WorldWideScience

Sample records for nopho-all-1992 protocol frequent

  1. Insect Venom Immunotherapy: Analysis of the Safety and Tolerance of 3 Buildup Protocols Frequently Used in Spain.

    Science.gov (United States)

    Gutiérrez Fernández, D; Moreno-Ancillo, A; Fernández Meléndez, S; Domínguez-Noche, C; Gálvez Ruiz, P; Alfaya Arias, T; Carballada González, F; Alonso Llamazares, A; Marques Amat, L; Vega Castro, A; Antolín Amérigo, D; Cruz Granados, S; Ruiz León, B; Sánchez Morillas, L; Fernández Sánchez, J; Soriano Gomis, V; Borja Segade, J; Dalmau Duch, G; Guspi Bori, R; Miranda Páez, A

    2016-01-01

    Hymenoptera venom immunotherapy (VIT) is an effective treatment but not one devoid of risk, as both local and systemic adverse reactions may occur, especially in the initial phases. We compared the tolerance to 3 VIT buildup protocols and analyzed risk factors associated with adverse reactions during this phase. We enrolled 165 patients divided into 3 groups based on the buildup protocol used (3, 4, and 9 weeks). The severity of systemic reactions was evaluated according to the World Allergy Organization model. Results were analyzed using exploratory descriptive statistics, and variables were compared using analysis of variance. Adverse reactions were recorded in 53 patients (32%) (43 local and 10 systemic). Local reactions were immediate in 27 patients (63%) and delayed in 16 (37%). The severity of the local reaction was slight/moderate in 15 patients and severe in 13. Systemic reactions were grade 1-2. No significant association was found between the treatment modality and the onset of local or systemic adverse reactions or the type of local reaction. We only found a statistically significant association between severity of the local reaction and female gender. As for the risk factors associated with systemic reactions during the buildup phase, we found no significant differences in values depending on the protocol used or the insect responsible. The buildup protocols compared proved to be safe and did not differ significantly from one another. In the population studied, patients undergoing the 9-week schedule presented no systemic reactions. Therefore, this protocol can be considered the safest approach.

  2. The effectiveness of a single-stage versus traditional three-staged protocol of hospital disinfection at eradicating vancomycin-resistant Enterococci from frequently touched surfaces.

    Science.gov (United States)

    Friedman, N Deborah; Walton, Aaron L; Boyd, Sarah; Tremonti, Christopher; Low, Jillian; Styles, Kaylene; Harris, Owen; Alfredson, David; Athan, Eugene

    2013-03-01

    Environmental contamination is a reservoir for vancomycin-resistant enterococcus (VRE) in hospitals. Environmental sampling of surfaces was undertaken anytime before disinfection and 1 hour after disinfection utilizing a sodium dichloroisocyanurate-based, 3-staged protocol (phase 1) or benzalkonium chloride-based, single-stage clean (phase 2). VRE colonization and infection rates are presented from 2010 to 2011, and audits of cleaning completeness were also analyzed. Environmental samples collected before disinfection were significantly more likely to be contaminated with VRE during phase 1 than phase 2: 25.2% versus 4.6%, respectively; odds ratio (OR), 7.01 (P benzalkonium chloride-based product for disinfection. This reduction in VRE may be due to a new disinfection product, more attention to the thoroughness of cleaning, or other supplementary efforts in our institution. Copyright © 2013 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  3. Frequent Questions on Recycling

    Science.gov (United States)

    This is a list of frequent questions on recycling, broken down into five categories. These are answers to common questions that EPA has received from press and web inquiries. This list is located on the Reduce, Reuse, Recycle website.

  4. Scalable Frequent Subgraph Mining

    KAUST Repository

    Abdelhamid, Ehab

    2017-01-01

    Given an input graph, the Frequent Subgraph Mining (FSM) task finds all subgraphs with frequencies exceeding a given threshold. FSM is crucial for graph analysis, and it is an essential building block in a variety

  5. Mining frequent binary expressions

    NARCIS (Netherlands)

    Calders, T.; Paredaens, J.; Kambayashi, Y.; Mohania, M.K.; Tjoa, A.M.

    2000-01-01

    In data mining, searching for frequent patterns is a common basic operation. It forms the basis of many interesting decision support processes. In this paper we present a new type of patterns, binary expressions. Based on the properties of a specified binary test, such as reflexivity, transitivity

  6. Frequent hemodialysis in children.

    Science.gov (United States)

    Warady, Bradley A; Fischbach, Michel; Geary, Denis; Goldstein, Stuart L

    2007-07-01

    Frequent hemodialysis is currently conducted in a limited number of pediatric dialysis centers. However, the preliminary experience with children who have undergone procedures such as "daily" intensive hemodiafiltration and nocturnal hemodialysis has been positive, with the allowance for unrestricted diets and fluid intake, the lack of need for phosphate binders, excellent metabolic and blood pressure control, and, in the case of hemodiafiltration, excellent growth. The provision of frequent daily hemodialysis with the NxStage System has also recently been introduced to pediatrics. An overview about what is currently understood regarding the technical and clinical application of these approaches to therapy for children with end-stage renal disease form the basis for this article and highlight the impact of the procedures to date and the need for additional experience and collaborative data collection.

  7. Scalable Frequent Subgraph Mining

    KAUST Repository

    Abdelhamid, Ehab

    2017-06-19

    A graph is a data structure that contains a set of nodes and a set of edges connecting these nodes. Nodes represent objects while edges model relationships among these objects. Graphs are used in various domains due to their ability to model complex relations among several objects. Given an input graph, the Frequent Subgraph Mining (FSM) task finds all subgraphs with frequencies exceeding a given threshold. FSM is crucial for graph analysis, and it is an essential building block in a variety of applications, such as graph clustering and indexing. FSM is computationally expensive, and its existing solutions are extremely slow. Consequently, these solutions are incapable of mining modern large graphs. This slowness is caused by the underlying approaches of these solutions which require finding and storing an excessive amount of subgraph matches. This dissertation proposes a scalable solution for FSM that avoids the limitations of previous work. This solution is composed of four components. The first component is a single-threaded technique which, for each candidate subgraph, needs to find only a minimal number of matches. The second component is a scalable parallel FSM technique that utilizes a novel two-phase approach. The first phase quickly builds an approximate search space, which is then used by the second phase to optimize and balance the workload of the FSM task. The third component focuses on accelerating frequency evaluation, which is a critical step in FSM. To do so, a machine learning model is employed to predict the type of each graph node, and accordingly, an optimized method is selected to evaluate that node. The fourth component focuses on mining dynamic graphs, such as social networks. To this end, an incremental index is maintained during the dynamic updates. Only this index is processed and updated for the majority of graph updates. Consequently, search space is significantly pruned and efficiency is improved. The empirical evaluation shows that the

  8. An Internet-based intervention for eating disorders consisting of automated computer-tailored feedback with or without supplemented frequent or infrequent support from a coach: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Aardoom, Jiska J; Dingemans, Alexandra E; Spinhoven, Philip; Hakkaart-van Roijen, Leona; Van Furth, Eric F

    2013-10-17

    Several Internet-based interventions for eating disorders have shown their effectiveness. Still, there is a need to refine such interventions given that most existing programs seem to be limited by their static 'one-size-fits-all' approach. 'Featback', an Internet-based intervention for symptoms of eating disorders provides a more individualized approach. It consists of several components (psychoeducation, a fully automated monitoring and feedback system, and support from a coach), which can be matched to participants' needs and preferences. Until now, it is unclear whether online self-help interventions for eating disorders with support are more effective than those without. The aims of the current study are i) to examine the relative effectiveness of (the different components of) Featback; ii) to examine predictors, moderators and mediators of intervention responses; iii) to report on practical experiences with Featback; and iv) to examine the cost-effectiveness of Featback. Individuals aged 16 years or older, with mild to severe eating disorder symptoms will be randomized to one of the four study conditions. In condition one, participants receive the basic version of Featback, consisting of psychoeducation and a fully automated monitoring and feedback system. In conditions two and three, participants receive the basic version of Featback supplemented with the possibility of infrequent (weekly) or frequent (three times a week) e-mail, chat, or Skype support from a coach, respectively. The fourth condition is a waiting list control condition. Participants are assessed at baseline, post-intervention (8 weeks), and at 3- and 6-month follow-up (the latter except for participants in the waiting list control condition). Primary outcome measures are disordered eating behaviors and attitudes. Secondary outcome measures are (eating disorder-related) quality of life, self-stigma of seeking help, self-esteem, mastery and support, symptoms of depression and anxiety

