. The average success rates for the optimal cheating strategy are 80% and 73.8%, which are way below the success rates of an honest player. Using a strict numerical validity criterion, we show that, for these experimental values, the protocol is secure. (paper)

  16. Robust Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  17. Coupling of experimental measurements to study the influence of microscopic defects on the fatigue damage in A319 Al-Si alloy

    Directory of Open Access Journals (Sweden)

    Wang Long

    2014-06-01

    Full Text Available An experimental protocol based on the coupling of kinematic field measurements on the surface and in volume at the microstructure scale has been set up in order to study the influence of the casting microstructure upon the initiation and propagation of cracks in low cycle fatigue. Preliminary applications of this protocol on tensile tests were successful as it allowed tracking the development and localization of plastic deformation and identifying the initiation sites of microcracks during tests in relation with the observed surface and volume microstructures. Application of the proposed protocol to low cycle fatigue is an on-going work.

  18. Experimental infection of Pacific oyster Crassostrea gigas spat by ostreid herpesvirus 1: demonstration of oyster spat susceptibility

    Directory of Open Access Journals (Sweden)

    Schikorski David

    2011-02-01

    Full Text Available Abstract In 2008 and 2009, acute mortalities occurred in France among Pacific cupped oyster, Crassostrea gigas, spat. Different hypothesis including the implication of environmental factors, toxic algae and/or pathogens have been explored. Diagnostic tests indicated that OsHV-1 including a particular genotype, termed OsHV-1 μVar, was detected in most of samples and especially in moribund oysters with the highlighting of virus particles looking like herpes viruses by TEM examination. In this study, an experimental protocol to reproduce OsHV-1 infection in laboratory conditions was developed. This protocol was based on the intramuscular injection of filtered (0.22 μm tissue homogenates prepared from naturally OsHV-1 infected spat collected on French coasts during mortality outbreaks in 2008. Results of the experimental trials showed that mortalities were induced after injection. Moreover, filtered tissue homogenates induced mortalities whereas the same tissue homogenates exposed to an ultraviolet (UV treatment did not induce any mortality suggesting that oyster spat mortalities require the presence of a UV sensitive agent. Furthermore, analysis of injected oyster spat revealed the detection of high amounts of OsHV-1 DNA by real-time quantitative PCR. Finally, TEM analysis demonstrated the presence of herpes virus particles. The developed protocol allowed to maintain sources of infective virus which can be useful for the development of further studies concerning the transmission and the development of OsHV-1 infection.

  19. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  20. 76 FR 6143 - Draft Guidance for Industry on “Target Animal Safety and Effectiveness Protocol Development and...

    Science.gov (United States)

    2011-02-03

    ... this document is to provide sponsors guidance in preparation of study protocols for review by the Center for Veterinary Medicine (CVM), Office of New Animal Drug Evaluation (ONADE), to reduce the time to... Development and Submission.'' The purpose of this document is to provide sponsors guidance in preparation of...

  1. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...... type annotations or explicit type casts. We have implemented a protocol verifier SpiCa based on the algorithm, and confirmed its effectiveness....

  2. Analytical protocols for characterisation of sulphur-free lignin

    NARCIS (Netherlands)

    Gosselink, R.J.A.; Abächerli, A.; Semke, H.; Malherbe, R.; Käuper, P.; Nadif, A.; Dam, van J.E.G.

    2004-01-01

    Interlaboratory tests for chemical characterisation of sulphur-free lignins were performed by five laboratories to develop useful analytical protocols, which are lacking, and identify quality-related properties. Protocols have been established for reproducible determination of the chemical

  3. Tools for Performance Assessment of OLSR Protocol

    Directory of Open Access Journals (Sweden)

    Makoto Ikeda

    2009-01-01

    Full Text Available In this paper, we evaluate the performance of Optimized Link State Routing (OLSR protocol by experimental and simulation results. The experiments are carried out by using our implemented testbed and the simulations by using ns-2 simulator. We also designed and implemented a new interface for the ad-hoc network testbed in order to make more easier the experiments. The comparison between experimental and simulation results shows that for the same parameters set, in the simulation we did not notice any packet loss. On the other hand, in the experiments we experienced packet loss because of the environment effects and traffic interference.

  4. Development and experimental validation of a tool to determine out-of-field dose in radiotherapy

    International Nuclear Information System (INIS)

    Bessieres, I.

    2013-01-01

    Over the last two decades, many technical developments have been achieved on intensity modulated radiotherapy (IMRT) and allow a better conformation of the dose to the tumor and consequently increase the success of cancer treatments. These techniques often reduce the dose to organs at risk close to the target volume; nevertheless they increase peripheral dose levels. In this situation, the rising of the survival rate also increases the probability of secondary effects expression caused by peripheral dose deposition (second cancers for instance). Nowadays, the peripheral dose is not taken into account during the treatment planning and no reliable prediction tool exists. However it becomes crucial to consider the peripheral dose during the planning, especially for pediatric cases. Many steps of the development of an accurate and fast Monte Carlo out-of-field dose prediction tool based on the PENELOPE code have been achieved during this PhD work. To this end, we demonstrated the ability of the PENELOPE code to estimate the peripheral dose by comparing its results with reference measurements performed on two experimental configurations (metrological and pre-clinical). During this experimental work, we defined a protocol for low doses measurement with OSL dosimeters. In parallel, we highlighted the slow convergence of the code for clinical use. Consequently, we accelerated the code by implementing a new variance reduction technique called pseudo-deterministic transport which is specifically with the objective of improving calculations in areas far away from the beam. This step improved the efficiency of the peripheral doses estimation in both validation configurations (by a factor of 20) in order to reach reasonable computing times for clinical application. Optimization works must be realized in order improve the convergence of our tool and consider a final clinical use. (author) [fr

  5. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  6. Personalised Hip Therapy: development of a non-operative protocol to treat femoroacetabular impingement syndrome in the FASHIoN randomised controlled trial.

    Science.gov (United States)

    Wall, Peter Dh; Dickenson, Edward J; Robinson, David; Hughes, Ivor; Realpe, Alba; Hobson, Rachel; Griffin, Damian R; Foster, Nadine E

    2016-10-01

    Femoroacetabular impingement (FAI) syndrome is increasingly recognised as a cause of hip pain. As part of the design of a randomised controlled trial (RCT) of arthroscopic surgery for FAI syndrome, we developed a protocol for non-operative care and evaluated its feasibility. In phase one, we developed a protocol for non-operative care for FAI in the UK National Health Service (NHS), through a process of systematic review and consensus gathering. In phase two, the protocol was tested in an internal pilot RCT for protocol adherence and adverse events. The final protocol, called Personalised Hip Therapy (PHT), consists of four core components led by physiotherapists: detailed patient assessment, education and advice, help with pain relief and an exercise-based programme that is individualised, supervised and progressed over time. PHT is delivered over 12-26 weeks in 6-10 physiotherapist-patient contacts, supplemented by a home exercise programme. In the pilot RCT, 42 patients were recruited and 21 randomised to PHT. Review of treatment case report forms, completed by physiotherapists, showed that 13 patients (62%) received treatment that had closely followed the PHT protocol. 13 patients reported some muscle soreness at 6 weeks, but there were no serious adverse events. PHT provides a structure for the non-operative care of FAI and offers guidance to clinicians and researchers in an evolving area with limited evidence. PHT was deliverable within the National Health Service, is safe, and now forms the comparator to arthroscopic surgery in the UK FASHIoN trial (ISRCTN64081839). ISRCTN 09754699. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  7. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  8. Treatment of cervical cancer in HIV-seropositive women from developing countries: a protocol for a systematic review.

    Science.gov (United States)

    Mapanga, Witness; Chipato, Tsungai; Feresu, Shingairai A

    2018-01-25

    Cervical cancer has become the most common cancer affecting women in Africa. Significantly, 85% of these annual deaths occur in the developing world, with the majority being middle-aged women. Research has shown that in sub-Saharan Africa, cervical cancer trends are on the rise in the past two decades because of HIV and this has resulted in an increase in cervical cancer cases among young women. However, little or no information exists that has shown that any of the available treatment methods are more effective than others when it comes to treating cervical cancer in HIV-seropositive women. The aim of this protocol is to offer a plan on how to systematically review cervical cancer treatment methods available for HIV-seropositive women in developing countries. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P) statement was used to develop the protocol for the systematic review which will be reported in accordance with the PRISMA guidelines. A number of databases, Embase, MEDLINE, PubMed, CINAHL and Cochrane Library, will be searched for relevant studies, and citation and reference list tracking will be used to search for additional studies. Prospective and retrospective cohort studies, case-control, randomised controlled trials and cross-sectional studies that were carried out in and for the developing world will be eligible for inclusion. Peer-reviewed studies and grey literature examining cervical cancer treatment modalities in HIV-seropositive women will be included. Descriptive statistics and tables will be used to summarise results, and meta-analysis will be used where appropriate. The review findings will provide the current picture of the existing treatment methods being used to treat cervical cancer in HIV-seropositive women in developing countries. The findings might be used for the establishment of evidence-based guidelines for treatment of cervical cancer in seropositive women as well as prompt policy-makers and

  9. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  10. Erratum: Development, appraisal, validation and implementation of a consensus protocol for the assessment of cerebral amyloid angiopathy in post-mortem brain tissue.

    Science.gov (United States)

    Love, Seth; Chalmers, Katy; Ince, Paul; Esiri, Margaret; Attems, Johannes; Kalaria, Raj; Jellinger, Kurt; Yamada, Masahito; McCarron, Mark; Minett, Thais; Matthews, Fiona; Greenberg, Steven; Mann, David; Kehoe, Patrick Gavin

    2015-01-01

    In a collaboration involving 11 groups with research interests in cerebral amyloid angiopathy (CAA), we used a two-stage process to develop and in turn validate a new consensus protocol and scoring scheme for the assessment of CAA and associated vasculopathic abnormalities in post-mortem brain tissue. Stage one used an iterative Delphi-style survey to develop the consensus protocol. The resultant scoring scheme was tested on a series of digital images and paraffin sections that were circulated blind to a number of scorers. The scoring scheme and choice of staining methods were refined by open-forum discussion. The agreed protocol scored parenchymal and meningeal CAA on a 0-3 scale, capillary CAA as present/absent and vasculopathy on 0-2 scale, in the 4 cortical lobes that were scored separately. A further assessment involving three centres was then undertaken. Neuropathologists in three centres (Bristol, Oxford and Sheffield) independently scored sections from 75 cases (25 from each centre) and high inter-rater reliability was demonstrated. Stage two used the results of the three-centre assessment to validate the protocol by investigating previously described associations between APOE genotype (previously determined), and both CAA and vasculopathy. Association of capillary CAA with or without arteriolar CAA with APOE ε4 was confirmed. However APOE ε2 was also found to be a strong risk factor for the development of CAA, not only in AD but also in elderly non-demented controls. Further validation of this protocol and scoring scheme is encouraged, to aid its wider adoption to facilitate collaborative and replication studies of CAA.[This corrects the article on p. 19 in vol. 3, PMID: 24754000.].

  11. A shorter and more specific oral sensitization-based experimental model of food allergy in mice.

    Science.gov (United States)

    Bailón, Elvira; Cueto-Sola, Margarita; Utrilla, Pilar; Rodríguez-Ruiz, Judith; Garrido-Mesa, Natividad; Zarzuelo, Antonio; Xaus, Jordi; Gálvez, Julio; Comalada, Mònica

    2012-07-31

    Cow's milk protein allergy (CMPA) is one of the most prevalent human food-borne allergies, particularly in children. Experimental animal models have become critical tools with which to perform research on new therapeutic approaches and on the molecular mechanisms involved. However, oral food allergen sensitization in mice requires several weeks and is usually associated with unspecific immune responses. To overcome these inconveniences, we have developed a new food allergy model that takes only two weeks while retaining the main characters of allergic response to food antigens. The new model is characterized by oral sensitization of weaned Balb/c mice with 5 doses of purified cow's milk protein (CMP) plus cholera toxin (CT) for only two weeks and posterior challenge with an intraperitoneal administration of the allergen at the end of the sensitization period. In parallel, we studied a conventional protocol that lasts for seven weeks, and also the non-specific effects exerted by CT in both protocols. The shorter protocol achieves a similar clinical score as the original food allergy model without macroscopically affecting gut morphology or physiology. Moreover, the shorter protocol caused an increased IL-4 production and a more selective antigen-specific IgG1 response. Finally, the extended CT administration during the sensitization period of the conventional protocol is responsible for the exacerbated immune response observed in that model. Therefore, the new model presented here allows a reduction not only in experimental time but also in the number of animals required per experiment while maintaining the features of conventional allergy models. We propose that the new protocol reported will contribute to advancing allergy research. Copyright © 2012 Elsevier B.V. All rights reserved.

  12. Development of a virtual private database for a multi-institutional internet-based radiation oncology database overcoming differences in protocols

    International Nuclear Information System (INIS)

    Harauchi, Hajime; Kondo, Takashi; Kumasaki, Yu

    2002-01-01

    A multi-institutional Radiation Oncology Greater Area Database (ROGAD) was started in 1991 under the direction of the Japanese Society for Therapeutic Radiology and Oncology (JASTRO). Use of ROGAD was intended to allow reflection of results of data analysis into treatment strategy and treatment planning for individual cases, to provide quality assurance, to maximize the efficacy of radiotherapy, to allow assessment of new technologies or new modalities, and to optimize medical decision making. ROGAD collected 13,448 radiotherapy treatment cases from 325 facilities during the period from 1992 to 2001. In 2000, questionnaires were sent to 725 radiotherapy facilities throughout Japan, to further obtain the situation of the radiation oncology database. Workers at 179 facilities replied that ''the protocol of my facility is different from ROGAD protocol and I must send data according to the ROGAD protocol''. So, we developed the Virtual Private Database System (VPDS) which is operated as if an oncologist had a database solely owned by his own facility, in spite of actually operating ROGAD. VPDS realizes integration of different plural databases, regardless of differences in entry methods, protocols, definitions and interpretations of contents of clinical data elements between facilities. (author)

  13. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  14. GossipKit: A Framework of Gossip Protocol Family

    OpenAIRE

    Lin, Shen; Taiani, Francois; Blair, Gordon S.

    2007-01-01

    A large number of gossip protocols have been developed in the last few years to address a wide range of functionalities. So far, however, very few software frameworks have been proposed to ease the development and deployment of these gossip protocols. To address this issue, this paper presents GossipKit, an event-driven framework that provides a generic and extensible architecture for the development of (re)configurable gossip-oriented middleware. GossipKit is based on a generic interaction m...

  15. Developing a protocol for managing the biophysical condition of a ...

    African Journals Online (AJOL)

    Their function will focus on the overall management of water resources on a ... for the integrated management of the biophysical component of a catchment, with ... and implement a protocol which will combine and integrate the knowledge of ...

  16. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  17. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol.

    Science.gov (United States)

    Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-06-27

    Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.

  18. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  19. Experimental high-speed network

    Science.gov (United States)

    McNeill, Kevin M.; Klein, William P.; Vercillo, Richard; Alsafadi, Yasser H.; Parra, Miguel V.; Dallas, William J.

    1993-09-01

    Many existing local area networking protocols currently applied in medical imaging were originally designed for relatively low-speed, low-volume networking. These protocols utilize small packet sizes appropriate for text based communication. Local area networks of this type typically provide raw bandwidth under 125 MHz. These older network technologies are not optimized for the low delay, high data traffic environment of a totally digital radiology department. Some current implementations use point-to-point links when greater bandwidth is required. However, the use of point-to-point communications for a total digital radiology department network presents many disadvantages. This paper describes work on an experimental multi-access local area network called XFT. The work includes the protocol specification, and the design and implementation of network interface hardware and software. The protocol specifies the Physical and Data Link layers (OSI layers 1 & 2) for a fiber-optic based token ring providing a raw bandwidth of 500 MHz. The protocol design and implementation of the XFT interface hardware includes many features to optimize image transfer and provide flexibility for additional future enhancements which include: a modular hardware design supporting easy portability to a variety of host system buses, a versatile message buffer design providing 16 MB of memory, and the capability to extend the raw bandwidth of the network to 3.0 GHz.

  20. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  1. Protocol for Short- and Longer-term Spatial Learning and Memory in Mice

    Directory of Open Access Journals (Sweden)

    Emily F. Willis

    2017-10-01

    Full Text Available Studies on the role of the hippocampus in higher cognitive functions such as spatial learning and memory in rodents are reliant upon robust and objective behavioral tests. This protocol describes one such test—the active place avoidance (APA task. This behavioral task involves the mouse continuously integrating visual cues to orientate itself within a rotating arena in order to actively avoid a shock zone, the location of which remains constant relative to the room. This protocol details the step-by-step procedures for a novel paradigm of the hippocampal-dependent APA task, measuring acquisition of spatial learning during a single 20-min trial (i.e., short-term memory, with spatial memory encoding and retrieval (i.e., long-term memory assessed by trials conducted over consecutive days. Using the APA task, cognitive flexibility can be assessed using the reversal learning paradigm, as this increases the cognitive load required for efficient performance in the task. In addition to a detailed experimental protocol, this paper also describes the range of its possible applications, the expected key results, as well as the analytical methods to assess the data, and the pitfalls/troubleshooting measures. The protocol described herein is highly robust and produces replicable results, thus presenting an important paradigm that enables the assessment of subtle short-term changes in spatial learning and memory, such as those observed for many experimental interventions.

  2. Status report on dissolution model development

    International Nuclear Information System (INIS)

    Jackson, D.D.

    1983-07-01

    The computer program PROTOCOL models the dissolution reactions of chemical species in water. It is being developed particularly to study the dissolution of proposed nuclear waste forms and related phases. Experimentally derived leaching rate functions are coupled to thermochemical equilibrium calculations and water flow rates. The program has been developed over a period of years. This report describes improvements that have been done in the past year

  3. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  4. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  5. Experimental quantum tossing of a single coin

    International Nuclear Information System (INIS)

    Nguyen, A T; Frison, J; Massar, S; Huy, K Phan

    2008-01-01

    The cryptographic protocol of coin tossing consists of two parties, Alice and Bob, who do not trust each other, but want to generate a random bit. If the parties use a classical communication channel and have unlimited computational resources, one of them can always cheat perfectly. If the parties use a quantum communication channel, there exist protocols such that neither party can cheat perfectly, although they may be able to significantly bias the coin. Here, we analyze in detail how the performance of a quantum coin tossing experiment should be compared to classical protocols, taking into account the inevitable experimental imperfections. We then report an all-optical fiber experiment in which a single coin is tossed whose randomness is higher than achievable by any classical protocol and present some easily realizable cheating strategies by Alice and Bob

  6. Continuous-variable protocol for oblivious transfer in the noisy-storage model

    DEFF Research Database (Denmark)

    Furrer, Fabian; Gehring, Tobias; Schaffner, Christian

    2018-01-01

    for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we...... derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced...

  7. Experimental animal studies of radon and cigarette smoke

    International Nuclear Information System (INIS)

    Cross, F.T.; Dagle, G.E.; Gies, R.A.; Smith, L.G.; Buschbom, R.L.