  9. Akutt lymfatisk leukemi hos barn i Norge 1992-2000

    DEFF Research Database (Denmark)

    Kolmannskog, Svein; Flaegstad, Trond; Helgestad, Jon

    2007-01-01

    BACKGROUND: Acute lymphoblastic leukemia is the most common malignancy in childhood. The survival rate has increased steadily over the last 40 years. MATERIAL AND METHODS: All children aged 0-15 years and diagnosed in Norway in the period 1992-2000, were included in the study (n = 301......). The patients were followed up until 1.1. 2005. RESULTS AND INTERPRETATION: The diagnosis was made in 301 children, 33 new cases per year (range 24 to 40) on average. The peak incidence was between 2 and 5 years. Four of 6 infants with acute lymphoblastic leukemia and all 4 with mature B-cell leukemia are alive....... Two of the remaining 291 children died before treatment was started. 289 were all treated according to the common Nordic NOPHO-ALL 1992 protocol. All children achieved remission (99.7%), except for one who died before remission was achieved. 55 children (19%) relapsed. Radiation to the brain as part...

  10. Climate Leadership Awards Frequent Questions

    Science.gov (United States)

    Provides answers to frequently asked questions regarding the Climate Leadership Awards, sponsored by EPA's Center for Corporate Climate Leadership with co-sponsorship from the Center for Climate and Energy Solutions and The Climate Registry.

  11. The Most Frequent English Homonyms

    Science.gov (United States)

    Parent, Kevin

    2012-01-01

    This article distinguishes homonymy, homophony, homography and polysemy, and provides a list of the most frequent homonyms using corpus-derived data. For most of the homonyms, the most common meaning accounts for 90% or more of the total uses of the form. The pedagogical and research implications of these findings are discussed. (Contains 5…

  12. Corporate Governance Frequently Asked Questions

    OpenAIRE

    International Finance Corporation

    2016-01-01

    This guidebook is designed to address common questionson corporate governance that are frequently asked byowners and managers of companies in the Middle Eastand North Africa (MENA) region. It familiarizes readerswith the basic concepts of corporate governance,providing a comprehensive overview of the subject matter,using case studies as practical examples of corporategovernance application...

  13. The frequent occurrence of MIC

    Energy Technology Data Exchange (ETDEWEB)

    Graff, Matthias [Gesellschaft fuer Technische Mikrobiologie und Hygieneueberwachung - Dr. Graff und Partner, Stadtweg 9, D-38176 Wendeburg (Germany); Neubert, Volkmar [Institut fuer Materialpruefung und Werkstofftechnik Dr. Doelling und Dr. Neubert GmbH, Freiberger Strasse 1, D-38678 Clausthal-Zellerfeld (Germany)

    2004-07-01

    Microbial induced corrosion (MIC) is not as rare as many materials scientist and corrosion practitioners do believe. It is not an exotic and scarce event, but can be found frequently in many fields of corrosion research, provided that it is looked for. The reason for the relatively few descriptions of MIC cases seems to be the fact, that the microbiological approach is not widely known and applied in the world of materials science. MIC is not so much a corrosion mechanism on its own, but it enhances the corrosion rates of the 'normal' mechanisms to such an extent, that in some cases 'incredible' fast corrosion progress can be observed. The reason is the microorganisms' function as bio-catalysts: Chemical reactions, which are very slow under normal chemical conditions can be highly accelerated by living organisms. Besides that, several microorganisms do produce very corrosive substances which in natural environments do not occur without the activity of microorganisms, e. g. sulfuric or nitric acid. We want to point out, that it can be very worthy to take microbial induced corrosion into account. MIC is not the general answer for all unsolved corrosion problems, but to think about it helps in many corrosion cases as the authors had to experience. The initial indication for the presence of MIC are markedly increased corrosion rates. In the following, some of our 'lessons' are presented as short case studies: Two of them deal with steel corrosion characterized by increased corrosion rates. The third example presents corrosion damage of aluminium structures, where from a technical point of view corrosion was not expected, least of all microbial induced corrosion. (authors)

  14. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  15. Frequently Asked Questions about Bunion Surgery

    Science.gov (United States)

    ... A | Print | Share Frequently Asked Questions About Bunion Surgery Here are some frequently asked questions (FAQs) and ... best for you. 5. How can I avoid surgery? Sometimes observation of the bunion is all that ...

  16. Frequently Asked Questions about Radiation Emergencies

    Science.gov (United States)

    ... Frequently Asked Questions (FAQ) about Radiation Emergencies Language: English (US) Español (Spanish) Recommend on Facebook Tweet Share Compartir For more information on radiation, go to the Radiation Dictionary . Get Inside: Why should I get inside during ...

  17. Frequent Pattern Mining Algorithms for Data Clustering

    DEFF Research Database (Denmark)

    Zimek, Arthur; Assent, Ira; Vreeken, Jilles

    2014-01-01

    that frequent pattern mining was at the cradle of subspace clustering—yet, it quickly developed into an independent research field. In this chapter, we discuss how frequent pattern mining algorithms have been extended and generalized towards the discovery of local clusters in high-dimensional data......Discovering clusters in subspaces, or subspace clustering and related clustering paradigms, is a research field where we find many frequent pattern mining related influences. In fact, as the first algorithms for subspace clustering were based on frequent pattern mining algorithms, it is fair to say....... In particular, we discuss several example algorithms for subspace clustering or projected clustering as well as point out recent research questions and open topics in this area relevant to researchers in either clustering or pattern mining...

  18. Suicide in America: Frequently Asked Questions

    Science.gov (United States)

    ... Trials? Finding Help Reprints For More Information Share Suicide in America: Frequently Asked Questions Download PDF Download ... a week. Text “HOME” to 741741. What Is Suicide? Suicide is when people direct violence at themselves ...

  19. Frequent flyer business travelers: major exposure hazards.

    Science.gov (United States)

    Tompkins, Olga S; Randolph, Susan A; Ostendorf, Judith S

    2005-02-01

    Bagshaw (2004) notes "the modern commercial aircraft cabin is maintained with adequate environmental control for the comfort of most healthy individuals" (p. 417). Occupational health nurses frequently deal with a population that may include unhealthy individuals or those with pre-existing conditions. It is critical for occupational health nurses to stay current with major hazards faced by frequent flyer business travelers to assist in identifying and preventing adverse health effects associated with these exposures.

  20. Development of a frequent heartburn index.

    Science.gov (United States)

    Stull, Donald E; van Hanswijck de Jonge, Patricia; Houghton, Katherine; Kocun, Christopher; Sandor, David W

    2011-09-01

    The aim of this study is to develop and validate a brief instrument for the measurement of overall psychosocial impact of frequent heartburn (heartburn experienced 2+ times weekly) in the general U.S. population, yielding a single, composite score. Item reduction and psychometric analyses of an existing Frequent Heartburn (FHB) Survey, a 52-item, 13-domain, patient-reported outcomes (PRO) survey assessing the impact of frequent heartburn on psychosocial quality of life. Item reduction resulted in 9 items from the original FHB Survey measuring all domains. All retained items in this full Frequent Heartburn Index (FHBI-Full) had moderate to strong factor loadings on the underlying factor (range: 0.66-0.85) and acceptable overall model fit (CFI = 0.93, SRMR = 0.04). Coefficient alpha was 0.92. A shorter FHBI (FHBI-Brief) was created that excludes the two employment-related items. The FHBI-Brief had a coefficient alpha of 0.90. Both FHBI versions have good psychometric properties and capture a full range of psychosocial effects of frequent heartburn. Normed national scores for the FHBI are available against which an individual can compare their own FHBI score. The FHBI-Full and FHBI-Brief show promise as PRO instruments that may help individuals and clinicians better understand the effect of frequent heartburn on psychosocial functioning.

  1. Performance Evaluation of Frequent Subgraph Discovery Techniques

    Directory of Open Access Journals (Sweden)

    Saif Ur Rehman

    2014-01-01

    Full Text Available Due to rapid development of the Internet technology and new scientific advances, the number of applications that model the data as graphs increases, because graphs have highly expressive power to model a complicated structure. Graph mining is a well-explored area of research which is gaining popularity in the data mining community. A graph is a general model to represent data and has been used in many domains such as cheminformatics, web information management system, computer network, and bioinformatics, to name a few. In graph mining the frequent subgraph discovery is a challenging task. Frequent subgraph mining is concerned with discovery of those subgraphs from graph dataset which have frequent or multiple instances within the given graph dataset. In the literature a large number of frequent subgraph mining algorithms have been proposed; these included FSG, AGM, gSpan, CloseGraph, SPIN, Gaston, and Mofa. The objective of this research work is to perform quantitative comparison of the above listed techniques. The performances of these techniques have been evaluated through a number of experiments based on three different state-of-the-art graph datasets. This novel work will provide base for anyone who is working to design a new frequent subgraph discovery technique.

  2. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  3. Frequent price changes under menu costs

    DEFF Research Database (Denmark)

    Hansen, Per Svejstrup

    1999-01-01

    , the price may be changed more frequent in the short run, and in the long run it definitely will. Hence, observing frequent price changes is not necessarily inconsistent with a firm operating under menu costs. This paper relies on an article by Dixit (1991), (Review of Economic studies, 58, 141......This paper investigates the effect of uncertainty on a single firm's pricing behaviour in a dynamic menu cost model that results in (S,s)-rules where the price is fixed inside a band. It will be demonstrated that even though the band of inaction widens in response to increased uncertainty...

  4. Frequently cited journals in forensic psychology.

    Science.gov (United States)

    Black, Steve

    2012-02-01

    Works cited in six forensic psychology journals published 2008-2010 were counted to identify the most frequently cited journals. The sample of works cited (N = 21,776) was not a definitive ranked list of important journals in forensic psychology, but was large enough to indicate high-impact journals. The list of frequently cited publications included more general psychiatry and psychology journals than titles specific to forensic psychology. The implications of the proportion of general versus specific titles for collections supporting research in forensic psychology were discussed.

  5. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  6. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  7. A frequent flyer program for nuclear mythology

    International Nuclear Information System (INIS)

    Robertson, J.A.L.

    1997-01-01

    The anti-nuclear literature contains many erroneous and misleading allegations, collectively constituting a mythology. These are repeated endlessly, however often they are refuted, and are quoted uncritically by the media. Many are collected here, together with my rebuttals. For an explanation of the use here of the term 'frequent flyers', read on... (author)

  8. IMS Learning Design Frequently Asked Questions

    NARCIS (Netherlands)

    Tattersall, Colin; Manderveld, Jocelyn; Hummel, Hans; Sloep, Peter; Koper, Rob; De Vries, Fred

    2004-01-01

    This list of frequently asked questions was composed on the basis of questions asked of the Educational Technology Expertise Centrum. The questions addessed are: Where can I find the IMS Learning Design Specification? What is meant by the phrase “Learning Design”? What is the IMS LD Specification

  9. Treatment of Anthrax Disease Frequently Asked Questions

    Energy Technology Data Exchange (ETDEWEB)

    Judd, Kathleen S.; Young, Joan E.; Lesperance, Ann M.; Malone, John D.

    2010-05-14

    This document provides a summary of Frequently Asked Questions (FAQs) on the treatment of anthrax disease caused by a wide-area release of Bacillus anthracis spores as an act bioterrorism. These FAQs are intended to provide the public health and medical community, as well as others, with guidance and communications to support the response and long-term recovery from an anthrax event.

  10. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  11. Frequent methodological errors in clinical research.

    Science.gov (United States)

    Silva Aycaguer, L C

    2018-03-07

    Several errors that are frequently present in clinical research are listed, discussed and illustrated. A distinction is made between what can be considered an "error" arising from ignorance or neglect, from what stems from a lack of integrity of researchers, although it is recognized and documented that it is not easy to establish when we are in a case and when in another. The work does not intend to make an exhaustive inventory of such problems, but focuses on those that, while frequent, are usually less evident or less marked in the various lists that have been published with this type of problems. It has been a decision to develop in detail the examples that illustrate the problems identified, instead of making a list of errors accompanied by an epidermal description of their characteristics. Copyright © 2018 Elsevier España, S.L.U. y SEMICYUC. All rights reserved.

  12. Botulism: A Frequently Forgotten Old Malady

    Directory of Open Access Journals (Sweden)

    Teguh Thajeb

    2007-09-01

    Full Text Available A frequently forgotten old malady called botulism has been recognized for more than a century. This ailment occurs worldwide, afflicts human of all age groups from infants to elderly and affects Oriental people more often in several regions of China. Occurrence in Taiwan is uncommon, and therefore, it is often overlooked. The outbreaks of human botulism in various regions of the world, the clinical types, the molecular mechanisms, and the electrophysiologic findings will be highlighted.

  13. Discovering More Accurate Frequent Web Usage Patterns

    OpenAIRE

    Bayir, Murat Ali; Toroslu, Ismail Hakki; Cosar, Ahmet; Fidan, Guven

    2008-01-01

    Web usage mining is a type of web mining, which exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web users. As in classical data mining, data preparation and pattern discovery are the main issues in web usage mining. The first phase of web usage mining is the data processing phase, which includes the session reconstruction operation from server logs. Session reconstruction success directly affects the quality of the frequent patterns disc...

  14. [Childhood acute lymphoblastic leukemia in Norway 1992-2000].

    Science.gov (United States)

    Kolmannskog, Svein; Flaegstad, Trond; Helgestad, Jon; Hellebostad, Marit; Zeller, Bernward; Glomstein, Anders

    2007-05-31

    Acute lymphoblastic leukemia is the most common malignancy in childhood. The survival rate has increased steadily over the last 40 years. All children aged 0-15 years and diagnosed in Norway in the period 1992-2000, were included in the study (n = 301). The patients were followed up until 1.1. 2005. The diagnosis was made in 301 children, 33 new cases per year (range 24 to 40) on average. The peak incidence was between 2 and 5 years. Four of 6 infants with acute lymphoblastic leukemia and all 4 with mature B-cell leukemia are alive. Two of the remaining 291 children died before treatment was started. 289 were all treated according to the common Nordic NOPHO-ALL 1992 protocol. All children achieved remission (99.7%), except for one who died before remission was achieved. 55 children (19%) relapsed. Radiation to the brain as part of central nervous system prophylaxis was given to just 10% of the children. The 10-year event-free survival (p-EFS) was 76%, and 244 of 289 (84%) were alive 4-13 years after the diagnosis was made. The data are comparable with the best international results.

  15. Frequent video game players resist perceptual interference.

    Directory of Open Access Journals (Sweden)

    Aaron V Berard

    Full Text Available Playing certain types of video games for a long time can improve a wide range of mental processes, from visual acuity to cognitive control. Frequent gamers have also displayed generalized improvements in perceptual learning. In the Texture Discrimination Task (TDT, a widely used perceptual learning paradigm, participants report the orientation of a target embedded in a field of lines and demonstrate robust over-night improvement. However, changing the orientation of the background lines midway through TDT training interferes with overnight improvements in overall performance on TDT. Interestingly, prior research has suggested that this effect will not occur if a one-hour break is allowed in between the changes. These results have suggested that after training is over, it may take some time for learning to become stabilized and resilient against interference. Here, we tested whether frequent gamers have faster stabilization of perceptual learning compared to non-gamers and examined the effect of daily video game playing on interference of training of TDT with one background orientation on perceptual learning of TDT with a different background orientation. As a result, we found that non-gamers showed overnight performance improvement only on one background orientation, replicating previous results with the interference in TDT. In contrast, frequent gamers demonstrated overnight improvements in performance with both background orientations, suggesting that they are better able to overcome interference in perceptual learning. This resistance to interference suggests that video game playing not only enhances the amplitude and speed of perceptual learning but also leads to faster and/or more robust stabilization of perceptual learning.