    1992-01-01

    Cigarette-smoking is a dominant cause of lung cancer and confounds risk assessment of exposure to radon decay products. Evidence in humans on the interaction between cigarette-smoking and exposure to radon decay products, although limited, indicates a possible synergy. Experimental animal data, in addition to showing synergy, also show a decrease or no change in risk with added cigarette-smoke exposures. This article reviews previous animal data developed at Compagnie Generale des Matieres Nucleaires and Pacific Northwest Laboratory (PNL) on mixed exposures to radon and cigarette smoke, and highlights new initiation-promotion-initiation (IPI) studies at PNL that were designed within the framework of a two-mutation carcinogenesis model. Also presented are the PNL exposure system, experimental protocols, dosimetry, and biological data observed to date in IPI animals

  8. Smart grid development and households in experimental projects

    DEFF Research Database (Denmark)

    Hansen, Meiken

    to the electricity grids and call for the development of smart grids. The Danish Smart Grid Strategy states that ‘flexible electricity consumption’ is the main purpose of smart grids in Denmark, envisioning that future consumers will have flexible consumption of electricity. Thus, they are expected to respond...... to the supply side and consume energy when it is available. The goal of this thesis is to investigate how household consumers are integrated in smart grid development activities. More specifically, it focuses on household consumers, as they are represented in experimental projects in the smart grid area...... been little research on the area in Danish smart grid experimental projects. Overall, the consumers are expected, to some extent, to provide flexibility by changing their energy-consuming practices because of economic incentives by means of manual or automated control of devices. Moreover, the Danish...

  9. A correctness proof of the bakery protocol in $ mu $CRL

    NARCIS (Netherlands)

    J.F. Groote (Jan Friso); H.P. Korver

    1994-01-01

    textabstractA specification of a bakery protocol is given in $mu$CRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for $mu$CRL. The proof primarily consists of algebraic manipulations based on

  10. The effects of different irrigation protocols on removing calcium ...

    African Journals Online (AJOL)

    Objective: The aim of this study was to evaluate the efficiencies of different irrigation protocols and solutions in the removal of calcium hydroxide (Ca[OH]2). Materials and Methods: Sixty-eight maxillary incisors were used. Root canals were prepared and filled with Ca(OH)2. Two control (n = 4) and six experimental groups (n ...

  11. Using the intervention mapping protocol to develop a maintenance programme for the SLIMMER diabetes prevention intervention.

    Science.gov (United States)

    Elsman, Ellen B M; Leerlooijer, Joanne N; Ter Beek, Josien; Duijzer, Geerke; Jansen, Sophia C; Hiddink, Gerrit J; Feskens, Edith J M; Haveman-Nies, Annemien

    2014-10-27

    Although lifestyle interventions have shown to be effective in reducing the risk for type 2 diabetes mellitus, maintenance of achieved results is difficult, as participants often experience relapse after the intervention has ended. This paper describes the systematic development of a maintenance programme for the extensive SLIMMER intervention, an existing diabetes prevention intervention for high-risk individuals, implemented in a real-life setting in the Netherlands. The maintenance programme was developed using the Intervention Mapping protocol. Programme development was informed by a literature study supplemented by various focus group discussions and feedback from implementers of the extensive SLIMMER intervention. The maintenance programme was designed to sustain a healthy diet and physical activity pattern by targeting knowledge, attitudes, subjective norms and perceived behavioural control of the SLIMMER participants. Practical applications were clustered into nine programme components, including sports clinics at local sports clubs, a concluding meeting with the physiotherapist and dietician, and a return session with the physiotherapist, dietician and physical activity group. Manuals were developed for the implementers and included a detailed time table and step-by-step instructions on how to implement the maintenance programme. The Intervention Mapping protocol provided a useful framework to systematically plan a maintenance programme for the extensive SLIMMER intervention. The study showed that planning a maintenance programme can build on existing implementation structures of the extensive programme. Future research is needed to determine to what extent the maintenance programme contributes to sustained effects in participants of lifestyle interventions.

  12. Using research literature to develop a perceptual retraining treatment protocol.

    Science.gov (United States)

    Neistadt, M E

    1994-01-01

    Treatment protocols derived from research literature can help therapists provide more rigorous treatment and more systematic assessment of client progress. This study applied research findings about the influence of task, subject, and feedback parameters on adult performance with block designs to an occupational therapy treatment protocol for parquetry block assembly--an activity occupational therapists use to remediate constructional deficits. Task parameter research suggests that parquetry tasks can be graded according to the features of the design cards, with cards having all block boundaries drawn in being easier than those with some block boundaries omitted. Subject parameter findings suggest that clients' lesions and initial constructional competence can influence their approaches to parquetry tasks. Feedback parameter research suggests that a combination of perceptual and planning cues is most effective for parquetry tasks. Methods to help clients transfer constructional skills from parquetry to functional tasks are also discussed.

  13. Toward a Cooperative Experimental System Development Approach

    DEFF Research Database (Denmark)

    Grønbæk, Kaj; Kyng, Morten; Mogensen, Preben Holst

    1997-01-01

    This chapter represents a step towards the establishment of a new system development approach, called Cooperative Experimental System Development (CESD). CESD seeks to overcome a number of limitations in existing approaches: specification oriented methods usually assume that system design can...... be based solely on observation and detached reflection; prototyping methods often have a narrow focus on the technical construction of various kinds of prototypes; Participatory Design techniques—including the Scandinavian Cooperative Design (CD) approaches—seldom go beyond the early analysis....../design activities of development projects. In contrast, the CESD approach is characterized by its focus on: active user involvement throughout the entire development process; prototyping experiments closely coupled to work-situations and use-scenarios; transforming results from early cooperative analysis...

  14. A Correctness Proof of the Bakery Protocol in μCRL

    NARCIS (Netherlands)

    Groote, J.F.; Korver, H.

    1992-01-01

    A specification of the bakery protocol is given in μCRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for μCRL. The proof primarily consists of algebraic manipulations based on specifications of

  15. RSComPro: An Open Communication Protocol for Remote Sensing Systems

    DEFF Research Database (Denmark)

    Vasiljevic, Nikola; Trujillo, Juan-José

    The remote sensing protocol (RSComPro) is a communication protocol, which has been developed for controlling multiple remote sensing systems simultaneously through a UDP/IP and TPC/IP network. This protocol is meant to be open to the remote sensing community. The scope is the implementation of so...

  16. Dynamic-Threshold-Limited Timed-Token (DTLTT) Protocol | Kalu ...

    African Journals Online (AJOL)

    An improved version of the Static-Threshold-Limited On-Demand Guaranteed Service Timed-Token (STOGSTT) Media Access Control (MAC) protocol for channel capacity allocation to the asynchronous trac in Multiservice Local Area Network (MLANs) was developed and analyzed. TLODGSTT protocol uses static value of ...

  17. Cost-optimization of the IPv4 zeroconf protocol

    NARCIS (Netherlands)

    Bohnenkamp, H.C.; van der Stok, Peter; Hermanns, H.; Vaandrager, Frits

    2003-01-01

    This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfiguration of IP network interfaces. We develop a simple stochastic cost model of the protocol, where reliability is measured

  18. Photoacoustic imaging to assess pixel-based sO2 distributions in experimental prostate tumors

    Science.gov (United States)

    Bendinger, Alina L.; Glowa, Christin; Peter, Jörg; Karger, Christian P.

    2018-03-01

    A protocol for photoacoustic imaging (PAI) has been developed to assess pixel-based oxygen saturation (sO2) distributions of experimental tumor models. The protocol was applied to evaluate the dependence of PAI results on measurement settings, reproducibility of PAI, and for the characterization of the oxygenation status of experimental prostate tumor sublines (Dunning R3327-H, -HI, -AT1) implanted subcutaneously in male Copenhagen rats. The three-dimensional (3-D) PA data employing two wavelengths were used to estimate sO2 distributions. If the PA signal was sufficiently strong, the distributions were independent from signal gain, threshold, and positioning of animals. Reproducibility of sO2 distributions with respect to shape and median values was demonstrated over several days. The three tumor sublines were characterized by the shapes of their sO2 distributions and their temporal response after external changes of the oxygen supply (100% O2 or air breathing and clamping of tumor-supplying artery). The established protocol showed to be suitable for detecting temporal changes in tumor oxygenation as well as differences in oxygenation between tumor sublines. PA results were in accordance with histology for hypoxia, perfusion, and vasculature. The presented protocol for the assessment of pixel-based sO2 distributions provides more detailed information as compared to conventional region-of-interest-based analysis of PAI, especially with respect to the detection of temporal changes and tumor heterogeneity.

  19. Photoacoustic imaging to assess pixel-based sO2 distributions in experimental prostate tumors.

    Science.gov (United States)

    Bendinger, Alina L; Glowa, Christin; Peter, Jörg; Karger, Christian P

    2018-03-01

    A protocol for photoacoustic imaging (PAI) has been developed to assess pixel-based oxygen saturation (sO2) distributions of experimental tumor models. The protocol was applied to evaluate the dependence of PAI results on measurement settings, reproducibility of PAI, and for the characterization of the oxygenation status of experimental prostate tumor sublines (Dunning R3327-H, -HI, -AT1) implanted subcutaneously in male Copenhagen rats. The three-dimensional (3-D) PA data employing two wavelengths were used to estimate sO2 distributions. If the PA signal was sufficiently strong, the distributions were independent from signal gain, threshold, and positioning of animals. Reproducibility of sO2 distributions with respect to shape and median values was demonstrated over several days. The three tumor sublines were characterized by the shapes of their sO2 distributions and their temporal response after external changes of the oxygen supply (100% O2 or air breathing and clamping of tumor-supplying artery). The established protocol showed to be suitable for detecting temporal changes in tumor oxygenation as well as differences in oxygenation between tumor sublines. PA results were in accordance with histology for hypoxia, perfusion, and vasculature. The presented protocol for the assessment of pixel-based sO2 distributions provides more detailed information as compared to conventional region-of-interest-based analysis of PAI, especially with respect to the detection of temporal changes and tumor heterogeneity. (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE).

  20. Experimental and computational development of a natural breast phantom for dosimetry studies

    International Nuclear Information System (INIS)

    Nogueira, Luciana B.; Campos, Tarcisio P.R.

    2013-01-01

    This paper describes the experimental and computational development of a natural breast phantom, anthropomorphic and anthropometric for studies in dosimetry of brachytherapy and teletherapy of breast. The natural breast phantom developed corresponding to fibroadipose breasts of women aged 30 to 50 years, presenting radiographically medium density. The experimental breast phantom was constituted of three tissue-equivalents (TE's): glandular TE, adipose TE and skin TE. These TE's were developed according to chemical composition of human breast and present radiological response to exposure. Completed the construction of experimental breast phantom this was mounted on a thorax phantom previously developed by the research group NRI/UFMG. Then the computational breast phantom was constructed by performing a computed tomography (CT) by axial slices of the chest phantom. Through the images generated by CT a computational model of voxels of the thorax phantom was developed by SISCODES computational program, being the computational breast phantom represented by the same TE's of the experimental breast phantom. The images generated by CT allowed evaluating the radiological equivalence of the tissues. The breast phantom is being used in studies of experimental dosimetry both in brachytherapy as in teletherapy of breast. Dosimetry studies by MCNP-5 code using the computational model of the phantom breast are in progress. (author)

  1. Histology of Testicular Biopsies Obtained for Experimental Fertility Preservation Protocol in Boys with Cancer.

    Science.gov (United States)

    Pietzak, Eugene J; Tasian, Gregory E; Tasian, Sarah K; Brinster, Ralph L; Carlson, Claire; Ginsberg, Jill P; Kolon, Thomas F

    2015-11-01

    Cryopreservation of testicular tissue with subsequent reimplantation after therapy has the potential to preserve fertility for prepubertal boys with cancer. We present the histology and feasibility of testicular tissue procurement for this novel approach. We performed a prospective cohort study of boys at significant risk for treatment associated gonadotoxicity who were eligible for an experimental research protocol between 2008 and 2011. Open testicular biopsy was performed while the patients were anesthetized for another treatment related procedure. Half of the specimen was reserved for cryopreservation, while the other half was used for research purposes. Semithin sections of the biopsy specimens were evaluated for histological features and compared to age adjusted reference values. A total of 34 boys underwent biopsy between March 2008 and October 2011. Of the patients 29 had solid tumors and 5 underwent hematopoietic stem cell transplantation for benign disease. A total of 27 patients had adequate tissue for histological analysis. Median patient age was 8.7 years (IQR 2.2 to 11.5). All children had either normal (81.5% of patients) or increased (18.5%) numbers of germ cells per tubule for their age. However, 5 of 26 patients (19%) older than 6 months had no evidence of adult dark spermatogonia and 9 of 16 (56%) older than 6 years had no evidence of primary spermatocytes on biopsy, which would be expected based on age norms. These findings are suggestive of abnormal germ cell maturation. The preliminary histological findings of abnormal spermatogenesis maturation in the testes of prepubertal boys with cancer warrants further investigation. Copyright © 2015 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  2. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  3. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  4. Developing the Fourth Evaluation Dimension: A Protocol for Evaluation of Video From the Patient's Perspective During Major Incident Exercises.

    Science.gov (United States)

    Haverkort, J J Mark; Leenen, Luke P H

    2017-10-01

    Presently used evaluation techniques rely on 3 traditional dimensions: reports from observers, registration system data, and observational cameras. Some of these techniques are observer-dependent and are not reproducible for a second review. This proof-of-concept study aimed to test the feasibility of extending evaluation to a fourth dimension, the patient's perspective. Footage was obtained during a large, full-scale hospital trauma drill. Two mock victims were equipped with point-of-view cameras filming from the patient's head. Based on the Major Incident Hospital's first experience during the drill, a protocol was developed for a prospective, standardized method to evaluate a hospital's major incident response from the patient's perspective. The protocol was then tested in a second drill for its feasibility. New insights were gained after review of the footage. The traditional observer missed some of the evaluation points, which were seen on the point-of-view cameras. The information gained from the patient's perspective proved to be implementable into the designed protocol. Use of point-of-view camera recordings from a mock patient's perspective is a valuable addition to traditional evaluation of trauma drills and trauma care. Protocols should be designed to optimize and objectify judgement of such footage. (Disaster Med Public Health Preparedness. 2017;11:594-599).

  5. Influence of experimental parameters inherent to optical fibers on Quantum Key Distribution, the protocol BB84

    Directory of Open Access Journals (Sweden)

    L. Bouchoucha

    2018-03-01

    Full Text Available In this work, we represent the principle of quantum cryptography (QC that is based on fundamental laws of quantum physics. QC or Quantum Key Distribution (QKD uses various protocols to exchange a secret key between two communicating parties. This research paper focuses and examines the quantum key distribution by using the protocol BB84 in the case of encoding on the single-photon polarization and shows the influence of optical components parameters on the quantum key distribution. We also introduce Quantum Bit Error Rate (QBER to better interpret our results and show its relationship with the intrusion of the eavesdropper called Eve on the optical channel to exploit these vulnerabilities.

  6. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  7. Cochrane Qualitative and Implementation Methods Group guidance series-paper 2: methods for question formulation, searching, and protocol development for qualitative evidence synthesis.

    Science.gov (United States)

    Harris, Janet L; Booth, Andrew; Cargo, Margaret; Hannes, Karin; Harden, Angela; Flemming, Kate; Garside, Ruth; Pantoja, Tomas; Thomas, James; Noyes, Jane

    2018-05-01

    This paper updates previous Cochrane guidance on question formulation, searching, and protocol development, reflecting recent developments in methods for conducting qualitative evidence syntheses to inform Cochrane intervention reviews. Examples are used to illustrate how decisions about boundaries for a review are formed via an iterative process of constructing lines of inquiry and mapping the available information to ascertain whether evidence exists to answer questions related to effectiveness, implementation, feasibility, appropriateness, economic evidence, and equity. The process of question formulation allows reviewers to situate the topic in relation to how it informs and explains effectiveness, using the criterion of meaningfulness, appropriateness, feasibility, and implementation. Questions related to complex questions and interventions can be structured by drawing on an increasingly wide range of question frameworks. Logic models and theoretical frameworks are useful tools for conceptually mapping the literature to illustrate the complexity of the phenomenon of interest. Furthermore, protocol development may require iterative question formulation and searching. Consequently, the final protocol may function as a guide rather than a prescriptive route map, particularly in qualitative reviews that ask more exploratory and open-ended questions. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  9. A Quasi-Experimental, Before-After Trial Examining the Impact of an Emergency Department Mechanical Ventilator Protocol on Clinical Outcomes and Lung-Protective Ventilation in Acute Respiratory Distress Syndrome.

    Science.gov (United States)

    Fuller, Brian M; Ferguson, Ian T; Mohr, Nicholas M; Drewry, Anne M; Palmer, Christopher; Wessman, Brian T; Ablordeppey, Enyo; Keeperman, Jacob; Stephens, Robert J; Briscoe, Cristopher C; Kolomiets, Angelina A; Hotchkiss, Richard S; Kollef, Marin H

    2017-04-01

    To evaluate the impact of an emergency department mechanical ventilation protocol on clinical outcomes and adherence to lung-protective ventilation in patients with acute respiratory distress syndrome. Quasi-experimental, before-after trial. Emergency department and ICUs of an academic center. Mechanically ventilated emergency department patients experiencing acute respiratory distress syndrome while in the emergency department or after admission to the ICU. An emergency department ventilator protocol which targeted variables in need of quality improvement, as identified by prior work: 1) lung-protective tidal volume, 2) appropriate setting of positive end-expiratory pressure, 3) oxygen weaning, and 4) head-of-bed elevation. A total of 229 patients (186 preintervention group, 43 intervention group) were studied. In the emergency department, the intervention was associated with significant changes (p protective ventilation from 11.1% to 61.5%, p value of less than 0.01. The intervention was associated with a reduction in mortality from 54.8% to 39.5% (odds ratio, 0.38; 95% CI, 0.17-0.83; p = 0.02) and a 3.9 day increase in ventilator-free days, p value equals to 0.01. This before-after study of mechanically ventilated patients with acute respiratory distress syndrome demonstrates that implementing a mechanical ventilator protocol in the emergency department is feasible and associated with improved clinical outcomes.

  10. Methods for culturing retinal pigment epithelial cells: a review of current protocols and future recommendations

    Directory of Open Access Journals (Sweden)

    Aaron H Fronk

    2016-07-01

    Full Text Available The retinal pigment epithelium is an important part of the vertebrate eye, particularly in studying the causes and possible treatment of age-related macular degeneration. The retinal pigment epithelium is difficult to access in vivo due to its location at the back of the eye, making experimentation with age-related macular degeneration treatments problematic. An alternative to in vivo experimentation is cultivating the retinal pigment epithelium in vitro, a practice that has been going on since the 1970s, providing a wide range of retinal pigment epithelial culture protocols, each producing cells and tissue of varying degrees of similarity to natural retinal pigment epithelium. The purpose of this review is to provide researchers with a ready list of retinal pigment epithelial protocols, their effects on cultured tissue, and their specific possible applications. Protocols using human and animal retinal pigment epithelium cells, derived from tissue or cell lines, are discussed, and recommendations for future researchers included.