  16. Frequent video game players resist perceptual interference.

    Science.gov (United States)

    Berard, Aaron V; Cain, Matthew S; Watanabe, Takeo; Sasaki, Yuka

    2015-01-01

    Playing certain types of video games for a long time can improve a wide range of mental processes, from visual acuity to cognitive control. Frequent gamers have also displayed generalized improvements in perceptual learning. In the Texture Discrimination Task (TDT), a widely used perceptual learning paradigm, participants report the orientation of a target embedded in a field of lines and demonstrate robust over-night improvement. However, changing the orientation of the background lines midway through TDT training interferes with overnight improvements in overall performance on TDT. Interestingly, prior research has suggested that this effect will not occur if a one-hour break is allowed in between the changes. These results have suggested that after training is over, it may take some time for learning to become stabilized and resilient against interference. Here, we tested whether frequent gamers have faster stabilization of perceptual learning compared to non-gamers and examined the effect of daily video game playing on interference of training of TDT with one background orientation on perceptual learning of TDT with a different background orientation. As a result, we found that non-gamers showed overnight performance improvement only on one background orientation, replicating previous results with the interference in TDT. In contrast, frequent gamers demonstrated overnight improvements in performance with both background orientations, suggesting that they are better able to overcome interference in perceptual learning. This resistance to interference suggests that video game playing not only enhances the amplitude and speed of perceptual learning but also leads to faster and/or more robust stabilization of perceptual learning.

  17. Valuing real options: frequently made errors

    OpenAIRE

    Fernández, Pablo

    2002-01-01

    In this paper we analyze frequently made errors when valuing real options. The best way of doing it is through examples. We start by analyzing Damodaran's proposal to value the option to expand the business of Home Depot. Some of the errors and problems of this and other approaches are: - Assuming that the option is replicable and using Black and Scholes' formula. - The estimation of the option's volatility is arbitrary and has a decisive effect on the option's value. - As there is no riskles...

  18. [Frequently accidents and injury at school].

    Science.gov (United States)

    Gautier Vargas, María; Martínez González, Vanesa

    2011-01-01

    During the time we have been in a private company that provide schools with medical care, we were surprised by the frequent and constant phone calls received to ask for our services. This fact made us take the decision to carry out a survey to find out the accidents and the most frequent injuries. According to the retrospective study we realized throughout two different academic courses in several schools in Cantabria, the 3.23% of the students have any accidents or injuries. We found out children between 11 and 15 have the highest accident rate, being 10.8 % higher when boys (rather than girls) are involved. The most common injuries are contusions 42.85%, followed by sprains 23.45%, being blows the reason in 42% of the cases, and surprisingly acts of aggression in 1%. It was also unexpected to learn that gyms, where children are taught in physical education, have the highest percent on accident rate. All these inquiries lead us to think that age, play and sports are determinant factors in the accidents happened in the school area.

  19. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  20. Screening mammography interpretation test: more frequent mistakes

    International Nuclear Information System (INIS)

    Gozzi, Gino; Ganzetti, Alessandra; Martinoli, Carlo; Bacigalupo, Lorenzo; Bodini, Maria; Fiorentino, Carla; Marini, Ugo Paolo; Santini, Dolores

    2005-01-01

    Purpose: To present the mammographic cases most commonly misinterpreted by the participants in the mammography self-test proposed by the Italian Society of Medical Radiology (SIRM) National Congress in Rimini, Italy, 2002, by analysing the findings responsible for errors, suggesting reasons for the errors, and assessing possible inadequacies in the format of the test. Materials and methods: The self-test was performed on the mammograms of 160 cases (32 positive and 128 negative for cancer as confirmed by histology). The mammograms had been taken in the four standard projections and placed on four multi-panel diaphanoscopes, each displaying a set of 40 cases comprising benign and malignant cases in equal proportions. The participants were given pre-printed forms on which to note down their diagnostic judgement. We evaluated a total of 134 fully-completed forms. Among these, we identified the 23 cases most frequently misread by over 15 participants in percentages varying between 40-90%. Of these cases, 10 were malignancies and 13 were negative mammograms. On review, we also assessed the diagnostic contribution of complementary investigations (not available the participants). The 134 fully-completed forms (all of the 40 cases) yielded a total of 5360 responses, 1180 of which (22.01%) were incorrect. Of these 823 out of the 4288 cases expected to be negative (19.2%) were false positive, and 357 out of the 1072 cases expected to be positive (33.3%) were false negative. As regards the 23 most frequently misread cases, these were 10/32 (31.25%) mammograms positive for malignancy and 13/128 (10.15%) negative mammograms or mammograms showing benign disease. The 10 malignancies included 7 infiltrating ductal carcinomas, 1 infiltrating cribriform carcinoma, 1 infiltrating tubular carcinoma, and 1 carcinoma in situ. The 13 cases of benign disease - as established by histology or long-term follow-up - mistaken for malignancies by the test participants were fibrocystic breast

  1. Bladder injuries frequently missed in polytrauma patients

    Directory of Open Access Journals (Sweden)

    Tanweer Karim

    2010-05-01

    Full Text Available Tanweer Karim, Margaret Topno, Vinod Sharma, Raymond Picardo, Ankur HastirSurgery, MGM Medical College, Kamothe, Navi Mumbai, IndiaAbstract: Bladder injuries are very common in patients who have had road traffic accidents. The method of diagnosis and management of such injuries is well established and accepted. However, trauma to the bladder can be associated with other life-threatening injuries which are frequently missed, and often diagnosed during laparotomy for other reasons. The aim of this study was to diagnose bladder injury in polytrauma patients as early as possible, taking into consideration the fact that these patients are hemodynamically unstable and require rapid evaluation and management. In order to achieve our objective, we used bedside sonography with retrograde instillation of normal saline to diagnose bladder injury in addition to use of the conventional retrograde cystogram.Keywords: bladder injury, bladder rupture, retrograde cystogram

  2. Frequent job change and associated health.

    Science.gov (United States)

    Metcalfe, Chris; Davey Smith, George; Sterne, Jonathan A C; Heslop, Pauline; Macleod, John; Hart, Carole

    2003-01-01

    The contemporary labour market is widely regarded as having become more "flexible". It is proposed that such flexibility is a characteristic of employment histories which will have effects on psychosocial status, health-related behaviour, and physical health. Recent increases in flexibility are unlikely to have accumulated over sufficient portions of individual employment histories for any effect on health to be apparent, but a "preview" of these effects may be gained from study of older cohorts. This cross-sectional study is based on data collected in the early 1970s from 5399 men and 945 women in paid work, recruited from 27 workplaces in the west of Scotland. A flexible employment history was defined as one encompassing a large number of changes between jobs. Perceived psychological stress, health behaviour (cigarette smoking, alcohol consumption, physical exercise), physiology (diastolic blood pressure, body mass index, forced expiratory volume, plasma cholesterol concentration) and current health (angina, myocardial ischaemia) were assessed. Those individuals who reported having experienced frequent job change were more likely to smoke, consume greater amounts of alcohol, and perhaps to exercise less. Similar findings were observed in both males and females, and for different age and socio-economic groups. We found no suggestion that this association was due to higher levels of psychosocial stress, and the expected consequences for health were not observed. Interpretation of these findings is not straightforward due to an uncertain direction of causation, and a possible selection bias. However, the observed relationship between frequent job changing and a higher incidence of health risk behaviours, in the absence of a relationship with poorer health, invites further research.

  3. Frequent activation of EGFR in advanced chordomas

    Directory of Open Access Journals (Sweden)

    Dewaele Barbara

    2011-07-01

    Full Text Available Abstract Background Chordomas are rare neoplasms, arising from notochordal remnants in the midline skeletal axis, for which the current treatment is limited to surgery and radiotherapy. Recent reports suggest that receptor tyrosine kinases (RTK might be essential for the survival or proliferation of chordoma cells, providing a rationale for RTK targeted therapy. Nevertheless, the reported data are conflicting, most likely due to the assorted tumor specimens used for the studies and the heterogeneous methodological approaches. In the present study, we performed a comprehensive characterization of this rare entity using a wide range of assays in search for relevant therapeutic targets. Methods Histopathological features of 42 chordoma specimens, 21 primary and 21 advanced, were assessed by immunohistochemistry and fluorescent in situ hybridization (FISH using PDGFRB, CSF1R, and EGFR probes. Twenty-two of these cases, for which frozen material was available (nine primary and 13 advanced tumors, were selectively analyzed using the whole-genome 4.3 K TK-CGH-array, phospho-kinase antibody array or Western immunoblotting. The study was supplemented by direct sequencing of KIT, PDGFRB, CSF1R and EGFR. Results We demonstrated that EGFR is frequently and the most significantly activated RTK in chordomas. Furthermore, concurrent to EGFR activation, the tumors commonly reveal co-activation of alternative RTK. The consistent activation of AKT, the frequent loss of the tumor suppressor PTEN allele, the recurrent activation of upstream RTK and of downstream effectors like p70S6K and mTOR, all indicate the PI3K/AKT pathway as an important mediator of transformation in chordomas. Conclusions Given the complexity of the signaling in chordomas, combined treatment regimens targeting multiple RTK and downstream effectors are likely to be the most effective in these tumors. Personalized therapy with careful selection of the patients, based on the molecular profile of

  4. Frequent Exertion and Frequent Standing at Work, by Industry and Occupation Group - United States, 2015.

    Science.gov (United States)

    Shockey, Taylor M; Luckhaupt, Sara E; Groenewold, Matthew R; Lu, Ming-Lun

    2018-01-12

    Repeated exposure to occupational ergonomic hazards, such as frequent exertion (repetitive bending or twisting) and frequent standing, can lead to injuries, most commonly musculoskeletal disorders (1). Work-related musculoskeletal disorders have been estimated to cost the United States approximately $2.6 billion in annual direct and indirect costs (2). A recent literature review provided evidence that prolonged standing at work also leads to adverse health outcomes, such as back pain, physical fatigue, and muscle pain (3). To determine which industry and occupation groups currently have the highest prevalence rates of frequent exertion at work and frequent standing at work, CDC analyzed data from the 2015 National Health Interview Survey (NHIS) Occupational Health Supplement (OHS) regarding currently employed adults in the United States. By industry, the highest prevalence of both frequent exertion and frequent standing at work was among those in the agriculture, forestry, fishing, and hunting industry group (70.9%); by occupation, the highest prevalence was among those in the construction and extraction occupation group (76.9%). Large differences among industry and occupation groups were found with regard to these ergonomic hazards, suggesting a need for targeted interventions designed to reduce workplace exposure.

  5. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  6. Frequently asked questions in hypoxia research

    Directory of Open Access Journals (Sweden)

    Wenger RH

    2015-09-01

    Full Text Available Roland H Wenger,1,2 Vartan Kurtcuoglu,1,2 Carsten C Scholz,1,2 Hugo H Marti,3 David Hoogewijs1,2,4 1Institute of Physiology and Zurich Center for Human Physiology (ZIHP, University of Zurich, 2National Center of Competence in Research “Kidney.CH”, Zurich, Switzerland; 3Institute of Physiology and Pathophysiology, University of Heidelberg, Heidelberg, 4Institute of Physiology, University of Duisburg-Essen, Essen, Germany Abstract: “What is the O2 concentration in a normoxic cell culture incubator?” This and other frequently asked questions in hypoxia research will be answered in this review. Our intention is to give a simple introduction to the physics of gases that would be helpful for newcomers to the field of hypoxia research. We will provide background knowledge about questions often asked, but without straightforward answers. What is O2 concentration, and what is O2 partial pressure? What is normoxia, and what is hypoxia? How much O2 is experienced by a cell residing in a culture dish in vitro vs in a tissue in vivo? By the way, the O2 concentration in a normoxic incubator is 18.6%, rather than 20.9% or 20%, as commonly stated in research publications. And this is strictly only valid for incubators at sea level. Keywords: gas laws, hypoxia-inducible factor, Krogh tissue cylinder, oxygen diffusion, partial pressure, tissue oxygen levels

  7. Guide and manual of frequent special radiological procedures pertaining frequent pediatric patient

    International Nuclear Information System (INIS)

    Quesada Rodriguez, Marco V.

    2012-01-01

    A set of instructions and / or recommendations are afforded, developed in a systematic way, whose purpose is to help treating doctors to make decisions about the mode of study appropriate for a specialized clinical circumstance. The instructions are aimed at radiologists, in order to facilitate the selection and realization of special studies in the pediatric patient images, so that in this way, guide of the best and most efficient way to the resolution of the cases before diagnostic doubts that seek to clarify the treating clinician. The studies most frequently requested are exposed, as well as those with their prompt realization will lead to a quick and timely medical care and / or surgical of a specific problem [es

  8. Influence of Frequent Nocturnal Home Hemodialysis on Food Preference

    NARCIS (Netherlands)

    Ipema, Karin; Franssen, Casper; van der Schans, Cees; Smit, Lianne; Noordman, Sabine; Haisma, Hinke

    Objective: Dialysis patients frequently report a change of taste that is reversible after renal transplantation, suggesting that uremic toxins may negatively influence taste. Currently, frequent nocturnal home hemodialysis (NHHD) is the most effective method of hemodialysis, and is associated with

  9. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  10. Focus Group Study Exploring Factors Related to Frequent Sickness Absence.

    Science.gov (United States)

    Notenbomer, Annette; Roelen, Corné A M; van Rhenen, Willem; Groothoff, Johan W

    2016-01-01

    Research investigating frequent sickness absence (3 or more episodes per year) is scarce and qualitative research from the perspective of frequent absentees themselves is lacking. The aim of the current study is to explore awareness, determinants of and solutions to frequent sickness absence from the perspective of frequent absentees themselves. We performed a qualitative study of 3 focus group discussions involving a total of 15 frequent absentees. Focus group discussions were audiotaped and transcribed verbatim. Results were analyzed with the Graneheim method using the Job Demands Resources (JD-R) model as theoretical framework. Many participants were not aware of their frequent sickness absence and the risk of future long-term sickness absence. As determinants, participants mentioned job demands, job resources, home demands, poor health, chronic illness, unhealthy lifestyles, and diminished feeling of responsibility to attend work in cases of low job resources. Managing these factors and improving communication (skills) were regarded as solutions to reduce frequent sickness absence. The JD-R model provided a framework for determinants of and solutions to frequent sickness absence. Additional determinants were poor health, chronic illness, unhealthy lifestyles, and diminished feeling of responsibility to attend work in cases of low job resources. Frequent sickness absence should be regarded as a signal that something is wrong. Managers, supervisors, and occupational health care providers should advise and support frequent absentees to accommodate job demands, increase both job and personal resources, and improve health rather than express disapproval of frequent sickness absence and apply pressure regarding work attendance.

  11. Effects of frequent hemodialysis on perceived caregiver burden in the Frequent Hemodialysis Network trials.

    Science.gov (United States)

    Suri, Rita S; Larive, Brett; Hall, Yoshio; Kimmel, Paul L; Kliger, Alan S; Levin, Nathan; Tamura, Manjula Kurella; Chertow, Glenn M

    2014-05-01

    Patients receiving hemodialysis often perceive their caregivers are overburdened. We hypothesize that increasing hemodialysis frequency would result in higher patient perceptions of burden on their unpaid caregivers. In two separate trials, 245 patients were randomized to receive in-center daily hemodialysis (6 days/week) or conventional hemodialysis (3 days/week) while 87 patients were randomized to receive home nocturnal hemodialysis (6 nights/week) or home conventional hemodialysis for 12 months. Changes in overall mean scores over time in the 10-question Cousineau perceived burden scale were compared. In total, 173 of 245 (70%) and 80 of 87 (92%) randomized patients in the Daily and Nocturnal Trials, respectively, reported having an unpaid caregiver at baseline or during follow-up. Relative to in-center conventional dialysis, the 12-month change in mean perceived burden score with in-center daily hemodialysis was -2.1 (95% confidence interval, -9.4 to +5.3; P=0.58). Relative to home conventional dialysis, the 12-month change in mean perceived burden score with home nocturnal dialysis was +6.1 (95% confidence interval, -0.8 to +13.1; P=0.08). After multiple imputation for missing data in the Nocturnal Trial, the relative difference between home nocturnal and home conventional hemodialysis was +9.4 (95% confidence interval, +0.55 to +18.3; P=0.04). In the Nocturnal Trial, changes in perceived burden were inversely correlated with adherence to dialysis treatments (Pearson r=-0.35; P=0.02). Relative to conventional hemodialysis, in-center daily hemodialysis did not result in higher perceptions of caregiver burden. There was a trend to higher perceived caregiver burden among patients randomized to home nocturnal hemodialysis. These findings may have implications for the adoption of and adherence to frequent nocturnal hemodialysis.