  11. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  12. Development of experimental alloxan model of diabetes mellitus

    Directory of Open Access Journals (Sweden)

    V.V. Semenko

    2017-05-01

    Full Text Available Background. One of the main causes that lead to the disability of diabetic patients is diabetic retinopathy (DR. The relevance of the problem of DR necessitates the development of optimal experimental models on experimental animals to find effective ways of correcting this pathology. The purpose of our work was to develop an experimental alloxan model of type 1 diabetes mellitus (DM for the study of DR, which would not result in the lethal outcome of experimental animals under the action of alloxan; histological examination of changes in the tissues of the eyeball in the reproduction of the DM model for the selection of new effective methods for the metabolic treatment of DR in the early stages. Materials and methods. The experiment was carried out on white outbred Wistar rats weighing 180–200 g. The first group consisted of 20 animals that were not subjected to any influence, served as a control; second group — 30 animals, in which DM was modeled by administration of alloxan and fructose. Results. When modeling DR, vessel changes in the form of wall fibrosis, edema of the endothelium and vasospasm were found. There was also a decrease in the amount of pigment granules, dystrophic changes in the cells of the ganglionic layer and a layer of retinal rods and cones, which coincides with the descriptions of damage to the coats of the eyeball in patients with DM. Conclusions. In our studies, we have calculated the optimal dose of alloxan administration, which does not lead to the death of rats (the lethality of rats was absent and is an effective model not only of DM in general, but also of DR.

  13. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    OpenAIRE

    RIBEIRO, CHRISTIE GRAF; MOREIRA, ANA TEREZA RAMOS; PINTO, JOSÉ SIMÃO DE PAULA; MALAFAIA, OSVALDO

    2016-01-01

    ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). Methods: this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) compute...

  14. Learning from complementary ways of developing experimental competences

    Directory of Open Access Journals (Sweden)

    Natércia Maria LIMA

    2017-04-01

    Full Text Available Engineering education has solid needs of experimental competences development. Nowadays theses competences can be developed not only in traditional laboratories (hands on but also through the use of computer simulations and remote labs. The use of diversified methods in education and the exploration of new resources and techniques in classroom may allow teachers to motivate more students, and capture their attention due to their different learning styles.The main objective of this thesis project is to better understand the effects on the students’ learning outcomes in different contexts, when subject to similar design approaches using an enquiry-based teaching and learning methodology based on simultaneous use of experimental resources (hands on, simulation and remote labs together with calculus, in class and assessment. To accomplish this goal, several insights must be taken into consideration, including the teachers’ mediation in each case and the didactical implementations adaptations, but also external factors, such as socio-cultural and/or political factors.

  15. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  16. RIAR experimental base development concept 1. Multi-purpose pyrochemical complex for experimental justification of innovative closed fuel cycle technologies

    Energy Technology Data Exchange (ETDEWEB)

    Bychkov, A.V.; Kormilitsyn, M.V. [Research Institute of Atomic Reactors, Dimitrovgrad-10, Ulyanovsk region, 433510 (Russian Federation)

    2009-06-15

    The principles of closed FC arrangement on the basis of non-aqueous methods allow the development of production addressing two tasks simultaneously: production of fresh fuel and reprocessing of irradiated fuel, that makes it possible to achieve the industrial level of implementation of closed FC of fast reactors of new generation in a series variant of standardized process modules on the basis of innovative pyrochemical high-effective compact technologies. For the purpose of experimental justification of innovative closed FC technologies at the RIAR site, the existing experimental base is being updated and a multi-purpose pyrochemical complex is developed: - Experimental complex of pyrochemical molten salt facilities to reprocess all types of spent fuel (MOX, nitride, metallic, IMF) of fast reactors of new generation (BN-800, MBIR, BREST). - Experimental complex of facilities to master a gas-fluoride technology of reprocessing intractable fuel, research reactors fuel and thermal SNF. - Transition of the existing facility of pyro-electrochemical production of MOX fuel into the mode of reprocessing of the BN-800 MOX SNF. - Renovation of the facilities for production of fuel elements from experimental, re-fabricated, innovative and high-active fuel - a complex of heavy and glove boxes - to produce experimental fuel elements and targets with MAs on the basis of oxides (vibro and pellets), mixed nitrides, metal alloys and inert matrices in heavy boxes. - Upgrading of the complex for mastering and demonstration of the processes for radioactive waste management and spent fuel pyrochemical reprocessing. The report covers main concept and design solutions, plans and schedule of the program for development of pyrochemical complex for experimental justification of innovative closed FC technologies. (authors)

  17. Scientific Knowledge and Technology, Animal Experimentation, and Pharmaceutical Development.

    Science.gov (United States)

    Kinter, Lewis B; DeGeorge, Joseph J

    2016-12-01

    Human discovery of pharmacologically active substances is arguably the oldest of the biomedical sciences with origins >3500 years ago. Since ancient times, four major transformations have dramatically impacted pharmaceutical development, each driven by advances in scientific knowledge, technology, and/or regulation: (1) anesthesia, analgesia, and antisepsis; (2) medicinal chemistry; (3) regulatory toxicology; and (4) targeted drug discovery. Animal experimentation in pharmaceutical development is a modern phenomenon dating from the 20th century and enabling several of the four transformations. While each transformation resulted in more effective and/or safer pharmaceuticals, overall attrition, cycle time, cost, numbers of animals used, and low probability of success for new products remain concerns, and pharmaceutical development remains a very high risk business proposition. In this manuscript we review pharmaceutical development since ancient times, describe its coevolution with animal experimentation, and attempt to predict the characteristics of future transformations. © The Author 2016. Published by Oxford University Press on behalf of the Institute for Laboratory Animal Research. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  18. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  19. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  20. Fault-Tolerant Consensus of Multi-Agent System With Distributed Adaptive Protocol.

    Science.gov (United States)

    Chen, Shun; Ho, Daniel W C; Li, Lulu; Liu, Ming

    2015-10-01

    In this paper, fault-tolerant consensus in multi-agent system using distributed adaptive protocol is investigated. Firstly, distributed adaptive online updating strategies for some parameters are proposed based on local information of the network structure. Then, under the online updating parameters, a distributed adaptive protocol is developed to compensate the fault effects and the uncertainty effects in the leaderless multi-agent system. Based on the local state information of neighboring agents, a distributed updating protocol gain is developed which leads to a fully distributed continuous adaptive fault-tolerant consensus protocol design for the leaderless multi-agent system. Furthermore, a distributed fault-tolerant leader-follower consensus protocol for multi-agent system is constructed by the proposed adaptive method. Finally, a simulation example is given to illustrate the effectiveness of the theoretical analysis.

  1. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  2. Experimental aspect of solid-state nuclear magnetic resonance studies of biomaterials such as bones.

    Science.gov (United States)

    Singh, Chandan; Rai, Ratan Kumar; Sinha, Neeraj

    2013-01-01

    Solid-state nuclear magnetic resonance (SSNMR) spectroscopy is increasingly becoming a popular technique to probe micro-structural details of biomaterial such as bone with pico-meter resolution. Due to high-resolution structural details probed by SSNMR methods, handling of bone samples and experimental protocol are very crucial aspects of study. We present here first report of the effect of various experimental protocols and handling methods of bone samples on measured SSNMR parameters. Various popular SSNMR experiments were performed on intact cortical bone sample collected from fresh animal, immediately after removal from animal systems, and results were compared with bone samples preserved in different conditions. We find that the best experimental conditions for SSNMR parameters of bones correspond to preservation at -20 °C and in 70% ethanol solution. Various other SSNMR parameters were compared corresponding to different experimental conditions. Our study has helped in finding best experimental protocol for SSNMR studies of bone. This study will be of further help in the application of SSNMR studies on large bone disease related animal model systems for statistically significant results. © 2013 Elsevier Inc. All rights reserved.

  3. Nonpainful wide-area compression inhibits experimental pain.

    Science.gov (United States)

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-09-01

    Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM.

  4. Techniques and Protocols for Dispersing Nanoparticle Powders in Aqueous Media-Is there a Rationale for Harmonization?

    Science.gov (United States)

    Hartmann, Nanna B; Jensen, Keld Alstrup; Baun, Anders; Rasmussen, Kirsten; Rauscher, Hubert; Tantra, Ratna; Cupi, Denisa; Gilliland, Douglas; Pianella, Francesca; Riego Sintes, Juan M

    2015-01-01

    Selecting appropriate ways of bringing engineered nanoparticles (ENP) into aqueous dispersion is a main obstacle for testing, and thus for understanding and evaluating, their potential adverse effects to the environment and human health. Using different methods to prepare (stock) dispersions of the same ENP may be a source of variation in the toxicity measured. Harmonization and standardization of dispersion methods applied in mammalian and ecotoxicity testing are needed to ensure a comparable data quality and to minimize test artifacts produced by modifications of ENP during the dispersion preparation process. Such harmonization and standardization will also enhance comparability among tests, labs, and studies on different types of ENP. The scope of this review was to critically discuss the essential parameters in dispersion protocols for ENP. The parameters are identified from individual scientific studies and from consensus reached in larger scale research projects and international organizations. A step-wise approach is proposed to develop tailored dispersion protocols for ecotoxicological and mammalian toxicological testing of ENP. The recommendations of this analysis may serve as a guide to researchers, companies, and regulators when selecting, developing, and evaluating the appropriateness of dispersion methods applied in mammalian and ecotoxicity testing. However, additional experimentation is needed to further document the protocol parameters and investigate to what extent different stock dispersion methods affect ecotoxicological and mammalian toxicological responses of ENP.

  5. In Vitro experimental model of trained innate immunity in human primary monocytes

    DEFF Research Database (Denmark)

    Bekkering, S.; Blok, B. A.; Joosten, Leo A B

    2016-01-01

    experimental protocol of monocyte training using three of the most commonly used training stimuli from the literature: β-glucan, the bacillus Calmette-Guérin (BCG) vaccine, and oxidized low-density lipoprotein (ox-LDL). We investigated and optimized a protocol of monocyte trained immunity induced by an initial....... All Rights Reserved....

  6. Developing an optimum protocol for thermoluminescence dosimetry with gr-200 chips using Taguchi method

    International Nuclear Information System (INIS)

    Sadeghi, Maryam; Faghihi, Reza; Sina, Sedigheh

    2017-01-01

    Thermoluminescence dosimetry (TLD) is a powerful technique with wide applications in personal, environmental and clinical dosimetry. The optimum annealing, storage and reading protocols are very effective in accuracy of TLD response. The purpose of this study is to obtain an optimum protocol for GR-200; LiF: Mg, Cu, P, by optimizing the effective parameters, to increase the reliability of the TLD response using Taguchi method. Taguchi method has been used in this study for optimization of annealing, storage and reading protocols of the TLDs. A number of 108 GR-200 chips were divided into 27 groups, each containing four chips. The TLDs were exposed to three different doses, and stored, annealed and read out by different procedures as suggested by Taguchi Method. By comparing the signal-to-noise ratios the optimum dosimetry procedure was obtained. According to the results, the optimum values for annealing temperature (de.C), Annealing Time (s), Annealing to Exposure time (d), Exposure to Readout time (d), Pre-heat Temperature (de.C), Pre-heat Time (s), Heating Rate (de.C/s), Maximum Temperature of Readout (de.C), readout time (s) and Storage Temperature (de.C) are 240, 90, 1, 2, 50, 0, 15, 240, 13 and -20, respectively. Using the optimum protocol, an efficient glow curve with low residual signals can be achieved. Using optimum protocol obtained by Taguchi method, the dosimetry can be effectively performed with great accuracy. (authors)

  7. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol.

    Science.gov (United States)

    Klonoff, David C; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A; Arreaza-Rubin, Guillermo; Burk, Robert D; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W

    2016-05-01

    Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled "Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program" is attached as supplementary material. This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. © 2015 Diabetes Technology Society.

  8. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol

    Science.gov (United States)

    Klonoff, David C.; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A.; Arreaza-Rubin, Guillermo; Burk, Robert D.; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B.; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W.

    2015-01-01

    Background: Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. Methods: The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. Results: A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled “Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program” is attached as supplementary material. Conclusion: This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. PMID:26481642

  9. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  10. Protocols and participatory democracy in a 'North-South' product development partnership.

    Science.gov (United States)

    Montgomery, Catherine M

    2012-09-01

    Global product development partnerships (PDPs) for new health technologies have become an increasingly important part of the science and development landscape over the past two decades. Polarised positions are adopted by those scrutinising the power and governance of these public-private formations; on the one hand, they are seen as successful social technology innovations, on the other as regressive and imperialistic regimes of neo-colonialism. Answering recent calls for research to examine the actors, governance, context and dynamics of PDPs, this article presents a sociological case study of one particular partnership, the Microbicides Development Programme (MDP). Interviews were conducted with a cross-section of programme staff in the UK and Zambia, and discourses analysed through a Foucauldian lens of governmentality. This article suggests that two tools of government were central to MDP's cohesiveness: institutional discourses of participatory democracy and capacity building and scientific protocols. Through these material-semiotic tools, the scientific community, junior operational researchers and the funder were successfully enrolled into the programme and governed by a central body based in the UK. This article draws on Nikolas Rose's work to discuss these socio-scientific discourses as technologies of government, and provides a non-dualistic account of power and governance in a North-South PDP. © 2012 The Author. Sociology of Health & Illness © 2012 Foundation for the Sociology of Health & Illness/Blackwell Publishing Ltd.

  11. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  12. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  13. Protocol d'inicialització de sessió SIP

    OpenAIRE

    Ibrahem Fernández, Samer

    2006-01-01

    Aquest projecte té com a finalitat estudiar el protocol SIP i desenvolupar una aplicació que l'implementi. Este proyecto tiene como finalidad estudiar el protocolo SIP y desarrollar una aplicación que la implemente The purpose of this project is to study the SIP protocol and develop an application that implements it.

  14. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    Science.gov (United States)

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2017-11-01

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  15. Control room envelope unfiltered air inleakage test protocols

    International Nuclear Information System (INIS)

    Lagus, P.L.; Grot, R.A.

    1997-01-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs

  16. Control room envelope unfiltered air inleakage test protocols

    Energy Technology Data Exchange (ETDEWEB)

    Lagus, P.L. [Lagus Applied Technology, San Diego, CA (United States); Grot, R.A. [Lagus Applied Technology, Olney, MD (United States)

    1997-08-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs.

  17. Advanced CUBIC protocols for whole-brain and whole-body clearing and imaging.

    Science.gov (United States)

    Susaki, Etsuo A; Tainaka, Kazuki; Perrin, Dimitri; Yukinaga, Hiroko; Kuno, Akihiro; Ueda, Hiroki R

    2015-11-01

    Here we describe a protocol for advanced CUBIC (Clear, Unobstructed Brain/Body Imaging Cocktails and Computational analysis). The CUBIC protocol enables simple and efficient organ clearing, rapid imaging by light-sheet microscopy and quantitative imaging analysis of multiple samples. The organ or body is cleared by immersion for 1-14 d, with the exact time required dependent on the sample type and the experimental purposes. A single imaging set can be completed in 30-60 min. Image processing and analysis can take whole-brain neural activities at single-cell resolution using Arc-dVenus transgenic (Tg) mice. CUBIC informatics calculated the Venus signal subtraction, comparing different brains at a whole-organ scale. These protocols provide a platform for organism-level systems biology by comprehensively detecting cells in a whole organ or body.

  18. Quantum Information Protocols with Gaussian States of Light

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann

    and hardware for secure quantum key distribution. These technologies directly exploit quantum effects, and indeed this is where they offer advantages to classical products. This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource......Quantum cryptography is widely regarded as the most mature field within the context of quantum information in the sense that its application and development has produced companies that base their products on genuine quantum mechanical principles. Examples include quantum random number generators...... of Gaussian states. A quantum information protocol is essentially a sequence of state exchanges between some number of parties and a certain ordering of quantum mechanical unitary operators performed by these parties. An example of this is the famous BB84 protocol for secret key generation, where photons...

  19. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  20. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  1. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  2. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  3. Is a New Protocol for Acute Lymphoblastic Leukemia Research or Standard Therapy?

    NARCIS (Netherlands)

    Dekking, SAS; van der Graaf, R; de Vries, Martine; Bierings, MB; van Delden, JJM; Kodish, Eric; Lantos, John

    2015-01-01

    In the United States, doctors generally develop new cancer chemotherapy for children by testing innovative chemotherapy protocols against existing protocols in prospective randomized trials. In the Netherlands, children with leukemia are treated by protocols that are agreed upon by the Dutch

  4. Development of experimental systems for material sciences under microgravity

    Science.gov (United States)

    Tanii, Jun; Obi, Shinzo; Kamimiyata, Yotsuo; Ajimine, Akio

    1988-01-01

    As part of the Space Experiment Program of the Society of Japanese Aerospace Companies, three experimental systems (G452, G453, G454) have been developed for materials science studies under microgravity by the NEC Corporation. These systems are to be flown as Get Away Special payloads for studying the feasibility of producing new materials. Together with the experimental modules carrying the hardware specific to the experiment, the three systems all comprise standard subsystems consisting of a power supply, sequence controller, temperature controller, data recorder, and video recorder.

  5. Analysis of transmission speed of AX.25 Protocol implemented in satellital earth station UPTC

    Directory of Open Access Journals (Sweden)

    Oscar Fernando Vera Cely

    2015-11-01

    Full Text Available One of the important parameters for the proper functioning of satellital ground station projected on Pedagogical and Technological University of Colombia (UPTC is the efficiency in transmission speed on communications protocol. This paper shows the results of analysis of the transmission speed of the AX.25 protocol implemented in the communication system of the satellital ground station UPTC. It begins with a brief description of the implemented hardware; the behavior of the transmission rate is evaluated using a theoretical analysis based on equations to estimate this parameter in the operation of the protocol, then tests are performed using the hardware that the satellital ground station UPTC has and finally, the conclusions are presented. Based on comparison of the theoretical analysis results obtained experimentally, it became apparent that AX.25 protocol efficiency is higher when increasing the number of frames.

  6. Experimental investigation of practical unforgeable quantum money

    Science.gov (United States)

    Bozzio, Mathieu; Orieux, Adeline; Trigo Vidarte, Luis; Zaquine, Isabelle; Kerenidis, Iordanis; Diamanti, Eleni

    2018-01-01

    Wiesner's unforgeable quantum money scheme is widely celebrated as the first quantum information application. Based on the no-cloning property of quantum mechanics, this scheme allows for the creation of credit cards used in authenticated transactions offering security guarantees impossible to achieve by classical means. However, despite its central role in quantum cryptography, its experimental implementation has remained elusive because of the lack of quantum memories and of practical verification techniques. Here, we experimentally implement a quantum money protocol relying on classical verification that rigorously satisfies the security condition for unforgeability. Our system exploits polarization encoding of weak coherent states of light and operates under conditions that ensure compatibility with state-of-the-art quantum memories. We derive working regimes for our system using a security analysis taking into account all practical imperfections. Our results constitute a major step towards a real-world realization of this milestone protocol.

  7. The implementation and evaluation of an evidence-based statewide prehospital pain management protocol developed using the national prehospital evidence-based guideline model process for emergency medical services.

    Science.gov (United States)

    Brown, Kathleen M; Hirshon, Jon Mark; Alcorta, Richard; Weik, Tasmeen S; Lawner, Ben; Ho, Shiu; Wright, Joseph L

    2014-01-01

    In 2008, the National Highway Traffic Safety Administration funded the development of a model process for the development and implementation of evidence-based guidelines (EBGs) for emergency medical services (EMS). We report on the implementation and evaluation of an evidence-based prehospital pain management protocol developed using this model process. An evidence-based protocol for prehospital management of pain resulting from injuries and burns was reviewed by the Protocol Review Committee (PRC) of the Maryland Institute for Emergency Medical Services Systems (MIEMSS). The PRC recommended revisions to the Maryland protocol that reflected recommendations in the EBG: weight-based dosing and repeat dosing of morphine. A training curriculum was developed and implemented using Maryland's online Learning Management System and successfully accessed by 3,941 paramedics and 15,969 BLS providers. Field providers submitted electronic patient care reports to the MIEMSS statewide prehospital database. Inclusion criteria were injured or burned patients transported by Maryland ambulances to Maryland hospitals whose electronic patient care records included data for level of EMS provider training during a 12-month preimplementation period and a 12-month postimplementation period from September 2010 through March 2012. We compared the percentage of patients receiving pain scale assessments and morphine, as well as the dose of morphine administered and the use of naloxone as a rescue medication for opiate use, before and after the protocol change. No differences were seen in the percentage of patients who had a pain score documented or the percent of patients receiving morphine before and after the protocol change, but there was a significant increase in the total dose and dose in mg/kg administered per patient. During the postintervention phase, patients received an 18% higher total morphine dose and a 14.9% greater mg/kg dose. We demonstrated that the implementation of a revised

  8. Developing an Optimum Protocol for Thermoluminescence Dosimetry with GR-200 Chips using Taguchi Method.

    Science.gov (United States)

    Sadeghi, Maryam; Faghihi, Reza; Sina, Sedigheh

    2017-06-15

    Thermoluminescence dosimetry (TLD) is a powerful technique with wide applications in personal, environmental and clinical dosimetry. The optimum annealing, storage and reading protocols are very effective in accuracy of TLD response. The purpose of this study is to obtain an optimum protocol for GR-200; LiF: Mg, Cu, P, by optimizing the effective parameters, to increase the reliability of the TLD response using Taguchi method. Taguchi method has been used in this study for optimization of annealing, storage and reading protocols of the TLDs. A number of 108 GR-200 chips were divided into 27 groups, each containing four chips. The TLDs were exposed to three different doses, and stored, annealed and read out by different procedures as suggested by Taguchi Method. By comparing the signal-to-noise ratios the optimum dosimetry procedure was obtained. According to the results, the optimum values for annealing temperature (°C), Annealing Time (s), Annealing to Exposure time (d), Exposure to Readout time (d), Pre-heat Temperature (°C), Pre-heat Time (s), Heating Rate (°C/s), Maximum Temperature of Readout (°C), readout time (s) and Storage Temperature (°C) are 240, 90, 1, 2, 50, 0, 15, 240, 13 and -20, respectively. Using the optimum protocol, an efficient glow curve with low residual signals can be achieved. Using optimum protocol obtained by Taguchi method, the dosimetry can be effectively performed with great accuracy. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  10. Feasibility and Emotional Impact of Experimentally Extending Sleep in Short-Sleeping Adolescents.

    Science.gov (United States)

    Van Dyk, Tori R; Zhang, Nanhua; Catlin, Perry A; Cornist, Kaylin; McAlister, Shealan; Whitacre, Catharine; Beebe, Dean W

    2017-09-01

    Published experimental sleep manipulation protocols for adolescents have been limited to the summer, limiting causal conclusions about how short sleep affects them on school nights, when they are most likely to restrict their sleep. This study assesses the feasibility and emotional impact of a school-night sleep manipulation protocol to test the effects of lengthening sleep in habitually short-sleeping adolescents. High school students aged 14-18 years who habitually slept 5-7 hours on school nights participated in a 5-week experimental sleep manipulation protocol. Participants completed a baseline week followed in randomized counterbalanced order by two experimental conditions lasting 2 weeks each: prescribed habitual sleep (HAB; sleep time set to match baseline) and sleep extension (EXT; 1.5-hour increase in time in bed from HAB). All sleep was obtained at home, monitored with actigraphy. Data on adherence, protocol acceptability, mood and behavior were collected at the end of each condition. Seventy-six adolescents enrolled in the study, with 54 retained through all 5 weeks. Compared to HAB, during EXT, participants averaged an additional 72.6 minutes/night of sleep (p sleep manipulation protocol can be feasibly implemented which directly tests the potential protective effects of lengthening sleep. Many short-sleeping adolescents would benefit emotionally from sleeping longer, supporting public health efforts to promote adolescent sleep on school nights. © Sleep Research Society 2017. Published by Oxford University Press on behalf of the Sleep Research Society. All rights reserved. For permissions, please e-mail journals.permissions@oup.com.

  11. An experimental protocol for the establishment of dogs with long-term cellular immune reactions to Leishmania antigens

    Directory of Open Access Journals (Sweden)

    Márcia Cristina Aquino Teixeira

    2011-03-01

    Full Text Available Domestic dogs are considered to be the main reservoirs of zoonotic visceral leishmaniasis. In this work, we evaluated a protocol to induce Leishmania infantum/Leishmania chagasi-specific cellular and humoral immune responses in dogs, which consisted of two injections of Leishmania promastigote lysate followed by a subcutaneous inoculation of viable promastigotes. The primary objective was to establish a canine experimental model to provide positive controls for testing immune responses to Leishmania in laboratory conditions. After inoculation of viable promastigotes, specific proliferative responses of peripheral blood mononuclear cells (PBMCs to either Leishmania lysate or recombinant proteins, the in vitro production of interferon-γ by antigen-stimulated PBMCs and a significant increase in circulating levels of anti-Leishmania antibodies were observed. The immunized dogs also displayed positive delayed-type hypersensitivity reactions to Leishmania crude antigens and to purified recombinant proteins. An important finding that supports the suitability of the dogs as positive controls is that they remained healthy for the entire observation period, i.e., more than seven years after infection. Following the Leishmania antigen lysate injections, the infection of dogs by the subcutaneous route appears to induce a sustained cellular immune response, leading to an asymptomatic infection. This provides a useful model for both the selection of immunogenic Leishmania antigens and for immunobiological studies on their possible immunoprotective activities.

  12. Preliminary design of ECCO: Experimental control system which is cloud oriented

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Wei, E-mail: zhengwei@hust.edu.cn [State Key Laboratory of Advanced Electromagnetic Engineering and Technology in Huazhong University of Science and Technology, Wuhan 430074 (China); School of Electrical and Electronic Engineering in Huazhong University of Science and Technology, Wuhan 430074 (China); Hu, Feiran; Zhang, Ming; Zhang, Jing; Wan, Kuanhong; Liu, Qiang; Pan, Yuan; Zhuang, Ge [State Key Laboratory of Advanced Electromagnetic Engineering and Technology in Huazhong University of Science and Technology, Wuhan 430074 (China); School of Electrical and Electronic Engineering in Huazhong University of Science and Technology, Wuhan 430074 (China)

    2016-11-15

    Highlights: • ECCO is a self-organized and de-centralized control system software. • ECCO integrates ECCO-SDD and ECCO-REST.. • ECCO network protocol is based on HTTP protocol and RESTful design practice, implements Hypermedia, automatic discovery, and event. • ECCO is flexible, plug-and-play, and provides a series of unified toolkits. - Abstract: As the development of the Tokamak, the scale of the facility is getting bigger and bigger. It is a great challenge to design, manage and operate a control system of such big scale. So we developed a new control system software: Experimental Control System which is Cloud Oriented (ECCO). ECCO consists two parts, ECCO-SDD and ECCO-REST. ECCO-SDD is used to design, manage and describe the whole control system, configure every subsystem statically. There is a SDD editor which is a human machine interface for control system designer to design by simply drag and drop, and it can be easily extended using plug-in. The ECCO-SDD translator is used to generate different outputs. All the system design and configuration is stored in the MongoDB database using an object relational mapping dedicated designed for ECCO-SDD. ECCO-REST mainly defines a control network protocol based on HTTP RESTful service, it also implements automatic discovery using Zero-configuration (Zeroconf) networking standard. Since this protocol is based on industrial standard and transparent protocol, it is open enough and it can be easily implemented by others. ECCO-REST application is the core of ECCO-REST, it is a cross platform control software running on distributed control units just like the EPICS IOC. It can be extended by user created models. It is configured by human readable JSON file which can be generated by ECCO-SDD translator. ECCO is a self-organized and de-centralized control system software. Based on the same protocol, every part of the system can discover each other, thus the controllers which ECCO-REST application running on can

  13. Preliminary design of ECCO: Experimental control system which is cloud oriented

    International Nuclear Information System (INIS)

    Zheng, Wei; Hu, Feiran; Zhang, Ming; Zhang, Jing; Wan, Kuanhong; Liu, Qiang; Pan, Yuan; Zhuang, Ge

    2016-01-01

    Highlights: • ECCO is a self-organized and de-centralized control system software. • ECCO integrates ECCO-SDD and ECCO-REST.. • ECCO network protocol is based on HTTP protocol and RESTful design practice, implements Hypermedia, automatic discovery, and event. • ECCO is flexible, plug-and-play, and provides a series of unified toolkits. - Abstract: As the development of the Tokamak, the scale of the facility is getting bigger and bigger. It is a great challenge to design, manage and operate a control system of such big scale. So we developed a new control system software: Experimental Control System which is Cloud Oriented (ECCO). ECCO consists two parts, ECCO-SDD and ECCO-REST. ECCO-SDD is used to design, manage and describe the whole control system, configure every subsystem statically. There is a SDD editor which is a human machine interface for control system designer to design by simply drag and drop, and it can be easily extended using plug-in. The ECCO-SDD translator is used to generate different outputs. All the system design and configuration is stored in the MongoDB database using an object relational mapping dedicated designed for ECCO-SDD. ECCO-REST mainly defines a control network protocol based on HTTP RESTful service, it also implements automatic discovery using Zero-configuration (Zeroconf) networking standard. Since this protocol is based on industrial standard and transparent protocol, it is open enough and it can be easily implemented by others. ECCO-REST application is the core of ECCO-REST, it is a cross platform control software running on distributed control units just like the EPICS IOC. It can be extended by user created models. It is configured by human readable JSON file which can be generated by ECCO-SDD translator. ECCO is a self-organized and de-centralized control system software. Based on the same protocol, every part of the system can discover each other, thus the controllers which ECCO-REST application running on can

  14. A Pattern Language for Designing Application-Level Communication Protocols and the Improvement of Computer Science Education through Cloud Computing

    OpenAIRE

    Lascano, Jorge Edison

    2017-01-01

    Networking protocols have been developed throughout time following layered architectures such as the Open Systems Interconnection model and the Internet model. These protocols are grouped in the Internet protocol suite. Most developers do not deal with low-level protocols, instead they design application-level protocols on top of the low-level protocol. Although each application-level protocol is different, there is commonality among them and developers can apply lessons learned from one prot...

  15. The development and evaluation of an internal workplace violence risk assessment protocol: one organization's experience.

    Science.gov (United States)

    Heitt, Michael C; Tamburo, Melissa Back

    2005-01-01

    The creation and development of a Risk Assessment Team at a large urban university is presented as a case study, with particular focus on the role the Employee Assistance Program (EAP) plays in the multidisciplinary team. The structure of the team and differing roles and responsibilities of members will be discussed. A specific protocol for addressing incidents will be introduced, along with changes in the team ' response over time. Major lessons learned will be presented, as well as the challenges the team faces today, and discussion of areas for future research and evaluation.

  16. Effect of various rinsing protocols after use of amine fluoride/stannous fluoride toothpaste on the bacterial composition of dental plaque

    NARCIS (Netherlands)

    van Loveren, C.; Gerardu, V.A.M.; Sissons, C.H.; van Bekkum, M.; ten Cate, J.M.

    2009-01-01

    This clinical study evaluated the effect of different oral hygiene protocols on the bacterial composition of dental plaque. After a 2-week period of using fluoride-free toothpaste, 30 participants followed three 1-week experimental protocols, each followed by 2-week fluoride-free washout periods in

  17. Development of an acquisition protocol and a segmentation algortihm for wounds of cutaneous Leishmaniasis in digital images

    Science.gov (United States)

    Diaz, Kristians; Castañeda, Benjamín; Miranda, César; Lavarello, Roberto; Llanos, Alejandro

    2010-03-01

    We developed a protocol for the acquisition of digital images and an algorithm for a color-based automatic segmentation of cutaneous lesions of Leishmaniasis. The protocol for image acquisition provides control over the working environment to manipulate brightness, lighting and undesirable shadows on the injury using indirect lighting. Also, this protocol was used to accurately calculate the area of the lesion expressed in mm2 even in curved surfaces by combining the information from two consecutive images. Different color spaces were analyzed and compared using ROC curves in order to determine the color layer with the highest contrast between the background and the wound. The proposed algorithm is composed of three stages: (1) Location of the wound determined by threshold and mathematical morphology techniques to the H layer of the HSV color space, (2) Determination of the boundaries of the wound by analyzing the color characteristics in the YIQ space based on masks (for the wound and the background) estimated from the first stage, and (3) Refinement of the calculations obtained on the previous stages by using the discrete dynamic contours algorithm. The segmented regions obtained with the algorithm were compared with manual segmentations made by a medical specialist. Broadly speaking, our results support that color provides useful information during segmentation and measurement of wounds of cutaneous Leishmaniasis. Results from ten images showed 99% specificity, 89% sensitivity, and 98% accuracy.

  18. RadNet: Open network protocol for radiation data

    International Nuclear Information System (INIS)

    Rees, B.; Olson, K.; Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W.; Koskelo, M.

    1998-01-01

    Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet's flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems

  19. Security Property Validation of the Sensor Network Encryption Protocol (SNEP

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2015-07-01

    Full Text Available Since wireless sensor networks (WSNs have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA, named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

  20. Technical Protocol. Transformation of biocides in liquid manures

    Energy Technology Data Exchange (ETDEWEB)

    Kreuzig, Robert; Schlag, Patrick; Teigeler, Jennifer; Hartmann, Constanze; Cvetkovi, Benjamin [Technische Univ. Braunschweig (Germany). Inst. fuer Oekologische Chemie und Abfallanalytik

    2010-07-15

    The Reference Manure Concept, already developed for laboratory tests on fate and behavior of veterinary medicinal products in liquid manures and manured soils, was successfully applied for biocides used for disinfection purposes and control of insects in animal houses. Since the representative and reproducible sampling of manures from high-volume tanks has been considered impossible, excrement samples of cattle and pigs individually kept at an experimental animal house were taken. These samples were thoroughly matrix characterized. Then, tap water was added to prepare reference manures of definite dry substance contents. Subsequently, the long-term transformation of the biocides imazalil and cyanamide applied as {sup 14}C-labeled radiotracers was investigated in these manure samples. On the basis of the transformation tests, test manures with 7-day aged biocide residues were prepared and applied in laboratory tests on transformation and sorption in manured soil. By means of this experimental approach, the impacts of aging processes during manure storage and of the manure matrix on the fate of biocides in soils can be assessed already under laboratory conditions. These laboratory tests have been directed as closely as possible to agricultural practice as well as to analytical practicability and quality assurance. Finally, the methodological aspects have been compiled in a Technical Protocol (Draft version). (orig.)

  1. Experimental evaluation of BZ-GW (BACnet-ZigBee smart grid gateway) for demand response in buildings

    International Nuclear Information System (INIS)

    Hong, Seung Ho; Kim, Se Hwan; Kim, Gi Myung; Kim, Hyung Lae

    2014-01-01

    The SG (smart grid) is a modernized and a future-oriented electric grid that deals with the whole energy chain, from generation to consumer. Among the SG applications, DR (demand response) is an important control mechanism to manage the electricity consumption of the customer in response to supply conditions. In buildings, DR is managed through installed communication networks which support DR applications. BACnet is an international standard communication protocol for building automation and control systems. BACnet uses ZigBee as a wireless communication protocol. Both BACnet and ZigBee have their own DR applications. In this study, we developed a BACnet-ZigBee gateway that maps the DR application of BACnet to that of ZigBee and vice versa. In addition, we developed an experimental facility to demonstrate how the BACnet-ZigBee gateway can be implemented for DR applications in buildings. We also measured the communication delay to verify that the BZ-GW (BACnet-ZigBee smart grid gateway) developed here satisfies the requirements of real-time DR service in buildings. - Highlights: • Developed a gateway that maps the DR application of BACnet to that of ZigBee. • Verified satisfaction for real-time requirement using experimental facility. • The gateway and other device will play a infrastructure role in buildings. • The implementation method could become a reference model for future similar

  2. Antibiotic prophylaxis in orthopedic surgeries: the results of an implemented protocol

    Directory of Open Access Journals (Sweden)

    Raquel Queiroz

    Full Text Available Though the basic principles of antibiotic prophylaxis have been well established, there is still considerable incorrect usage, including how much is prescribed and especially in the duration of treatment, which is generally superior to what is indicated. The adequate use of these drugs contributes towards decreasing the time of internment of the patient, prevents surgical site infection (SSI, decreasing the development of resistant microorganisms, and towards reduced costs for the hospital pharmacy. A protocol for the use of antibiotic prophylaxis in the Orthopedics and Traumatology Service of the Hospital do Servidor Público Estadual de São Paulo was developed. The objectives of the study were to promote rational antibiotic surgical prophylaxis, through the implantation of a protocol for the use of these drugs in a surgical unit, with the direct contribution of a druggist in collaboration with the Infection Control Committee, to evaluate the adhesion of the health team to the protocol during three distinct periods (daily pre-protocol, early post-protocol and late post-protocol and to define the consumption of antimicrobials used, measured as daily defined dose.

  3. Prairie Monitoring Protocol Development: North Coast and Cascades Network

    Science.gov (United States)

    McCoy, Allen; Dalby, Craig

    2009-01-01

    The purpose of the project was to conduct research that will guide development of a standard approach to monitoring several components of prairies within the North Coast and Cascades Network (NCCN) parks. Prairies are an important element of the natural environment at many parks, including San Juan Island National Historical Park (NHP) and Ebey's Landing National Historical Reserve (NHR). Forests have been encroaching on these prairies for many years, and so monitoring of the prairies is an important resource issue. This project specifically focused on San Juan Island NHP. Prairies at Ebey's Landing NHR will be monitored in the future, but that park was not mapped as part of this prototype project. In the interest of efficiency, the Network decided to investigate two main issues before launching a full protocol development effort: (1) the imagery requirements for monitoring prairie components, and (2) the effectiveness of software to assist in extracting features from the imagery. Several components of prairie monitoring were initially identified as being easily tracked using aerial imagery. These components included prairie/forest edge, broad prairie composition (for example, shrubs, scattered trees), and internal exclusions (for example, shrubs, bare ground). In addition, we believed that it might be possible to distinguish different grasses in the prairies if the imagery were of high enough resolution. Although the areas in question at San Juan Island NHP are small enough that mapping on the ground with GPS (Global Positioning System) would be feasible, other applications could benefit from aerial image acquisition on a regular, recurring basis and thereby make the investment in aerial imagery worthwhile. The additional expense of orthorectifying the imagery also was determined to be cost-effective.