  12. Federal Funding Accountability and Transparency Act frequently asked questions

    Science.gov (United States)

    One stop shop for Federal Funding Accountability and Transparency Act (FFATA) questions. This frequently asked document will assist with Federal Funding Accountability and Transparency Act (FFATA) related questions.

  13. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  14. Split bolus technique in polytrauma: a prospective study on scan protocols for trauma analysis

    NARCIS (Netherlands)

    Beenen, Ludo F. M.; Sierink, Joanne C.; Kolkman, Saskia; Nio, C. Yung; Saltzherr, Teun Peter; Dijkgraaf, Marcel G. W.; Goslings, J. Carel

    2015-01-01

    For the evaluation of severely injured trauma patients a variety of total body computed tomography (CT) scanning protocols exist. Frequently multiple pass protocols are used. A split bolus contrast protocol can reduce the number of passes through the body, and thereby radiation exposure, in this

  15. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  16. Focus Group Study Exploring Factors Related to Frequent Sickness Absence.

    Directory of Open Access Journals (Sweden)

    Annette Notenbomer

    Full Text Available Research investigating frequent sickness absence (3 or more episodes per year is scarce and qualitative research from the perspective of frequent absentees themselves is lacking. The aim of the current study is to explore awareness, determinants of and solutions to frequent sickness absence from the perspective of frequent absentees themselves.We performed a qualitative study of 3 focus group discussions involving a total of 15 frequent absentees. Focus group discussions were audiotaped and transcribed verbatim. Results were analyzed with the Graneheim method using the Job Demands Resources (JD-R model as theoretical framework.Many participants were not aware of their frequent sickness absence and the risk of future long-term sickness absence. As determinants, participants mentioned job demands, job resources, home demands, poor health, chronic illness, unhealthy lifestyles, and diminished feeling of responsibility to attend work in cases of low job resources. Managing these factors and improving communication (skills were regarded as solutions to reduce frequent sickness absence.The JD-R model provided a framework for determinants of and solutions to frequent sickness absence. Additional determinants were poor health, chronic illness, unhealthy lifestyles, and diminished feeling of responsibility to attend work in cases of low job resources. Frequent sickness absence should be regarded as a signal that something is wrong. Managers, supervisors, and occupational health care providers should advise and support frequent absentees to accommodate job demands, increase both job and personal resources, and improve health rather than express disapproval of frequent sickness absence and apply pressure regarding work attendance.

  17. The most frequently used tests for assessing executive functions in aging

    Directory of Open Access Journals (Sweden)

    Camila de Assis Faria

    Full Text Available There are numerous neuropsychological tests for assessing executive functions in aging, which vary according to the different domains assessed. OBJECTIVE: To present a systematic review of the most frequently used instruments for assessing executive functions in older adults with different educational levels in clinical and experimental research. METHODS: We searched for articles published in the last five years, using the PubMed database with the following terms: "neuropsychological tests", "executive functions", and "mild cognitive impairment". There was no language restriction. RESULTS: 25 articles fulfilled all the inclusion criteria. The seven neuropsychological tests most frequently used to evaluate executive functions in aging were: [1] Trail Making Test (TMT Form B; [2] Verbal Fluency Test (VFT - F, A and S; [3] VFT Animals category; [4] Clock Drawing Test (CDT; [5] Digits Forward and Backward subtests (WAIS-R or WAIS-III; [6] Stroop Test; and [7] Wisconsin Card Sorting Test (WCST and its variants. The domains of executive functions most frequently assessed were: mental flexibility, verbal fluency, planning, working memory, and inhibitory control. CONCLUSION: The study identified the tests and domains of executive functions most frequently used in the last five years by research groups worldwide to evaluate older adults. These results can direct future research and help build evaluation protocols for assessing executive functions, taking into account the different educational levels and socio-demographic profiles of older adults in Brazil.

  18. Iron Deficiency In Frequent And First Time Female Blood Donors ...

    African Journals Online (AJOL)

    Aim of the study: This study was conducted to evaluate the frequency of iron deficiency and relevant factors in frequent and first time female blood donors at Casablanca blood transfusion centre, Morocco. Methods: Between November 2005 and April 2006, twenty-one female first time and twenty-one frequent female blood ...

  19. Emergency Department Frequent Users for Acute Alcohol Intoxication.

    Science.gov (United States)

    Klein, Lauren R; Martel, Marc L; Driver, Brian E; Reing, Mackenzie; Cole, Jon B

    2018-03-01

    A subset of frequent users of emergency services are those who use the emergency department (ED) for acute alcohol intoxication. This population and their ED encounters have not been previously described. This was a retrospective, observational, cohort study of patients presenting to the ED for acute alcohol intoxication between 2012 and 2016. We collected all data from the electronic medical record. Frequent users for alcohol intoxication were defined as those with greater than 20 visits for acute intoxication without additional medical chief complaints in the previous 12 months. We used descriptive statistics to evaluate characteristics of frequent users for alcohol intoxication, as well as their ED encounters. We identified 32,121 patient encounters. Of those, 325 patients were defined as frequent users for alcohol intoxication, comprising 11,370 of the encounters during the study period. The median maximum number of encounters per person for alcohol intoxication in a one-year period was 47 encounters (range 20 to 169). Frequent users were older (47 years vs. 39 years), and more commonly male (86% vs. 71%). Frequent users for alcohol intoxication had higher rates of medical and psychiatric comorbidities including liver disease, chronic kidney disease, ischemic vascular disease, dementia, chronic obstructive pulmonary disease, history of traumatic brain injury, schizophrenia, and bipolar disorder. In this study, we identified a group of ED frequent users who use the ED for acute alcohol intoxication. This population had higher rates of medical and psychiatric comorbidities compared to non-frequent users.

  20. Classification and Target Group Selection Based Upon Frequent Patterns

    NARCIS (Netherlands)

    W.H.L.M. Pijls (Wim); R. Potharst (Rob)

    2000-01-01

    textabstractIn this technical report , two new algorithms based upon frequent patterns are proposed. One algorithm is a classification method. The other one is an algorithm for target group selection. In both algorithms, first of all, the collection of frequent patterns in the training set is

  1. Social environment and frequent attendance in Danish general practice

    DEFF Research Database (Denmark)

    Vedsted, Peter; Olesen, Frede

    2005-01-01

    of 1423 (73.7%) frequent attenders and 1103 (74.9%) infrequent attenders responded. Male frequent attendance was associated, with statistical significance, with living alone and being without work or on a disability pension. Among women, lack of professional education or being without work tended...

  2. Emergency Department Frequent Users for Acute Alcohol Intoxication

    Directory of Open Access Journals (Sweden)

    Marc L. Martel

    2018-02-01

    Full Text Available Introduction: A subset of frequent users of emergency services are those who use the emergency department (ED for acute alcohol intoxication. This population and their ED encounters have not been previously described. Methods: This was a retrospective, observational, cohort study of patients presenting to the ED for acute alcohol intoxication between 2012 and 2016. We collected all data from the electronic medical record. Frequent users for alcohol intoxication were defined as those with greater than 20 visits for acute intoxication without additional medical chief complaints in the previous 12 months. We used descriptive statistics to evaluate characteristics of frequent users for alcohol intoxication, as well as their ED encounters. Results: We identified 32,121 patient encounters. Of those, 325 patients were defined as frequent users for alcohol intoxication, comprising 11,370 of the encounters during the study period. The median maximum number of encounters per person for alcohol intoxication in a one-year period was 47 encounters (range 20 to 169. Frequent users were older (47 years vs. 39 years, and more commonly male (86% vs. 71%. Frequent users for alcohol intoxication had higher rates of medical and psychiatric comorbidities including liver disease, chronic kidney disease, ischemic vascular disease, dementia, chronic obstructive pulmonary disease, history of traumatic brain injury, schizophrenia, and bipolar disorder. Conclusion: In this study, we identified a group of ED frequent users who use the ED for acute alcohol intoxication. This population had higher rates of medical and psychiatric comorbidities compared to non-frequent users.