  4. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  5. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  6. Authentication protocols for internet of things: a comprehensive survey

    OpenAIRE

    Ferrag, Mohamed Amine; Maglaras, Leandros A.; Janicke, Helge; Jiang, Jianmin; Shu, Lei

    2017-01-01

    open access article In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, c...

  7. Tribology of flexible and sliding spinal implants: Development of experimental and numerical models.

    Science.gov (United States)

    Le Cann, Sophie; Chaves-Jacob, Julien; Rossi, Jean-Marie; Linares, Jean-Marc; Chabrand, Patrick

    2018-01-01

    New fusionless devices are being developed to get over the limits of actual spinal surgical treatment, based on arthrodesis. However, due to their recentness, no standards exist to test and validate those devices, especially concerning the wear. A new tribological first approach to the definition of an in vitro wear protocol to study wear of flexible and sliding spinal devices is presented in this article, and was applied to a new concept. A simplified synthetic spine portion (polyethylene) was developed to reproduce a simple supra-physiological spinal flexion (10° between two vertebrae). The device studied with this protocol was tested in wet environment until 1 million cycles (Mc). We obtained an encouraging estimated wear volume of same order of magnitude compared to similar devices. An associated finite element (FE) numerical model has permitted to access contact information and study the effect of misalignment of one screw. First results could point out how to improve the design and suggest that a vertical misalignment of a screw (under or over-screwing) has more impact than a horizontal one. © 2016 Wiley Periodicals, Inc. J Biomed Mater Res Part B: Appl Biomater, 106B: 104-111, 2018. © 2016 Wiley Periodicals, Inc.

  8. National protocol framework for the inventory and monitoring of bees

    Science.gov (United States)

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative

  9. Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

    International Nuclear Information System (INIS)

    Zhang Quan; Tang Chaojing

    2002-01-01

    It is generally accepted that quantum key distribution (QKD) could supply legitimate users with unconditional security during their communication. Quite a lot of satisfactory efforts have been achieved on experimentations with quantum cryptography. However, when the eavesdropper has extra-powerful computational ability, has access to a quantum computer, for example, and can carry into execution any eavesdropping measurement that is allowed by the laws of physics, the security against such attacks has not been widely studied and rigorously proved for most QKD protocols. Quite recently, Shor and Preskill proved concisely the unconditional security of the Bennett-Brassard 1984 (BB84) protocol. Their method is highly valued for its clarity of concept and concision of form. In order to take advantage of the Shor-Preskill technique in their proof of the unconditional security of the BB84 QKD protocol, we introduced in this paper a transformation that can translate the Bennett 1992 (B92) protocol into the BB84 protocol. By proving that the transformation leaks no more information to the eavesdropper, we proved the unconditional security of the B92 protocol. We also settled the problem proposed by Lo about how to prove the unconditional security of the B92 protocol with the Shor-Preskill method

  10. [Air pollutant exposure during pregnancy and fetal and early childhood development. Research protocol of the INMA (Childhood and Environment Project)].

    Science.gov (United States)

    Esplugues, Ana; Fernández-Patier, Rosalía; Aguilera, Inma; Iñíguez, Carmen; García Dos Santos, Saúl; Aguirre Alfaro, Amelia; Lacasaña, Marina; Estarlich, Marisa; Grimalt, Joan O; Fernández, Marieta; Rebagliato, Marisa; Sala, María; Tardón, Adonina; Torrent, Maties; Martínez, María Dolores; Ribas-Fitó, Núria; Sunyer, Jordi; Ballester, Ferran

    2007-01-01

    The INMA (INfancia y Medio Ambiente [Spanish for Environment and Childhood]) project is a cooperative research network. This project aims to study the effects of environment and diet on fetal and early childhood development. This article aims to present the air pollutant exposure protocol during pregnancy and fetal and early childhood development of the INMA project. The information to assess air pollutant exposure during pregnancy is based on outdoor measurement of air pollutants (nitrogen dioxide [NO2], volatile organic compounds [VOC], ozone, particulate matter [PM10, PM2,5 ] and of their composition [polycyclic aromatic hydrocarbons]); measurement of indoor and personal exposure (VOC and NO2); urinary measurement of a biological marker of hydrocarbon exposure (1-hydroxypyrene); and data gathered by questionnaires and geographic information systems. These data allow individual air pollutant exposure indexes to be developed, which can then be used to analyze the possible effects of exposure on fetal development and child health. This protocol and the type of study allow an approximation to individual air pollutant exposure to be obtained. Finally, the large number of participants (N = 4,000), as well as their geographic and social diversity, increases the study's potential.

  11. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  12. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  13. Method-centered digital communities on protocols.io for fast-paced scientific innovation.

    Science.gov (United States)

    Kindler, Lori; Stoliartchouk, Alexei; Teytelman, Leonid; Hurwitz, Bonnie L

    2016-01-01

    The Internet has enabled online social interaction for scientists beyond physical meetings and conferences. Yet despite these innovations in communication, dissemination of methods is often relegated to just academic publishing. Further, these methods remain static, with subsequent advances published elsewhere and unlinked. For communities undergoing fast-paced innovation, researchers need new capabilities to share, obtain feedback, and publish methods at the forefront of scientific development. For example, a renaissance in virology is now underway given the new metagenomic methods to sequence viral DNA directly from an environment. Metagenomics makes it possible to "see" natural viral communities that could not be previously studied through culturing methods. Yet, the knowledge of specialized techniques for the production and analysis of viral metagenomes remains in a subset of labs.  This problem is common to any community using and developing emerging technologies and techniques. We developed new capabilities to create virtual communities in protocols.io, an open access platform, for disseminating protocols and knowledge at the forefront of scientific development. To demonstrate these capabilities, we present a virology community forum called VERVENet. These new features allow virology researchers to share protocols and their annotations and optimizations, connect with the broader virtual community to share knowledge, job postings, conference announcements through a common online forum, and discover the current literature through personalized recommendations to promote discussion of cutting edge research. Virtual communities in protocols.io enhance a researcher's ability to: discuss and share protocols, connect with fellow community members, and learn about new and innovative research in the field.  The web-based software for developing virtual communities is free to use on protocols.io. Data are available through public APIs at protocols.io.

  14. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  15. Using the "Knowledge Quartet" to Quantify Mathematical Knowledge in Teaching: The Development of a Protocol for Initial Teacher Education

    Science.gov (United States)

    Weston, Tracy L.

    2013-01-01

    This study examined trainee teachers' mathematical knowledge in teaching (MKiT) over their final year in a US Initial Teacher Education (ITE) programme. This paper reports on an exploratory methodological approach taken to use the "Knowledge Quartet" to quantify MKiT through the development of a new protocol to code trainees' teaching of…

  16. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture

    Directory of Open Access Journals (Sweden)

    Francisco Javier Ferrández-Pastor

    2016-07-01

    Full Text Available The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water; however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols, the evolution of Internet technologies (Internet of Things and ubiquitous computing (Ubiquitous Sensor Networks allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists when a project is launched.

  17. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture.

    Science.gov (United States)

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-07-22

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.

  18. An attempt to develop a protocol for revegetation of tailings pond at Jaduguda

    International Nuclear Information System (INIS)

    Jha, V.N.; Sethy, N.K.; Sahoo, S.K.; Tripathi, R.M.; Puranik, V.D.; Singh, V.K.

    2007-01-01

    Reclamation of uranium mill tailings is a global challenge. The mill tailings contain long-lived radionuclides and chemical additives required for the recovery of uranium. Plants can be used for consolidation of tailings and phytoremediation of contaminated soil. Present work is an attempt to develop a protocol for revegetation of used up tailings pond at Jaduguda. Brassica juncea species was used for growing vegetation over the modified tailings. It was observed that a combination of cultivation land soil, tailings and naturally digested sewage manure was effective medium for proper growth of the plants. The growth increased with increase in the quantity of sewage manure. Moreover, such combination supplemented with reagents like EDTA and chloride salt led to even better performance with respect to growth and reproduction. (author)

  19. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  20. Multihopping Multilevel Clustering Heterogeneity-Sensitive Optimized Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-01-01

    Full Text Available Effective utilization of energy resources in Wireless Sensor Networks (WSNs has become challenging under uncertain distributed cluster-formation and single-hop intercluster communication capabilities. So, sensor nodes are forced to operate at expensive full rate transmission power level continuously during whole network operation. These challenging network environments experience unwanted phenomena of drastic energy consumption and packet drop. In this paper, we propose an adaptive immune Multihopping Multilevel Clustering (MHMLC protocol that executes a Hybrid Clustering Algorithm (HCA to perform optimal centralized selection of Cluster-Heads (CHs within radius of centrally located Base Station (BS and distributed CHs selection in the rest of network area. HCA of MHMLC also produces optimal intermediate CHs for intercluster multihop communications that develop heterogeneity-aware economical links. This hybrid cluster-formation facilitates the sensors to function at short range transmission power level that enhances link quality and avoids packet drop. The simulation environments produce fair comparison among proposed MHMLC and existing state-of-the-art routing protocols. Experimental results give significant evidence of better performance of the proposed model in terms of network lifetime, stability period, and data delivery ratio.

  1. MANET Performance for Source and Destination Moving Scenarios Considering OLSR and AODV protocols

    Directory of Open Access Journals (Sweden)

    Elis Kulla

    2010-01-01

    Full Text Available Recently, a great interest is shown in MANETs potential usage and applications in several fields such as military activities, rescue operations and time-critical applications. In this work, we implement and analyse a MANET testbed considering AODV and OLSR protocols for wireless multi-hop networking. We investigate the effect of mobility and topology changing in MANET and evaluate the performance of the network through experiments in a real environment. The performance assessment of our testbed is done considering throughput, number of dropped packets and delay. We designed four scenarios: Static, Source Moving, Destination Moving and Source-Destination Moving. From our experimental results, we concluded that when the communicating nodes are moving and the routes change quickly, OLSR (as a proactive protocol performs better than AODV, which is a reactive protocol.

  2. A Protocol for the Comprehensive Flow Cytometric Analysis of Immune Cells in Normal and Inflamed Murine Non-Lymphoid Tissues

    Science.gov (United States)

    Yu, Yen-Rei A.; O’Koren, Emily G.; Hotten, Danielle F.; Kan, Matthew J.; Kopin, David; Nelson, Erik R.; Que, Loretta; Gunn, Michael D.

    2016-01-01

    Flow cytometry is used extensively to examine immune cells in non-lymphoid tissues. However, a method of flow cytometric analysis that is both comprehensive and widely applicable has not been described. We developed a protocol for the flow cytometric analysis of non-lymphoid tissues, including methods of tissue preparation, a 10-fluorochrome panel for cell staining, and a standardized gating strategy, that allows the simultaneous identification and quantification of all major immune cell types in a variety of normal and inflamed non-lymphoid tissues. We demonstrate that our basic protocol minimizes cell loss, reliably distinguishes macrophages from dendritic cells (DC), and identifies all major granulocytic and mononuclear phagocytic cell types. This protocol is able to accurately quantify 11 distinct immune cell types, including T cells, B cells, NK cells, neutrophils, eosinophils, inflammatory monocytes, resident monocytes, alveolar macrophages, resident/interstitial macrophages, CD11b- DC, and CD11b+ DC, in normal lung, heart, liver, kidney, intestine, skin, eyes, and mammary gland. We also characterized the expression patterns of several commonly used myeloid and macrophage markers. This basic protocol can be expanded to identify additional cell types such as mast cells, basophils, and plasmacytoid DC, or perform detailed phenotyping of specific cell types. In examining models of primary and metastatic mammary tumors, this protocol allowed the identification of several distinct tumor associated macrophage phenotypes, the appearance of which was highly specific to individual tumor cell lines. This protocol provides a valuable tool to examine immune cell repertoires and follow immune responses in a wide variety of tissues and experimental conditions. PMID:26938654

  3. Development of an optimized random amplified polymorphic DNA protocol for fingerprinting of Klebsiella pneumoniae.

    Science.gov (United States)

    Ashayeri-Panah, M; Eftekhar, F; Feizabadi, M M

    2012-04-01

    To develop an optimized random amplified polymorphic DNA (RAPD) protocol for fingerprinting clinical isolates of Klebsiella pneumoniae. Employing factorial design of experiments, repeatable amplification patterns were obtained for 54 nosocomial isolates using 1 μmol 1(-1) primer, 4 mmol 1(-1) MgCl(2), 0·4 mmol 1(-1) dNTPs, 2·5 U Taq DNA polymerase and 90 ng DNA template in a total volume of 25 μl. The optimum thermocycling program was: initial denaturation at 94°C for 4 min followed by 50 cycles of 1 min at 94°C, 2 min at 34°C, 2 min at 72°C and a final extension at 72°C for 10 min. The optimized RAPD protocol was highly discriminatory (Simpson's diversity index, 0·982), and all isolates were typable with repeatable patterns (Pearson's similarity coefficient ≈ 100%). Seven main clusters were obtained on a similarity level of 70% and 32 distinct clusters on a similarity level of 85%, reflecting the heterogeneity of the isolates. Systematic optimization of RAPD generated reliable DNA fingerprints for nosocomial isolates of K. pneumoniae. This is the first report on RAPD optimization based on factorial design of experiments for discrimination of K. pneumoniae. © 2012 The Authors. Letters in Applied Microbiology © 2012 The Society for Applied Microbiology.

  4. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    Science.gov (United States)

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  5. Designing protocols for the human teeth biobank of the Universidad Nacional de Colombia

    Directory of Open Access Journals (Sweden)

    Lina Constanza Gonzáles-Pita

    2014-07-01

    Full Text Available Protocols in a Tooth Bank are essential in order to assure smooth operation, reproducibility and standardization that minimize cross contamination, maintain original characteristics and physicochemical properties of teeth, fulll ethical and legal regulations and a proper disposal of residues. Objective: to propose the disinfection, storing and transportation protocols for the UNTB. Methods: A literature search was conducted using the words “teeth, human, tooth bank, disinfection, sterilization, storage, organization, biosecurity, biobank, protocol, prevention” in the Pubmed, Science Direct and Scielo databases. 37 papers ranging from 1988 up to 2014 were selected. International and Colombian ethical and legal regulations for organ donation, handling and investigation were taken into account as well as laboratory observations and chemical basic principles gained through several undergraduate and graduate thesis. All this input was carefully studied, analysed and critically modied for setting the recommended processes for the conversion of donated teeth into organs suitable for research. Results: Collection, transportation, cleaning/disinfection and storing protocols were planned and elaborated. Conclusions: Based on scientic literature, national and international regulations and experimental experience, several protocols for the UNTB were presented.

  6. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  7. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4, Volume IV: Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols

    Science.gov (United States)

    Mueller, J. L.; Fargion, G. S.; McClain, C. R. (Editor); Pegau, S.; Zanefeld, J. R. V.; Mitchell, B. G.; Kahru, M.; Wieland, J.; Stramska, M.

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparision and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background, and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 is entirely superseded by the six volumes of Revision 4 listed above.

  8. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  9. Kyoto protocol: at last the agreement has been reached; Protocole de Kyoto: un accord enfin conclu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    After more than 3 years of negotiations, 180 countries agreed at Bonn on the application of the Kyoto protocol to fight the climatic warming. The main aspects of this agreement are discussed: the carbon wells, the tools of the pollution control for the developed countries and the financial help to the developing countries. (A.L.B.)

  10. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  11. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  12. Experimental Acquisition, Development, and Transmission of Leishmania tropica by Phlebotomus duboscqi

    Science.gov (United States)

    2013-01-01

    ac ta t ropica Experimental acquisition, development, and transmission of Leishmania tropica by Phlebotomus duboscqi Hanafi A. Hanafi, El...August 2012 Accepted 2 September 2012 Available online 10 September 2012 Keywords: Phlebotomus duboscqi Leishmania tropica Transmission Vector...competency a b s t r a c t We report experimental infection and transmission of Leishmania tropica (Wright), by the blood-feeding sand

  13. Isolation of cancer cells by "in situ" microfluidic biofunctionalization protocols

    DEFF Research Database (Denmark)

    De Vitis, Stefania; Matarise, Giuseppina; Pardeo, Francesca

    2014-01-01

    The aim of this work is the development of a microfluidic immunosensor for the immobilization of cancer cells and their separation from healthy cells by using "in situ" microfluidic biofunctionalization protocols. These protocols allow to link antibodies on microfluidic device surfaces and can be...

  14. Development on experimental VHTR instrumentation

    International Nuclear Information System (INIS)

    Wakayama, N.; Ara, K.; Terada, H.; Yamagishi, H.; Tomoda, T.

    1982-06-01

    This paper describes developmental works on the instrumentation of the Experimental VHTR. In the area of the nuclear instrumentation for the reactor control, high temperature fission counter-chambers have been developed. These withstood the accelerated irradiation life tests at 600 deg. C, the long term in-reactor operating test at 600 deg. C and the 800 deg. C-operating tests for several hundred hours in a simulated accident condition. Platinum-Molybdenum alloy thermocouples have been studied as a neutron-irradiation-resistant high-temperature thermocouple for the in-core temperature distribution monitoring of the VHTR in the temperature range between 1000 deg. C and 1350 deg. C. The instability problems of the Pt-5% Mo/Pt-0.1% Mo thermocouple seem to be overcome by introducing a double sheath structure and adopting a better material to the inner sheath. A local failure and abnormality monitoring method for the HTR fuel is also studied using a gas-sweeping irradiation rig for the CPF compacts. This study aims mainly at the development of a method to compensate for the dependency of the FP-release rate on the fuel temperature, the neutron flux density, the burn-up and others, in order to increase the detection sensitivity of fuel failures. (author)

  15. Development of Information Assurance Protocol for Low Bandwidth Nanosatellite Communications

    Science.gov (United States)

    2017-09-01

    14. SUBJECT TERMS commercial off-the-shelf technology , nanosatellites, CubeSat, encrypted communications 15. NUMBER OF PAGES 161 16. PRICE...integrate with several physical layer technologies . While this protocol does provide some additional functionality at a lower cost, it is limited to...G. S. Vernam, “Secret signaling system.” U.S. Patent U.S. 1310719 A, 22 July 1919. [22] D. Kahn, Codebreakers: The Story of Secret Writing, New

  16. Sodium fires: French strategy - theoretical and experimental developments

    International Nuclear Information System (INIS)

    Descombes; Thomann; Malet, J.C.; Rzekiecki, R.

    1985-01-01

    After a description of the needs relating to LMFBR safety analysis and design in terms of prevention, detection and protection, the French strategy concerning sodium fires it presented. It includes theoretical developments supported with relevant experimental program, to allow reliable calculations and predictions for safety and design. The following physical phenomena are detailed: (1) sodium fire (mechanical and thermal effects); (2) sodium-structures interactions; (3) aerosols behavior

  17. Kyoto Protocol implementation in Serbia as precognition of sustainable energetic and economic development

    International Nuclear Information System (INIS)

    Golusin, Mirjana; Munitlak Ivanovic, Olja

    2011-01-01

    The paper gives reasons for low energy efficiency typical of the Serbian economy, which is based on outdated and dirty technologies. The comparison of selected economic indicators and indicators of energy efficiency in both Serbia and the European Union points out the benefits of the Kyoto Protocol implementation due to the growth of competitiveness in the global market. Serbia has no obligation to reduce GHG emissions, the authors point to the proposals whose implementation along with the mechanisms of the Protocol can enable Serbia the access to markets that trade GHG emissions and the access to dedicated funds, self-financing or attracting foreign investments to raise energy efficiency, which will be accompanied by adequate economic benefits. A similar principle can be applied in all countries that are not obliged to reduce GHG emissions. The application of different mechanisms aiming to increase energy efficiency in Serbia, could contribute to the increase of GDP annual growth rate from 5% to 7%, which cannot be achieved by any other economic instrument. Energy efficiency, which is actually a question of competitiveness of each economy, can finance itself through the mechanisms of the Kyoto Protocol by selling excess emissions resulting from improved energy efficiency. - Research highlights: → Serbia is a country with the outdated technology and low energy efficiency values. → Sustainable economic and energetic growth can be stirred by inserting Kyoto Protocol. → By investing in modern technology Serbia could lessen emission into the atmosphere. → Cut of emission in the atmosphere could help reaching certain carbon credit values. → By selling the carbon credit Serbia could do economic growth of 5-7% on a year level.

  18. A Novel Process Audit for Standardized Perioperative Handoff Protocols.

    Science.gov (United States)

    Pallekonda, Vinay; Scholl, Adam T; McKelvey, George M; Amhaz, Hassan; Essa, Deanna; Narreddy, Spurthy; Tan, Jens; Templonuevo, Mark; Ramirez, Sasha; Petrovic, Michelle A

    2017-11-01

    A perioperative handoff protocol provides a standardized delivery of communication during a handoff that occurs from the operating room to the postanestheisa care unit or ICU. The protocol's success is dependent, in part, on its continued proper use over time. A novel process audit was developed to help ensure that a perioperative handoff protocol is used accurately and appropriately over time. The Audit Observation Form is used for the Audit Phase of the process audit, while the Audit Averages Form is used for the Data Analysis Phase. Employing minimal resources and using quantitative methods, the process audit provides the necessary means to evaluate the proper execution of any perioperative handoff protocol. Copyright © 2017 The Joint Commission. Published by Elsevier Inc. All rights reserved.

  19. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  20. Establishment of experimental equipments in irradiation technology development building (2)

    International Nuclear Information System (INIS)

    Shibata, Hiroshi; Nakano, Hiroko; Suzuki, Yoshitaka; Ohtsuka, Noriaki; Nishikata, Kaori; Takeuchi, Tomoaki; Hirota, Noriaki; Tsuchiya, Kunihiko

    2018-01-01

    From the viewpoints of utilization improvement of the Japan Materials Testing Reactor (JMTR), the experimental devices have been established for the out-pile tests in the irradiation technology development building. The devices for the irradiation capsule assembly, material tests and inspections were established at first and experimental data were accumulated before the neutron irradiation tests. On the other hand, after the Great East Japan Earthquake, the repairs and earthquake-resistant measures of the existing devices were carried out. New devices and equipments were also established for the R and D program for power plant safety enhancement of the Agency for Natural Resources and Energy, Ministry of Economy, Trade and Industry (METI) and 99 Mo/ 99m Tc production development under the Tsukuba International Strategic Zone. This report describes the outline and basic operation manuals of the devices established from 2011 to 2016 and the management points for the safety works in the irradiation technology development building. (author)

  1. Isolation of cancer cells by "in situ" microfluidic biofunctionalization protocols

    KAUST Repository

    De Vitis, Stefania; Matarise, Giuseppina; Pardeo, Francesca; Catalano, Rossella; Malara, Natalia Maria; Trunzo, Valentina; Tallerico, Rossana; Gentile, Francesco T.; Candeloro, Patrizio; Coluccio, Maria Laura; Massaro, Alessandro S.; Viglietto, Giuseppe; Carbone, Ennio; Kutter, Jö rg Peter; Perozziello, Gerardo; Di Fabrizio, Enzo M.

    2014-01-01

    The aim of this work is the development of a microfluidic immunosensor for the immobilization of cancer cells and their separation from healthy cells by using "in situ" microfluidic biofunctionalization protocols. These protocols allow to link antibodies on microfluidic device surfaces and can be used to study the interaction between cell membrane and biomolecules. Moreover they allow to perform analysis with high processing speed, small quantity of reagents and samples, short reaction times and low production costs. In this work the developed protocols were used in microfluidic devices for the isolation of cancer cells in heterogeneous blood samples by exploiting the binding of specific antibody to an adhesion protein (EpCAM), overexpressed on the tumor cell membranes. The presented biofunctionalization protocols can be performed right before running the experiment: this allows to have a flexible platform where biomolecules of interest can be linked on the device surface according to the user's needs. © 2014 Elsevier B.V. All rights reserved.

  2. Isolation of cancer cells by "in situ" microfluidic biofunctionalization protocols

    KAUST Repository

    De Vitis, Stefania

    2014-07-01

    The aim of this work is the development of a microfluidic immunosensor for the immobilization of cancer cells and their separation from healthy cells by using "in situ" microfluidic biofunctionalization protocols. These protocols allow to link antibodies on microfluidic device surfaces and can be used to study the interaction between cell membrane and biomolecules. Moreover they allow to perform analysis with high processing speed, small quantity of reagents and samples, short reaction times and low production costs. In this work the developed protocols were used in microfluidic devices for the isolation of cancer cells in heterogeneous blood samples by exploiting the binding of specific antibody to an adhesion protein (EpCAM), overexpressed on the tumor cell membranes. The presented biofunctionalization protocols can be performed right before running the experiment: this allows to have a flexible platform where biomolecules of interest can be linked on the device surface according to the user\\'s needs. © 2014 Elsevier B.V. All rights reserved.

  3. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  4. Experimental simulation and limitations of quantum walks with trapped ions

    International Nuclear Information System (INIS)

    Matjeschk, R; Schneider, Ch; Enderlein, M; Huber, T; Schmitz, H; Glueckert, J; Schaetz, T

    2012-01-01

    We examine the prospects of discrete quantum walks (QWs) with trapped ions. In particular, we analyze in detail the limitations of the protocol of Travaglione and Milburn (2002 Phys. Rev. A 65 032310) that has been implemented by several experimental groups in recent years. Based on the first realization in our group (Schmitz et al 2009 Phys. Rev. Lett. 103 090504), we investigate the consequences of leaving the scope of the approximations originally made, such as the Lamb-Dicke approximation. We explain the consequential deviations from the idealized QW for different experimental realizations and an increasing number of steps by taking into account higher-order terms of the quantum evolution. It turns out that these already become significant after a few steps, which is confirmed by experimental results and is currently limiting the scalability of this approach. Finally, we propose a new scheme using short laser pulses, derived from a protocol from the field of quantum computation. We show that this scheme is not subject to the above-mentioned restrictions and analytically and numerically evaluate its limitations, based on a realistic implementation with our specific setup. Implementing the protocol with state-of-the-art techniques should allow for substantially increasing the number of steps to 100 and beyond and should be extendable to higher-dimensional QWs. (paper)

  5. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  6. Development of a multiplex polymerase chain reaction protocol for the simultaneous detection of Salmonella enterica serovar Typhi and Class 1 integron

    Directory of Open Access Journals (Sweden)

    Juthika Mandal

    2014-09-01

    Full Text Available Objective: To develop a multiplex polymerase chain reaction (PCR protocol for the simultaneous detection of Salmonella enterica serovar Typhi (S. Typhi and Class 1 integron, so as to aid rapid diagnosis of S. Typhi cases and help in the selection of treatment options based on the presence of the Class 1 integron that can carry resistance cassettes to a range of antibiotics. Methods: PCR for amplification of specific regions was done using fliC-d and intl primers and agarose gel electrophoresis was used for resolution of PCR products. Results: The fliC-d primer (S. Typhi specific amplified a 587 bp region and the intl primer (Class 1 integron specific amplified two bands approximately 500 and 550 bps. The developed method was specific for S. Typhi and did not amplify any products with Salmonella enterica serovar Typhimurium ATCC 14028, Salmonella enterica serovar Paratyphi and Escherichia coli O157:H7. Conclusions: The developed multiplex PCR protocol can be used for rapid diagnosis and aid in proper treatment strategies for patients infected with S. Typhi.

  7. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  8. Development of experimental method for self-wastage behavior in sodium-water reaction. Development of test rig (SWAT-2R) and study for experimental procedure

    International Nuclear Information System (INIS)

    Abe, Yuta; Shimoyama, Kazuhito; Kurihara, Akikazu

    2014-07-01

    In case of water leak from a penetrated crack on a tube of steam generator in the sodium cooled fast reactor (SFR), self-wastage, that increases the size of leak, may take place by corrosion related to chemical reaction between sodium and water. If the self-wastage continues in a certain period of time, the intact tube bundle may be damaged as a result of enlarged leak. For the safety evaluation of the accident, JAEA has been developing the analytical method of self-wastage using the multi-dimensional sodium-water reaction code. Experiments conducted so far used mainly crack-type test pieces. However, reproducibility was limited and it was difficult to evaluate individual effects of the phenomena in detail. This report describes the development of new experimental rig (SWAT-2R). SWAT-2R enables to examine corrosion effecting factors that were ambiguous in the previous studies. The report includes description of development of micro-leak test piece, examination of experimental procedure. The results will provide fundamental data for validation of the self-wastage analytical method. (author)

  9. Protocol notions from the bibliography of his authorities

    Directory of Open Access Journals (Sweden)

    Dra. María Luz Álvarez Rodríguez

    2008-01-01

    Full Text Available Protocol is a subject that has suffered great changes over the last years in Spain. Its presence at university training has shifted from being a mere anecdote to becoming one more subject to be taught in postgraduate courses endorsed by a big social and professional demand. With the aim of announcing Protocol as a subject to the Spanish academic field, the present article carries out a study of the theoretical situation of this subject and profession in Spain. This research means to get to know the scientific character of Protocol, at the same time as it tries to found such professional side in the current offer of courses and of training. For this reason, this research could be interesting for the Spanish academic field, by helping to explain the reality of Protocol in Spain and to impel its theoretical development in our country.

  10. Development of an Evidence-Informed Blog to Promote Healthy Eating Among Mothers: Use of the Intervention Mapping Protocol.

    Science.gov (United States)

    Dumas, Audrée-Anne; Lemieux, Simone; Lapointe, Annie; Provencher, Véronique; Robitaille, Julie; Desroches, Sophie

    2017-05-19

    Low adherence to dietary guidelines and a concurrent rise of obesity-related chronic diseases emphasize the need for effective interventions to promote healthy eating. There is growing recognition that behavior change interventions should draw on theories of behavior change. Online interventions grounded in theory lead to increased effectiveness for health behavior change; however, few theory-driven social media-based health promotion interventions have been described in the literature. The objective of this study was to describe the application of the Intervention Mapping (IM) protocol to develop an evidence-informed blog to promote healthy eating among French-Canadian mothers of preschool and school-aged children. The following six steps of the IM protocol were performed. In Step 1, a preliminary needs assessment included a literature search on theoretical domains predicting Vegetables and Fruits intakes and Milk and Alternatives intakes in adults (ie, knowledge, beliefs about capabilities, beliefs about consequences, intention/goals) and a qualitative study including focus groups to identify female Internet users' perceptions of their use of healthy eating blogs. In Step 2, two behavioral outcomes were selected (ie, increase daily intakes of Vegetables and Fruits and Milk and Alternatives of mothers to reach Canadian dietary recommendations) and subsequently divided into six performance objectives inspired by national and international dietary recommendations such as planning for healthy meals. A matrix of change objectives was then created by crossing performance objectives with theoretical domains predicting Vegetables and Fruits intakes and Milk and Alternatives intakes in adults. Step 3 consisted of selecting theory-based intervention methods (eg, modeling and goal setting) and translating them into practical applications for the context of a dietary intervention delivered through a blog. A 6-month intervention was developed in Step 4 in which we aimed to

  11. A Proof-checked Verification of a Real-Time Communication Protocol

    NARCIS (Netherlands)

    Polak, I.

    We present an analysis of a protocol developed by Philips to connect several components of an audio-system. The verification of the protocol is carried out using the timed I/O-automata model of Lynch and Vaandrager. The verification has been partially proof-checked with the interactive proof

  12. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  13. Compact wireless control network protocol with fast path switching

    Directory of Open Access Journals (Sweden)

    Yasutaka Kawamoto

    2017-08-01

    Full Text Available Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER, such as wireless control networks, often adopt time division multiple access (TDMA. However, it is difficult to add or adjust functions in protocol stacks that use TDMA methods. Therefore, to add or adjust functions easily, we propose NES-SOURCE, a compact wireless control network protocol with a fast path-switching function. NES-SOURCE is implemented using carrier sense multiple access/collision avoidance (CSMA/CA rather than TDMA. Wireless control networks that use TDMA prevent communication failure by duplicating the communication path. If CSMA/CA networks use duplicate paths, collisions occur frequently, and communication will fail. NES-SOURCE switches paths quickly when communication fails, which reduces the effect of communication failures. Since NES-SOURCE is implemented using CSMA/CA rather than TDMA, the implementation scale is less than one-half that of existing network stacks. Furthermore, since NES-SOURCE’s code complexity is low, functions can be added or adjusted easily and quickly. Communication failures occur owing to changes in the communication environment and collisions. Experimental results demonstrate that the proposed NES-SOURCE’s path-switching function reduces the amount of communication failures when the communication environment changes owing to human movement and others. Furthermore, we clarify the relationships among the probability of a changing communication environment, the collision occurrence rate, and the PER of NES-SOURCE.

  14. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  15. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  16. WE-E-304-00: Implementing SBRT Protocols

    International Nuclear Information System (INIS)

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  17. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  18. WE-E-304-00: Implementing SBRT Protocols

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  19. Development of a Decision Support System to Predict Physicians' Rehabilitation Protocols for Patients with Knee Osteoarthritis

    Science.gov (United States)

    Hawamdeh, Ziad M.; Alshraideh, Mohammad A.; Al-Ajlouni, Jihad M.; Salah, Imad K.; Holm, Margo B.; Otom, Ali H.

    2012-01-01

    To design a medical decision support system (MDSS) that would accurately predict the rehabilitation protocols prescribed by the physicians for patients with knee osteoarthritis (OA) using only their demographic and clinical characteristics. The demographic and clinical variables for 170 patients receiving one of three treatment protocols for knee…

  20. An Adaptive Framework for Selecting Environmental Monitoring Protocols to Support Ocean Renewable Energy Development

    Directory of Open Access Journals (Sweden)

    Emily J. Shumchenia

    2012-01-01

    Full Text Available Offshore renewable energy developments (OREDs are projected to become common in the United States over the next two decades. There are both a need and an opportunity to guide efforts to identify and track impacts to the marine ecosystem resulting from these installations. A monitoring framework and standardized protocols that can be applied to multiple types of ORED would streamline scientific study, management, and permitting at these sites. We propose an adaptive and reactive framework based on indicators of the likely changes to the marine ecosystem due to ORED. We developed decision trees to identify suites of impacts at two scales (demonstration and commercial depending on energy (wind, tidal, and wave, structure (e.g., turbine, and foundation type (e.g., monopile. Impacts were categorized by ecosystem component (benthic habitat and resources, fish and fisheries, avian species, marine mammals, and sea turtles and monitoring objectives were developed for each. We present a case study at a commercial-scale wind farm and develop a monitoring plan for this development that addresses both local and national environmental concerns. In addition, framework has provided a starting point for identifying global research needs and objectives for understanding of the potential effects of ORED on the marine environment.

  1. An adaptive framework for selecting environmental monitoring protocols to support ocean renewable energy development.

    Science.gov (United States)

    Shumchenia, Emily J; Smith, Sarah L; McCann, Jennifer; Carnevale, Michelle; Fugate, Grover; Kenney, Robert D; King, John W; Paton, Peter; Schwartz, Malia; Spaulding, Malcolm; Winiarski, Kristopher J

    2012-01-01

    Offshore renewable energy developments (OREDs) are projected to become common in the United States over the next two decades. There are both a need and an opportunity to guide efforts to identify and track impacts to the marine ecosystem resulting from these installations. A monitoring framework and standardized protocols that can be applied to multiple types of ORED would streamline scientific study, management, and permitting at these sites. We propose an adaptive and reactive framework based on indicators of the likely changes to the marine ecosystem due to ORED. We developed decision trees to identify suites of impacts at two scales (demonstration and commercial) depending on energy (wind, tidal, and wave), structure (e.g., turbine), and foundation type (e.g., monopile). Impacts were categorized by ecosystem component (benthic habitat and resources, fish and fisheries, avian species, marine mammals, and sea turtles) and monitoring objectives were developed for each. We present a case study at a commercial-scale wind farm and develop a monitoring plan for this development that addresses both local and national environmental concerns. In addition, framework has provided a starting point for identifying global research needs and objectives for understanding of the potential effects of ORED on the marine environment.

  2. A Calculus for Control Flow Analysis of Security Protocols

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Nielson, Hanne Riis; Nielson, Flemming

    2004-01-01

    The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying...... analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description...

  3. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    Science.gov (United States)

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  4. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    Science.gov (United States)

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  5. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-12-01

    Full Text Available Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN. Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS. This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime

  6. Protocol for VOC-Arid ID remediation performance characterization

    International Nuclear Information System (INIS)

    Tegner, B.J.; Hassig, N.L.; Last, G.V.