  3. A Global Online Handwriting Recognition Approach Based on Frequent Patterns

    Directory of Open Access Journals (Sweden)

    C. Gmati

    2018-06-01

    Full Text Available In this article, the handwriting signals are represented based on geometric and spatio-temporal characteristics to increase the feature vectors relevance of each object. The main goal was to extract features in the form of a numeric vector based on the extraction of frequent patterns. We used two types of frequent motifs (closed frequent patterns and maximal frequent patterns that can represent handwritten characters pertinently. These common features patterns are generated from a raw data transformation method to achieve high relevance. A database of words consisting of two different letters was created. The proposed application gives promising results and highlights the advantages that frequent pattern extraction algorithms can achieve, as well as the central role played by the “minimum threshold” parameter in the overall description of the characters.

  4. XML documents cluster research based on frequent subpatterns

    Science.gov (United States)

    Ding, Tienan; Li, Wei; Li, Xiongfei

    2015-12-01

    XML data is widely used in the information exchange field of Internet, and XML document data clustering is the hot research topic. In the XML document clustering process, measure differences between two XML documents is time costly, and impact the efficiency of XML document clustering. This paper proposed an XML documents clustering method based on frequent patterns of XML document dataset, first proposed a coding tree structure for encoding the XML document, and translate frequent pattern mining from XML documents into frequent pattern mining from string. Further, using the cosine similarity calculation method and cohesive hierarchical clustering method for XML document dataset by frequent patterns. Because of frequent patterns are subsets of the original XML document data, so the time consumption of XML document similarity measure is reduced. The experiment runs on synthetic dataset and the real datasets, the experimental result shows that our method is efficient.

  5. Predictors of Frequent Emergency Room Visits among a Homeless Population.

    Directory of Open Access Journals (Sweden)

    Kinna Thakarar

    Full Text Available Homelessness, HIV, and substance use are interwoven problems. Furthermore, homeless individuals are frequent users of emergency services. The main purpose of this study was to identify risk factors for frequent emergency room (ER visits and to examine the effects of housing status and HIV serostatus on ER utilization. The second purpose was to identify risk factors for frequent ER visits in patients with a history of illicit drug use.A retrospective analysis was performed on 412 patients enrolled in a Boston-based health care for the homeless program (HCH. This study population was selected as a 2:1 HIV seronegative versus HIV seropositive match based on age, sex, and housing status. A subgroup analysis was performed on 287 patients with history of illicit drug use. Chart data were analyzed to compare demographics, health characteristics, and health service utilization. Results were stratified by housing status. Logistic models using generalized estimating equations were used to predict frequent ER visits.In homeless patients, hepatitis C was the only predictor of frequent ER visits (OR 4.49, p<0.01. HIV seropositivity was not predictive of frequent ER visits. In patients with history of illicit drug use, mental health (OR 2.53, 95% CI 1.07-5.95 and hepatitis C (OR 2.85, 95% CI 1.37-5.93 were predictors of frequent ER use. HIV seropositivity did not predict ER use (OR 0.45, 95% CI 0.21 - 0.97.In a HCH population, hepatitis C predicted frequent ER visits in homeless patients. HIV seropositivity did not predict frequent ER visits, likely because HIV seropositive HCH patients are engaged in care. In patients with history of illicit drug use, hepatitis C and mental health disorders predicted frequent ER visits. Supportive housing for patients with mental health disorders and hepatitis C may help prevent unnecessary ER visits in this population.

  6. Predictors of Frequent Emergency Room Visits among a Homeless Population.

    Science.gov (United States)

    Thakarar, Kinna; Morgan, Jake R; Gaeta, Jessie M; Hohl, Carole; Drainoni, Mari-Lynn

    2015-01-01

    Homelessness, HIV, and substance use are interwoven problems. Furthermore, homeless individuals are frequent users of emergency services. The main purpose of this study was to identify risk factors for frequent emergency room (ER) visits and to examine the effects of housing status and HIV serostatus on ER utilization. The second purpose was to identify risk factors for frequent ER visits in patients with a history of illicit drug use. A retrospective analysis was performed on 412 patients enrolled in a Boston-based health care for the homeless program (HCH). This study population was selected as a 2:1 HIV seronegative versus HIV seropositive match based on age, sex, and housing status. A subgroup analysis was performed on 287 patients with history of illicit drug use. Chart data were analyzed to compare demographics, health characteristics, and health service utilization. Results were stratified by housing status. Logistic models using generalized estimating equations were used to predict frequent ER visits. In homeless patients, hepatitis C was the only predictor of frequent ER visits (OR 4.49, phomeless patients. HIV seropositivity did not predict frequent ER visits, likely because HIV seropositive HCH patients are engaged in care. In patients with history of illicit drug use, hepatitis C and mental health disorders predicted frequent ER visits. Supportive housing for patients with mental health disorders and hepatitis C may help prevent unnecessary ER visits in this population.

  7. Frequent Pairs in Data Streams: Exploiting Parallelism and Skew

    DEFF Research Database (Denmark)

    Campagna, Andrea; Kutzkow, Konstantin; Pagh, Rasmus

    2011-01-01

    We introduce the Pair Streaming Engine (PairSE) that detects frequent pairs in a data stream of transactions. Our algorithm finds the most frequent pairs with high probability, and gives tight bounds on their frequency. It is particularly space efficient for skewed distribution of pair supports...... items mining in data streams. We show how to efficiently scale these approaches to handle large transactions. We report experimental results showcasing precision and recall of our method. In particular, we find that often our method achieves excellent precision, returning identical upper and lower...... bounds on the supports of the most frequent pairs....

  8. Frequently Asked Questions for Parents of Children with PH

    Science.gov (United States)

    ... Frequently Asked Questions for Parents of Children with PH What causes pulmonary hypertension in children? I’ve ... of what I read is about adults with PH. What are the primary differences between PH in ...

  9. Frequently Asked Questions about Measles in the U.S.

    Science.gov (United States)

    ... Pan American Health Organization Frequently Asked Questions about Measles in the U.S. Language: English (US) Español (Spanish) ... I’ve been exposed to someone who has measles. What should I do? A: Immediately call your ...

  10. Stability of the frequent COPD exacerbator in the general population

    DEFF Research Database (Denmark)

    Reilev, Mette; Lykkegaard, Jesper; Halling, Anders

    2017-01-01

    Exacerbation frequency is central in treatment strategies for chronic obstructive pulmonary disease. However, whether chronic obstructive pulmonary disease patients from the general population with frequent exacerbations continue to have frequent exacerbations over an extended period of time is c...... considerably over time. This could hold implications for COPD treatment and challenge assumptions made about disease progression....... is currently unknown. In this study, we aimed to investigate the stability of the frequent exacerbator in a population-based setting. To this end, we conducted a nationwide register-based descriptive study with a 10-year follow-up period of chronic obstructive pulmonary disease patients with at least one...... obstructive pulmonary disease treatment guidelines and their practical application. CHRONIC OBSTRUCTIVE LUNG DISEASE: VARIATIONS IN DISEASE PROGRESSION: Patients with chronic obstructive pulmonary disease (COPD) who suffer from frequent exacerbations do not necessarily persist with such severity over time...

  11. Incremental Frequent Subgraph Mining on Large Evolving Graphs

    KAUST Repository

    Abdelhamid, Ehab; Canim, Mustafa; Sadoghi, Mohammad; Bhatta, Bishwaranjan; Chang, Yuan-Chi; Kalnis, Panos

    2017-01-01

    , such as social networks, utilize large evolving graphs. Mining these graphs using existing techniques is infeasible, due to the high computational cost. In this paper, we propose IncGM+, a fast incremental approach for continuous frequent subgraph mining problem

  12. THE FREQUENT SKIN DISEASES DIAGNOSED AT UNIVERSITY STUDENTS

    Directory of Open Access Journals (Sweden)

    Yesim KAYMAK

    2005-12-01

    Full Text Available The incidence of some skin diseases are increasing at adolescent and early adulthood period. The most frequent disease at this period is acne vulgaris whereas fungal diseases, dermatitis, dermatosis which are due to stress and other reasons, oral mucosal lesions and herpetic lesions of perioral region are also frequent. In this research we aim to determine the frequent dermatologic diseases of university students and 147 female, 74 male, a total of 221 students are included. We questioned the dermatologic complaints of students, then examined dermatologically in detail and registered ages, sexes, findings of the dermatological examination and dermatological diagnostic informations. As a result it is found out that the most frequent diseases are acne vulgaris (34.1%, allergic and pruritic dermatosis (16.6%, fungal diseases ( 13.0%, and eritamatous-squamous disease (8.3%. [TAF Prev Med Bull 2005; 4(6.000: 313-320

  13. Personalized privacy-preserving frequent itemset mining using randomized response.

    Science.gov (United States)

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.