    1994-09-01

    The Volatile Organic Compound-Arid Integrated Demonstration (VOC-Arid ID) is a technology development program sponsored by the US Department of Energy's Office of Technology Development that is targeted to acquire, develop, demonstrate, and deploy new technologies for the remediation of VOC contaminants in the soils and groundwaters of arid DOE sites. Technologies cannot be adequately evaluated unless sufficient site characterization and technology performance data have been collection and analyzed. The responsibility for identifying these data needs has been placed largely on the Principal Investigators (PIs) developing the remediation technology, who usually are not experts in site characterization or in identification of appropriate sampling, analysis, and monitoring techniques to support the field testing. This document provides a protocol for planning the collection of data before, during, and after a test of a new technology. This generic protocol provides the PIs and project managers with a set of steps to follow. The protocol is based on a data collection planning process called the Data Quality Objectives (DQO) process, which was originally developed by the US Environmental Protection Agency and has been expanded by DOE to support site cleanup decisions. The DQO process focuses on the quality and quantity of data required to make decision. Stakeholders to the decisions must negotiate such key inputs to the process as the decision rules that will be used and the acceptable probabilities of making decision errors

  7. SPIRIT 2013 explanation and elaboration: guidance for protocols of clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Gøtzsche, Peter C; Altman, Douglas G; Mann, Howard; Berlin, Jesse A; Dickersin, Kay; Hróbjartsson, Asbjørn; Schulz, Kenneth F; Parulekar, Wendy R; Krleza-Jeric, Karmela; Laupacis, Andreas; Moher, David

    2013-01-08

    High quality protocols facilitate proper conduct, reporting, and external review of clinical trials. However, the completeness of trial protocols is often inadequate. To help improve the content and quality of protocols, an international group of stakeholders developed the SPIRIT 2013 Statement (Standard Protocol Items: Recommendations for Interventional Trials). The SPIRIT Statement provides guidance in the form of a checklist of recommended items to include in a clinical trial protocol. This SPIRIT 2013 Explanation and Elaboration paper provides important information to promote full understanding of the checklist recommendations. For each checklist item, we provide a rationale and detailed description; a model example from an actual protocol; and relevant references supporting its importance. We strongly recommend that this explanatory paper be used in conjunction with the SPIRIT Statement. A website of resources is also available (www.spirit-statement.org). The SPIRIT 2013 Explanation and Elaboration paper, together with the Statement, should help with the drafting of trial protocols. Complete documentation of key trial elements can facilitate transparency and protocol review for the benefit of all stakeholders.

  8. Radiologic procedures, policies and protocols for pediatric emergency medicine

    International Nuclear Information System (INIS)

    Woodward, George A.

    2008-01-01

    Protocol development between radiology and pediatric emergency medicine requires a multidisciplinary approach to manage straightforward as well as complex and time-sensitive needs for emergency department patients. Imaging evaluation requires coordination of radiologic technologists, radiologists, transporters, nurses and coordinators, among others, and might require accelerated routines or occur at sub-optimal times. Standardized protocol development enables providers to design a best practice in all of these situations and should be predicated on evidence, mission, and service expectations. As in any new process, constructive feedback channels are imperative for evaluation and modification. (orig.)

  9. Protocol and quality assurance for carotid imaging in 100,000 participants of UK Biobank: development and assessment.

    Science.gov (United States)

    Coffey, Sean; Lewandowski, Adam J; Garratt, Steve; Meijer, Rudy; Lynum, Steven; Bedi, Ram; Paterson, James; Yaqub, Mohammad; Noble, J Alison; Neubauer, Stefan; Petersen, Steffen E; Allen, Naomi; Sudlow, Cathie; Collins, Rory; Matthews, Paul M; Leeson, Paul

    2017-11-01

    Background Ultrasound imaging is able to quantify carotid arterial wall structure for the assessment of cerebral and cardiovascular disease risks. We describe a protocol and quality assurance process to enable carotid imaging at large scale that has been developed for the UK Biobank Imaging Enhancement Study of 100,000 individuals. Design An imaging protocol was developed to allow measurement of carotid intima-media thickness from the far wall of both common carotid arteries. Six quality assurance criteria were defined and a web-based interface (Intelligent Ultrasound) was developed to facilitate rapid assessment of images against each criterion. Results and conclusions Excellent inter and intra-observer agreements were obtained for image quality evaluations on a test dataset from 100 individuals. The image quality criteria then were applied in the UK Biobank Imaging Enhancement Study. Data from 2560 participants were evaluated. Feedback of results to the imaging team led to improvement in quality assurance, with quality assurance failures falling from 16.2% in the first two-month period examined to 6.4% in the last. Eighty per cent had all carotid intima-media thickness images graded as of acceptable quality, with at least one image acceptable for 98% of participants. Carotid intima-media thickness measures showed expected associations with increasing age and gender. Carotid imaging can be performed consistently, with semi-automated quality assurance of all scans, in a limited timeframe within a large scale multimodality imaging assessment. Routine feedback of quality control metrics to operators can improve the quality of the data collection.

  10. Experimental fault-tolerant quantum cryptography in a decoherence-free subspace

    International Nuclear Information System (INIS)

    Zhang Qiang; Pan Jianwei; Yin Juan; Chen Tengyun; Lu Shan; Zhang Jun; Li Xiaoqiang; Yang Tao; Wang Xiangbin

    2006-01-01

    We experimentally implement a fault-tolerant quantum key distribution protocol with two photons in a decoherence-free subspace [Phys. Rev. A 72, 050304(R) (2005)]. It is demonstrated that our protocol can yield a good key rate even with a large bit-flip error rate caused by collective rotation, while the usual realization of the Bennett-Brassard 1984 protocol cannot produce any secure final key given the same channel. Since the experiment is performed in polarization space and does not need the calibration of a reference frame, important applications in free-space quantum communication are expected. Moreover, our method can also be used to robustly transmit an arbitrary two-level quantum state in a type of decoherence-free subspace

  11. The Development of Experimentation and Evidence Evaluation Skills at Preschool Age

    Science.gov (United States)

    Piekny, Jeanette; Grube, Dietmar; Maehler, Claudia

    2014-01-01

    Researchers taking a domain-general approach to the development of scientific reasoning long thought that the ability to engage in scientific reasoning did not develop until adolescence. However, more recent studies have shown that preschool children already have a basic ability to evaluate evidence and a basic understanding of experimentation. Data providing insights into when exactly in the preschool years significant gains in these abilities occur are scarce. Drawing on a sample of 138 preschool children, this longitudinal study therefore examined how children's ability to evaluate evidence and their understanding of experimentation develop between the ages of four and six. Findings showed that the ability to evaluate evidence was already well developed at age four and increased steadily and significantly over time as long as the pattern of covariation was perfect. In the case of imperfect covariation, the proportion of correct answers was low over the period of observation, but showed a significant increase between the ages of four and five. If the data did not allow relationship between variables to be inferred, the proportion of correct answers was low, with a significant increase between the ages of five and six. The children's understanding of experimentation increased significantly between the ages of five and six. The implications of these findings for age-appropriate science programs in preschool are discussed.

  12. Development of a calibration protocol and identification of the most sensitive parameters for the particulate biofilm models used in biological wastewater treatment.

    Science.gov (United States)

    Eldyasti, Ahmed; Nakhla, George; Zhu, Jesse

    2012-05-01

    Biofilm models are valuable tools for process engineers to simulate biological wastewater treatment. In order to enhance the use of biofilm models implemented in contemporary simulation software, model calibration is both necessary and helpful. The aim of this work was to develop a calibration protocol of the particulate biofilm model with a help of the sensitivity analysis of the most important parameters in the biofilm model implemented in BioWin® and verify the predictability of the calibration protocol. A case study of a circulating fluidized bed bioreactor (CFBBR) system used for biological nutrient removal (BNR) with a fluidized bed respirometric study of the biofilm stoichiometry and kinetics was used to verify and validate the proposed calibration protocol. Applying the five stages of the biofilm calibration procedures enhanced the applicability of BioWin®, which was capable of predicting most of the performance parameters with an average percentage error (APE) of 0-20%. Copyright © 2012 Elsevier Ltd. All rights reserved.

  13. A case against justified non-voluntary active euthanasia (the Groningen Protocol).

    Science.gov (United States)

    Jotkowitz, Alan; Glick, S; Gesundheit, B

    2008-11-01

    The Groningen Protocol allows active euthanasia of severely ill newborns with unbearable suffering. Defenders of the protocol insist that the protocol refers to terminally ill infants and that quality of life should not be a factor in the decision to euthanize an infant. They also argue that there should be no ethical difference between active and passive euthanasia of these infants. However, nowhere in the protocol does it refer to terminally ill infants; on the contrary, the developers of the protocol take into account the future quality of life of the infant. We also note how the Nazi Euthanasie Programm started with the premise that there is some life not worthy of living. Therefore, in our opinion, the protocol violates the traditional ethical codes of physicians and the moral values of the overwhelming majority of the citizens of the world.

  14. Developing an Anti-Xa-Based Anticoagulation Protocol for Patients with Percutaneous Ventricular Assist Devices.

    Science.gov (United States)

    Sieg, Adam; Mardis, B Andrew; Mardis, Caitlin R; Huber, Michelle R; New, James P; Meadows, Holly B; Cook, Jennifer L; Toole, J Matthew; Uber, Walter E

    2015-01-01

    Because of the complexities associated with anticoagulation in temporary percutaneous ventricular assist device (pVAD) recipients, a lack of standardization exists in their management. This retrospective analysis evaluates current anticoagulation practices at a single center with the aim of identifying an optimal anticoagulation strategy and protocol. Patients were divided into two cohorts based on pVAD implanted (CentriMag (Thoratec; Pleasanton, CA) / TandemHeart (CardiacAssist; Pittsburgh, PA) or Impella (Abiomed, Danvers, MA)), with each group individually analyzed for bleeding and thrombotic complications. Patients in the CentriMag/TandemHeart cohort were subdivided based on the anticoagulation monitoring strategy (activated partial thromboplastin time (aPTT) or antifactor Xa unfractionated heparin (anti-Xa) values). In the CentriMag/TandemHeart cohort, there were five patients with anticoagulation titrated based on anti-Xa values; one patient developed a device thrombosis and a major bleed, whereas another patient experienced major bleeding. Eight patients received an Impella pVAD. Seven total major bleeds in three patients and no thrombotic events were detected. Based on distinct differences between the devices, anti-Xa values, and outcomes, two protocols were created to guide anticoagulation adjustments. However, anticoagulation in patients who require pVAD support is complex with constantly evolving anticoagulation goals. The ideal level of anticoagulation should be individually determined using several coagulation laboratory parameters in concert with hemodynamic changes in the patient's clinical status, the device, and the device cannulation.

  15. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  16. Methodological Study to Develop Standard Operational Protocol on Oral Drug Administration for Children.

    Science.gov (United States)

    Bijarania, Sunil Kumar; Saini, Sushma Kumari; Verma, Sanjay; Kaur, Sukhwinder

    2017-05-01

    To develop standard operational protocol (SOP) on oral drug administration and checklist to assess the implementation of the developed SOP. In this prospective methodological study, SOPs were developed in five phases. In the first phase, the preliminary draft of SOPs and checklists were prepared based on literature review, assessment of current practices and focus group discussion (FGD) with bedside working nurses. In the second phase, content validity was checked with the help of Delphi technique (12 experts). Total four drafts were prepared in stages and necessary modifications were made as per suggestions after each Delphi round. Fourth Delphi round was performed after conducting a pilot study. In the fourth phase, all bedside nurses were trained as per SOPs and asked to practice accordingly and observation of thirty oral drug administrations in children was done to check reliability of checklists for implementation of SOPs. In Phase-V, 7 FGDs were conducted with bedside nurses to assess the effectiveness of SOPs. The Content Validity Index (CVI) of SOP and checklists was 99.77%. Overall standardized Cronbach's alpha was calculated as 0.94. All the nurses felt that the SOP is useful. Valid and feasible SOP for drug administration to children through oral route along with valid and reliable checklist were developed. It is recommended to use this document for drug administration to children.

  17. Development and Assessment of Planetary Gear Unit for Experimental Prototype of Vertical Axis Wind Turbine

    Directory of Open Access Journals (Sweden)

    Urbahs A.

    2017-10-01

    Full Text Available The theoretical calculation for development of planetary gear unit of wind turbine (WT and its experimental tests are presented in the paper. Development of experimental prototypes from composite materials is essential to determine capability of element and its impact on feature. Two experimental scale prototypes of planetary gear unit for WT were developed for such purposes. Hall transducer, servomechanisms and optical tachometers were used to obtain results, comparison analysis of theoretical and actual data was performed as well as quality assessment of experimental prototypes of planetary gear unit. After kinematic and load analysis as well as control of rotation frequency, it is possible to declare that the unit is able to operate at designated quality. Theoretical calculations and test results obtained are used for industrial WT prototype development.

  18. Development and Assessment of Planetary Gear Unit for Experimental Prototype of Vertical Axis Wind Turbine

    Science.gov (United States)

    Urbahs, A.; Urbaha, M.; Carjova, K.

    2017-10-01

    The theoretical calculation for development of planetary gear unit of wind turbine (WT) and its experimental tests are presented in the paper. Development of experimental prototypes from composite materials is essential to determine capability of element and its impact on feature. Two experimental scale prototypes of planetary gear unit for WT were developed for such purposes. Hall transducer, servomechanisms and optical tachometers were used to obtain results, comparison analysis of theoretical and actual data was performed as well as quality assessment of experimental prototypes of planetary gear unit. After kinematic and load analysis as well as control of rotation frequency, it is possible to declare that the unit is able to operate at designated quality. Theoretical calculations and test results obtained are used for industrial WT prototype development.

  19. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  20. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  1. Development of Test Protocols for International Space Station Particulate Filters

    Science.gov (United States)

    Vijayakumar, R.; Green, Robert D.; Agui, Juan H.

    2015-01-01

    Air quality control on the International Space Station (ISS) is a vital requirement for maintaining a clean environment for the crew and the hardware. This becomes a serious challenge in pressurized space compartments since no outside air ventilation is possible, and a larger particulate load is imposed on the filtration system due to lack of gravitational settling. The ISS Environmental Control and Life Support System (ECLSS) uses a filtration system that has been in use for over 14 years and has proven to meet this challenge. The heart of this system is a traditional High-Efficiency Particulate Air (HEPA) filter configured to interface with the rest of the life support elements and provide effective cabin filtration. The filter element for this system has a non-standard cross-section with a length-to-width ratio (LW) of 6.6. A filter test setup was designed and built to meet industry testing standards. A CFD analysis was performed to initially determine the optimal duct geometry and flow configuration. Both a screen and flow straighter were added to the test duct design to improve flow uniformity and face velocity profiles were subsequently measured to confirm. Flow quality and aerosol mixing assessments show that the duct flow is satisfactory for the intended leak testing. Preliminary leak testing was performed on two different ISS filters, one with known perforations and one with limited use, and results confirmed that the testing methods and photometer instrument are sensitive enough to detect and locate compromised sections of an ISS BFE.Given the engineering constraints in designing spacecraft life support systems, it is anticipated that non-industry standard filters will be required in future designs. This work is focused on developing test protocols for testing the ISS BFE filters, but the methodology is general enough to be extended to other present and future spacecraft filters. These techniques for characterizing the test duct and perform leak testing

  2. Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

    2013-07-01

    To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

  3. Network protocol 'EPAP'; Network protokoru 'EPAP'

    Energy Technology Data Exchange (ETDEWEB)

    Kobori, T.; Fujita, F.; Iwamoto, S. [Fuji Electric Co. Ltd., Toyo (Japan)

    2000-10-10

    The Ethernet, a standard of information networks, has begun to be applied to the control local area network (LAN). To apply the Ethernet to the field level, Fuji Electric has newly developed the communication protocol 'Ethernet precision access protocol (EPAP)' in which a command/response method is structured on the user datagram protocol (UDP) to realize real time and high reliability. Further, we have implemented the EPAP on the bus interface module of the open PIO. This paper outlines the EPAP and its implementation. (author)

  4. Framework and indicator testing protocol for developing and piloting quality indicators for the UK quality and outcomes framework

    Directory of Open Access Journals (Sweden)

    Burke Martyn

    2011-08-01

    Full Text Available Abstract Background Quality measures should be subjected to a testing protocol before being used in practice using key attributes such as acceptability, feasibility and reliability, as well as identifying issues derived from actual implementation and unintended consequences. We describe the methodologies and results of an indicator testing protocol (ITP using data from proposed quality indicators for the United Kingdom Quality and Outcomes Framework (QOF. Methods The indicator testing protocol involved a multi-step and methodological process: 1 The RAND/UCLA Appropriateness Method, to test clarity and necessity, 2 data extraction from patients' medical records, to test technical feasibility and reliability, 3 diaries, to test workload, 4 cost-effectiveness modelling, and 5 semi-structured interviews, to test acceptability, implementation issues and unintended consequences. Testing was conducted in a sample of representative family practices in England. These methods were combined into an overall recommendation for each tested indicator. Results Using an indicator testing protocol as part of piloting was seen as a valuable way of testing potential indicators in 'real world' settings. Pilot 1 (October 2009-March 2010 involved thirteen indicators across six clinical domains and twelve indicators passed the indicator testing protocol. However, the indicator testing protocol identified a number of implementation issues and unintended consequences that can be rectified or removed prior to national roll out. A palliative care indicator is used as an exemplar of the value of piloting using a multiple attribute indicator testing protocol - while technically feasible and reliable, it was unacceptable to practice staff and raised concerns about potentially causing actual patient harm. Conclusions This indicator testing protocol is one example of a protocol that may be useful in assessing potential quality indicators when adapted to specific country health

  5. Managing Cybersecurity Research and Experimental Development: The REVO Approach

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available We present a systematic approach for managing a research and experimental development cybersecurity program that must be responsive to continuously evolving cybersecurity, and other, operational concerns. The approach will be of interest to research-program managers, academe, corporate leads, government leads, chief information officers, chief technology officers, and social and technology policy analysts. The approach is compatible with international standards and procedures published by the Organisation for Economic Co-operation and Development (OECD and the Treasury Board of Canada Secretariat (TBS. The key benefits of the approach are the following: i the breadth of the overall (cybersecurity space is described; ii depth statements about specific (cybersecurity challenges are articulated and mapped to the breadth of the problem; iii specific (cybersecurity initiatives that have been resourced through funding or personnel are tracked and linked to specific challenges; and iv progress is assessed through key performance indicators. Although we present examples from cybersecurity, the method may be transferred to other domains. We have found the approach to be rigorous yet adaptive to change; it challenges an organization to be explicit about the nature of its research and experimental development in a manner that fosters alignment with evolving business priorities, knowledge transfer, and partner engagement.

  6. Development of the Nuclear Ship Database. 1. Outline of the Nuclear Ship Experimental Database

    Energy Technology Data Exchange (ETDEWEB)

    Kyouya, Masahiko; Ochiai, Masa-aki [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Hashidate, Kouji

    1995-03-01

    We obtained the experimental data on the effects of the ship motions and the change in load and caused by the ship operations, the waves, the winds etc., to the nuclear power plant behavior, through the Power-up Tests and Experimental Voyages of the Nuclear Ship MUTSU. Moreover, we accumulated the techniques, the knowledge and others on the Nuclear Ship development at the each stage of the N.S. MUTSU Research and Development program, such as the design stage, the construction stage, the operation stage and others. These data, techniques, knowledge and others are the assembly of the experimental data and the experiences through the design, the construction and the operation of the first nuclear ship in JAPAN. It is important to keep and pigeonhole these products of the N.S. MUTSU program in order to utilize them effectively in the research and development of the advanced marine reactor, since there is no construction plan of the nuclear ship for the present in JAPAN. We have been carrying out the development of the Nuclear Ship Database System since 1991 for the purpose of effective utilization of the N.S. MUTSU products in the design study of the advanced marine reactors. The part of the Nuclear Ship Database System on the experimental data, called Nuclear Ship Experimental Database, was already accomplished and utilized since 1993. This report describes the outline and the use of the Nuclear Ship Experimental Database.The remaining part of the database system on the documentary data, called Nuclear Ship Documentary Database, are now under development. (author).

  7. Development of the Nuclear Ship Database. 1. Outline of the Nuclear Ship Experimental Database

    International Nuclear Information System (INIS)

    Kyouya, Masahiko; Ochiai, Masa-aki; Hashidate, Kouji.

    1995-03-01

    We obtained the experimental data on the effects of the ship motions and the change in load and caused by the ship operations, the waves, the winds etc., to the nuclear power plant behavior, through the Power-up Tests and Experimental Voyages of the Nuclear Ship MUTSU. Moreover, we accumulated the techniques, the knowledge and others on the Nuclear Ship development at the each stage of the N.S. MUTSU Research and Development program, such as the design stage, the construction stage, the operation stage and others. These data, techniques, knowledge and others are the assembly of the experimental data and the experiences through the design, the construction and the operation of the first nuclear ship in JAPAN. It is important to keep and pigeonhole these products of the N.S. MUTSU program in order to utilize them effectively in the research and development of the advanced marine reactor, since there is no construction plan of the nuclear ship for the present in JAPAN. We have been carrying out the development of the Nuclear Ship Database System since 1991 for the purpose of effective utilization of the N.S. MUTSU products in the design study of the advanced marine reactors. The part of the Nuclear Ship Database System on the experimental data, called Nuclear Ship Experimental Database, was already accomplished and utilized since 1993. This report describes the outline and the use of the Nuclear Ship Experimental Database.The remaining part of the database system on the documentary data, called Nuclear Ship Documentary Database, are now under development. (author)

  8. Time Error Analysis of SOE System Using Network Time Protocol

    International Nuclear Information System (INIS)

    Keum, Jong Yong; Park, Geun Ok; Park, Heui Youn

    2005-01-01

    To find the accuracy of time in the fully digitalized SOE (Sequence of Events) system, we used a formal specification of the Network Time Protocol (NTP) Version 3, which is used to synchronize time keeping among a set of distributed computers. Through constructing a simple experimental environments and experimenting internet time synchronization, we analyzed the time errors of local clocks of SOE system synchronized with a time server via computer networks

  9. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  10. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  11. Desensitization to clopidogrel: a tailor-made protocol.

    Science.gov (United States)

    Barreira, P; Cadinha, S; Malheiro, D; Moreira da Silva, J P

    2014-01-01

    Clopidogrel is an antiplatelet drug widely used for treatment and prevention of a variety of cardiovascular diseases. We report a successful desensitization to clopidogrel in a 70-year-old Caucasian man with delayed hypersensitivity (HS) reaction. He developed lip, hand and foot swelling, erythematous papular non-pruritic lesions and arthralgias 2 weeks after starting treatment with clopidogrel 75 mg/d. A 3-hour desensitization protocol was started, achieving a cumulative dose of 154 mg without any reaction, and a daily dose of 75 mg was recommended. On the 4th day, the patient developed skin lesions similar to the previously described. He was treated with topical steroids and oral antihistamines, and the daily dose of clopidogrel was reduced to 20 mg. A new desensitization protocol was established, with a slow dose increment, according to the patient's response. It was only possible to achieve the dose of 75 mg/d after 2 months. Although well tolerated by most patients, HS reactions with clopidogrel may occur and desensitization is rising as a safe alternative in those patients. In delayed reactions with cutaneous lesions, a slower desensitization protocol may be necessary, as in this case.

  12. Submission to the British Columbia government on the Kyoto Protocol

    International Nuclear Information System (INIS)

    2002-09-01

    The Business Council provided its comments concerning the Kyoto Protocol and climate change to the government of British Columbia, recommending that a clear position be established quickly on the matter. The adopted position should also be disseminated broadly to allow stake holders sufficient time to prepare for the upcoming meetings of the Joint Ministers and First Ministers. The federal government has announced that the decision on whether to ratify the Kyoto Protocol will be made before the end of 2002, and this decision will have numerous effects on the people of British Columbia, businesses, workers, and consumers alike. The Business Council of British Columbia believes that the unique interests of the province can best be protected by a proactive approach. Actions plans are being prepared by several of the other provinces and territories, who have already stated their position concerning the Kyoto Protocol. The long-term risks of climate change for British Columbia have not been determined nor have the elements of a provincial approach. The following elements should be included in British Columbia's position on the Kyoto Protocol, according to the Business Council of British Columbia: (1) a credible and cost-effective implementation plan that does not unduly burden the province and other jurisdictions must be developed before Canada decides to ratify the Protocol. British Columbia should go on the record stating it does not support the ratification of the Kyoto Protocol in its present form. (2) the province should advocate for a national approach to climate change that can be achieved within a reasonable time frame, reflects the long-term nature of the problem, and is in agreement with the economic development objectives of British Columbia, (3) a plan detailing how the province intends to deal with the growth of greenhouse gas emissions should supplement and support the position of the province on the Kyoto Protocol. Consumers and business should be engaged

  13. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  14. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  15. A protocol for the development of Mediterranean climate services based on the experiences of the CLIM-RUN case studies

    Science.gov (United States)

    Goodess, Clare; Ruti, Paolo; Rousset, Nathalie

    2014-05-01

    During the closing stages of the CLIM-RUN EU FP7 project on Climate Local Information in the Mediterranean region Responding to User Needs, the real-world experiences encountered by the case-study teams are being assessed and synthesised to identify examples of good practice and, in particular, to produce the CLIM-RUN protocol for the development of Mediterranean climate services. The specific case studies have focused on renewable energy (Morocco, Spain, Croatia, Cyprus), tourism (Savoie, Tunisia, Croatia, Cyprus) and wild fires (Greece) as well as one cross-cutting case study (Veneto region). They have been implemented following a common programme of local workshops, questionnaires and interviews, with Climate Expert Team and Stakeholder Expert Team members collaborating to identify and translate user needs and subsequently develop climate products and information. Feedback from stakeholders has been essential in assessing and refining these products. The protocol covers the following issues: the overall process and methodological key stages; identification and selection of stakeholders; communication with stakeholders; identification of user needs; translation of needs; producing products; assessing and refining products; methodologies for evaluating the economic value of climate services; and beyond CLIM-RUN - the lessons learnt. Particular emphasis is given to stakeholder analysis in the context of the participatory, bottom-up approach promoted by CLIM-RUN and to the iterative approach taken in the development of climate products. Recommendations are also made for an envisioned three-tier business model for the development of climate services involving climate, intermediary and stakeholder tiers.

  16. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  17. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  18. Experimental developments towards an ITER thermography diagnostic

    International Nuclear Information System (INIS)

    Reichle, R.; Brichard, B.; Escourbiac, F.; Gardarein, J.L.; Hernandez, D.; Le Niliot, C.; Rigollet, F.; Serra, J.J.; Badie, J.M.; van Ierschot, S.; Jouve, M.; Martinez, S.; Ooms, H.; Pocheau, C.; Rauber, X.; Sans, J.L.; Scheer, E.; Berghmans, F.; Decreton, M.

    2007-01-01

    In the course of the development of a concept for a spectrally resolving thermography diagnostic for the ITER divertor using optical fibres experimental development work has been carried out in three different areas. Firstly ZrF 4 fibres and hollow fibres (silica capillaries with internal AG/AgJ coating) were tested in a Co 60 irradiation facility under γ irradiation up to doses of 5 kGy and 27 kGy, respectively. The ZrF 4 fibres suffered more radiation induced degradation (>1 db/m) then the hollow fibres (0-0.4 db/m). Secondly multi-colour pyroreflectometry is being developed towards tokamak applicability. The emissivity and temperature of tungsten samples were measured in the range of 700-1500 o C. The angular working range for off normal observation of the method was 20-30 o . The working distance of the method has been be increased from cm to the m range. Finally, encouraging preliminary results have been obtained concerning the application of pulsed and modulated active thermography

  19. Novel Nano-Size Oxide Dispersion Strengthened Steels Development through Computational and Experimental Study

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Shizhong [Southern Univ. and A& M College, Baton Rouge, LA (United States)

    2016-05-30

    This report summarizes our recent works of theoretical modeling, simulation and experimental validation of the simulation results on the ferritic oxide dispersion strengthened (ODS) alloy research. The simulation of the stability and thermal dynamics simulation on potential thermal stable candidates were performed and related ODS samples were synthesized and characterized. The simulation methods and experimental texture validation techniques development, achievements already reached, course work development, students and postdoc training, and future improvement are briefly introduced.

  20. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  1. A communication protocol for mobile satellite systems affected by rain attenuation

    Science.gov (United States)

    Lay, Norman; Dessouky, Khaled

    1992-01-01

    A communication protocol is described that has been developed as part of a K/Ka-band mobile terminal breadboard system to be demonstrated through NASA's Advanced Communications Technology Satellite (ACTS) in 1993. The protocol is aimed at providing the means for enhancing link availability and continuity by supporting real-time data rate selection and changes during rain events. Particular attention is given to the system architecture; types of links, connections, and packets; the protocol procedures; and design rationales.

  2. Vertical jump in female and male basketball players--a review of observational and experimental studies.

    Science.gov (United States)

    Ziv, Gal; Lidor, Ronnie

    2010-05-01

    The main purpose of this article was to review a series of studies (n=26; 15 observational and 11 experimental) examining vertical jump (VJ) performances in female and male basketball players. Information on the tests used in these studies and their specific protocols, and the training programs conducted to improve VJ ability in elite basketball players, was assessed. It was found that vertical jump values varied greatly, from 22 to 48 cm in female players and from 40 to 75 cm in male players. These large variations can be explained mostly by the differences in testing protocols (each VJ protocol examined different physiological pathways) and skill level of players. The variations in VJ values among studies were greatly reduced when they used the same protocol. In addition, short plyometric training sessions as part of the strength and conditioning program were found to enhance VJ performances in basketball players. Based on the reviewed studies, five limitations associated with the testing protocols and the strength and conditioning programs used in the studies were outlined, among them the use of multiple testing protocols and lack of experimental studies. Three recommendations for basketball and strength and conditioning coaches were suggested, for one of which was including plyometric training in the annual training program. 2009 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  3. Portable abdomen radiography. Moving to thickness-based protocols

    International Nuclear Information System (INIS)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A.

    2018-01-01

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  4. Portable abdomen radiography. Moving to thickness-based protocols

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A. [University of Chicago Medical Center, Department of Radiology, Chicago, IL (United States)

    2018-02-15

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  5. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  6. Development of a Competent and Trouble Free DNA Isolation Protocol for Downstream Genetic Analyses in Glycine Species

    Directory of Open Access Journals (Sweden)

    Muhammad Amjad Nawaz

    2016-08-01

    Full Text Available Extraction of deoxyribose nucleic acid (DNA from plants is preliminary step in molecular biology. Fast and cost effective genomic DNA isolation from Glycine species for downstream application is a major bottleneck. Here we report a high throughput and trouble free method for genomic DNA extraction from leaf and seeds of Glycine species with high quality and quantity. Protocol reports the optimization by employing different concentrations of CTAB and PVP in extraction buffer. Efficiency of optimized protocol was compared with frequently used DNA extraction methods. Wide adoptability and utility of this protocol was confirmed by DNA extraction from leaves as well as seeds of G. max, G. soja, G. tomentella and G. latifolia. Extracted DNA was successfully subjected to PCR amplification of five microsatellite markers and four putative glycosyltransferase genes. DNA extraction protocol is reproducible, trouble free, rapid and can be adopted for plant molecular biology applications.

  7. Development of software for clinical protocols in nuclear medicine. Final report for the period 21 November 1994 - 21 November 1995

    International Nuclear Information System (INIS)

    Todd-Pokropek, A.

    1996-01-01

    After two technical contracts of IAEA, a portable image processing software (PIP) has been developed and some clinical protocols for nuclear medicine studies with IBM PCs which are connected to analogue gamma cameras. In addition, a suitable front end for driving some PC/gamma camera interface cards have been successfully tested and extended. The on-line help facilities and the user interface within PIP was remarkably improved, for medical physicists as developers as well as for technologists as users for routine studies

  8. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per

  9. Building America House Simulation Protocols (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  10. Applying the Intervention Mapping protocol to develop a kindergarten-based, family-involved intervention to increase European preschool children's physical activity levels: the ToyBox-study.

    Science.gov (United States)

    De Craemer, M; De Decker, E; De Bourdeaudhuij, I; Verloigne, M; Duvinage, K; Koletzko, B; Ibrügger, S; Kreichauf, S; Grammatikaki, E; Moreno, L; Iotova, V; Socha, P; Szott, K; Manios, Y; Cardon, G

    2014-08-01

    Although sufficient physical activity is beneficial for preschoolers' health, activity levels in most preschoolers are low. As preschoolers spend a considerable amount of time at home and at kindergarten, interventions should target both environments to increase their activity levels. The aim of the current paper was to describe the six different steps of the Intervention Mapping protocol towards the systematic development and implementation of the physical activity component of the ToyBox-intervention. This intervention is a kindergarten-based, family-involved intervention implemented across six European countries. Based on the results of literature reviews and focus groups with parents/caregivers and kindergarten teachers, matrices of change objectives were created. Then, theory-based methods and practical strategies were selected to develop intervention materials at three different levels: (i) individual level (preschoolers); (ii) interpersonal level (parents/caregivers) and (iii) organizational level (teachers). This resulted in a standardized intervention with room for local and cultural adaptations in each participating country. Although the Intervention Mapping protocol is a time-consuming process, using this systematic approach may lead to an increase in intervention effectiveness. The presented matrices of change objectives are useful for future programme planners to develop and implement an intervention based on the Intervention Mapping protocol to increase physical activity levels in preschoolers. © 2014 World Obesity.

  11. [Development of clinical trial education program for pharmaceutical science students through small group discussion and role-playing using protocol].

    Science.gov (United States)

    Imakyure, Osamu; Shuto, Hideki; Nishikawa, Fumi; Hagiwara, Yoshifuka; Inoue, Sachiko; Koyanagi, Taeko; Hirakawa, Masaaki; Kataoka, Yasufumi

    2010-08-01

    The acquirement of basic knowledge of clinical trials and professional attitude in their practices is a general instructional objective in the Model Core Curriculum for Pharmaceutical Education. Unfortunately, the previous program of clinical trial education was not effective in the acquirement of a professional attitude in their practices. Then, we developed the new clinical trial education program using protocol through small group discussion (SGD) and roll-playing. Our program consists of 7 steps of practical training. In step 1, the students find some problems after presentation of the protocol including case and prescription. In step 2, they analyse the extracted problems and share the information obtained in SGD. In steps 3 and 5, five clinical case scenarios are presented to the students and they discuss which case is suitable for entry to the clinical trial or which case corresponds to the discontinuance criteria in the present designed protocol. In steps 4 and 6, the roll-playing is performed by teachers and students as doctors and clinical research coordinators (CRC) respectively. Further, we conducted a trial practice based on this program for the students. In the student's self-evaluation into five grades, the average score of the skill acquisition level in each step was 3.8-4.7 grade. Our clinical trial education program could be effective in educating the candidates for CRC or clinical pharmacists.

  12. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  13. Evaluation of an app-based stress protocol

    Directory of Open Access Journals (Sweden)

    Noeh Claudius

    2016-09-01

    Full Text Available Stress is a major influence on the quality of life in our fast-moving society. This paper describes a standardized and contemporary protocol that is capable of inducing moderate psychological stress in a laboratory setting. Furthermore, it evaluates its effects on physiological biomarkers. The protocol called “THM-Stresstest” mainly consists of a rest period (30 min, an app-based stress test under the surveillance of an audience (4 min and a regeneration period (32 min. We investigated 12 subjects to evaluate the developed protocol. We could show significant changes in heart rate variability, electromyography, electro dermal activity and salivary cortisol and α-amylase. From this data we conclude that the THM-Stresstest can serve as a psychobiological tool for provoking responses in the cardiovascular-, the endocrine and exocrine system as well as the sympathetic part of the central nervous system.

  14. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  15. Development and Validation of a Rubric for Diagnosing Students’ Experimental Design Knowledge and Difficulties

    Science.gov (United States)

    Dasgupta, Annwesa P.; Anderson, Trevor R.

    2014-01-01

    It is essential to teach students about experimental design, as this facilitates their deeper understanding of how most biological knowledge was generated and gives them tools to perform their own investigations. Despite the importance of this area, surprisingly little is known about what students actually learn from designing biological experiments. In this paper, we describe a rubric for experimental design (RED) that can be used to measure knowledge of and diagnose difficulties with experimental design. The development and validation of the RED was informed by a literature review and empirical analysis of undergraduate biology students’ responses to three published assessments. Five areas of difficulty with experimental design were identified: the variable properties of an experimental subject; the manipulated variables; measurement of outcomes; accounting for variability; and the scope of inference appropriate for experimental findings. Our findings revealed that some difficulties, documented some 50 yr ago, still exist among our undergraduate students, while others remain poorly investigated. The RED shows great promise for diagnosing students’ experimental design knowledge in lecture settings, laboratory courses, research internships, and course-based undergraduate research experiences. It also shows potential for guiding the development and selection of assessment and instructional activities that foster experimental design. PMID:26086658

  16. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  17. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  18. Experimental Measurement-Device-Independent Entanglement Detection

    Science.gov (United States)

    Nawareg, Mohamed; Muhammad, Sadiq; Amselem, Elias; Bourennane, Mohamed

    2015-02-01

    Entanglement is one of the most puzzling features of quantum theory and of great importance for the new field of quantum information. The determination whether a given state is entangled or not is one of the most challenging open problems of the field. Here we report on the experimental demonstration of measurement-device-independent (MDI) entanglement detection using witness method for general two qubits photon polarization systems. In the MDI settings, there is no requirement to assume perfect implementations or neither to trust the measurement devices. This experimental demonstration can be generalized for the investigation of properties of quantum systems and for the realization of cryptography and communication protocols.

  19. Systematic Review Protocol for the IRIS Chloroform Assessment (Inhalation) (Preliminary Assessment Materials)

    Science.gov (United States)

    In January 2018, EPA released the Systematic Review Protocol for the IRIS Chloroform Assessment (Inhalation). As part of developing a draft IRIS assessment, EPA presents a methods document, referred to as the protocol, for conducting a chemical-specific systematic revie...

  20. Postnatal development of the hippocampal dentate gyrus under normal and experimental conditions

    International Nuclear Information System (INIS)

    Altman, J.; Bayer, S.

    Studies on postnatal maturation of the dentate gyrus are reviewed. Some topics discussed are: normal development of the dentate gyrus, cytogenesis, morphogenesis, synaptogenesis, gleogenesis, myelogenesis, development of the gyrus under experimental conditions, and effects of x radiation on cytogenesis and morphogenesis