  14. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  15. Perceived Quality of Social Relations and Frequent Drunkenness

    DEFF Research Database (Denmark)

    Kjærulff, Thora M; Rivera, Francisco; Jiménez-Iglesias, Antonia

    2014-01-01

    in School-aged Children Study (HBSC) 2010 survey were used including 1177 female and 1126 male students aged between 15 and 16 years. RESULTS: For both genders, students reporting low school satisfaction had increased odds of frequent drunkenness. Among females, low and medium levels of classmate support...... predictors of frequent drunkenness among female than male students and that other factors than social relations may contribute to explain excessive alcohol use among Spanish adolescents....

  16. The Impact of Frequent Shopper Programs in Grocery Retailing

    OpenAIRE

    David Bell; Rajiv Lal

    2002-01-01

    Frequent Shopper programs are becoming ubiquitous in retailing. Retailers seem unsure however about whether these programs are leading to higher loyalty, or to higher profits. In this paper we analyze data from a US supermarket chain that has used a number of frequent shopper rewards to improve sales and profitability. We find that while these programs are profitable, this is only because substantial incremental sales to casual shoppers (cherry pickers) oset subsidies to already loyal custome...

  17. Enumerating all maximal frequent subtrees in collections of phylogenetic trees.

    Science.gov (United States)

    Deepak, Akshay; Fernández-Baca, David

    2014-01-01

    A common problem in phylogenetic analysis is to identify frequent patterns in a collection of phylogenetic trees. The goal is, roughly, to find a subset of the species (taxa) on which all or some significant subset of the trees agree. One popular method to do so is through maximum agreement subtrees (MASTs). MASTs are also used, among other things, as a metric for comparing phylogenetic trees, computing congruence indices and to identify horizontal gene transfer events. We give algorithms and experimental results for two approaches to identify common patterns in a collection of phylogenetic trees, one based on agreement subtrees, called maximal agreement subtrees, the other on frequent subtrees, called maximal frequent subtrees. These approaches can return subtrees on larger sets of taxa than MASTs, and can reveal new common phylogenetic relationships not present in either MASTs or the majority rule tree (a popular consensus method). Our current implementation is available on the web at https://code.google.com/p/mfst-miner/. Our computational results confirm that maximal agreement subtrees and all maximal frequent subtrees can reveal a more complete phylogenetic picture of the common patterns in collections of phylogenetic trees than maximum agreement subtrees; they are also often more resolved than the majority rule tree. Further, our experiments show that enumerating maximal frequent subtrees is considerably more practical than enumerating ordinary (not necessarily maximal) frequent subtrees.

  18. Enumerating all maximal frequent subtrees in collections of phylogenetic trees

    Science.gov (United States)

    2014-01-01

    Background A common problem in phylogenetic analysis is to identify frequent patterns in a collection of phylogenetic trees. The goal is, roughly, to find a subset of the species (taxa) on which all or some significant subset of the trees agree. One popular method to do so is through maximum agreement subtrees (MASTs). MASTs are also used, among other things, as a metric for comparing phylogenetic trees, computing congruence indices and to identify horizontal gene transfer events. Results We give algorithms and experimental results for two approaches to identify common patterns in a collection of phylogenetic trees, one based on agreement subtrees, called maximal agreement subtrees, the other on frequent subtrees, called maximal frequent subtrees. These approaches can return subtrees on larger sets of taxa than MASTs, and can reveal new common phylogenetic relationships not present in either MASTs or the majority rule tree (a popular consensus method). Our current implementation is available on the web at https://code.google.com/p/mfst-miner/. Conclusions Our computational results confirm that maximal agreement subtrees and all maximal frequent subtrees can reveal a more complete phylogenetic picture of the common patterns in collections of phylogenetic trees than maximum agreement subtrees; they are also often more resolved than the majority rule tree. Further, our experiments show that enumerating maximal frequent subtrees is considerably more practical than enumerating ordinary (not necessarily maximal) frequent subtrees. PMID:25061474

  19. The Effect of Nicotine Administration on Physical and Psychological Signs of Withdrawal Syndrome Induced by Single or Frequent Doses of Morphine in Rats

    OpenAIRE

    Mohammad Allahtavakoli; Fatemeh Amin; Elham Hakimizadeh; Ali Roohbakhsh; Sayed Ali Haeri Rohani; Ahmad Taghavi Rafsanjani; Abbas Haghparast; Ali Shamsizadeh

    2012-01-01

    Introduction. Morphine addiction and morphine withdrawal syndrome are the two main problems of today’s human society. The present study has investigated the effects of nicotine on the strength of physical and psychological dependency in single and repeated doses morphine administrated rats. Materials and methods. Male Wistar rats were subjected to morphine consumption with single or frequent dose protocols. In the single dose protocol, rats received only one dose of morphine and 24hrs later t...

  20. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  1. Risk factors associated with incidence and persistence of frequent headaches.

    Science.gov (United States)

    Marklund, Susanna; Häggman-Henrikson, Birgitta; Wänman, Anders

    2014-11-01

    Headaches represent a significant public health problem, but the knowledge of factors specifically related to incidence and persistence of headaches is still limited. The aim of this study was to evaluate whether gender, self-reported bruxism and variations in the dental occlusion contribute to onset and persistence of frequent headaches. The study population comprised 280 dental students, examined annually in a 2-year prospective study with a questionnaire and a clinical examination of the jaw function. In the analysis subjects were dichotomized into cases with frequent (once a week or more) or without frequent headaches (controls). The 2-year cumulative incidence was based on subjects without frequent headaches at baseline. Cases with 2-year persistent headaches reported such symptoms at all three examinations. Self-reported bruxism and factors in the dental occlusion at baseline were used as independent variables in logistic regression analyses. The 2-year cumulative incidence of frequent headaches was 21%. Female gender (OR = 2.6; CI = 1.3-5.4), self-reported bruxism (OR = 2.3; CI = 1.2-4.4) and mandibular instability in intercuspal position (OR = 3.2; CI = 1.4-7.5) were associated with incidence of frequent headaches. Persistent headaches during the observation period were present in 12 individuals (4%) and significantly related to mandibular instability in intercuspal position (OR = 6.1; CI = 1.6-22.6). The results indicate that female gender, self-reported bruxism and mandibular instability in intercuspal position are of importance in the development of frequent headaches. In management of these patients a multidisciplinary approach including dentists may be important and, thus, advocated.

  2. The bedding environment, sleep position, and frequent wheeze in childhood.

    Science.gov (United States)

    Ponsonby, Anne-Louise; Dwyer, Terence; Trevillian, Leigh; Kemp, Andrew; Cochrane, Jennifer; Couper, David; Carmichael, Allan

    2004-05-01

    Synthetic quilt use has been associated with increased childhood wheeze in previous studies. Our aim was to examine whether the adverse effect of synthetic quilt use on frequent wheeze differed by usual sleep position. A population-based cross-sectional study of 6378 (92% of those eligible) 7-year-olds in Tasmania, Australia, was conducted in 1995. Exercise-challenge lung function was obtained on a subset of 414 children from randomly selected schools. Child bedding including pillow and overbedding composition and usual sleep position by parental questionnaire. Frequent wheeze (>12 wheeze episodes over the past year), using the International Study of Asthma and Allergies in Childhood parental questionnaire, and baseline and postexercise forced expiratory volume in 1 second lung-function measures. Frequent wheeze (n = 117) was positively associated with synthetic quilts, synthetic pillows, electric blankets, and sleeping in a bottom bunk bed but did not vary by sleep position. In a nested case-control analysis, the association between synthetic quilt use and frequent wheeze differed by sleep position. Among children who slept supine, synthetic (versus feather) quilt use was associated with frequent wheeze (adjusted odds ratio: 2.37 [1.08, 5.23]). However, among nonsupine sleepers, overlying synthetic quilt use was not associated with frequent wheeze (adjusted odds ratio: 1.06 [0.60, 1.88]). This difference in quilt effect by sleep position was highly significant. Similarly, synthetic quilt use was associated with lower postexercise forced expiratory volume in 1 second measures among supine but not nonsupine sleeping children. An increasing focus on the bedding environment immediately adjacent to the nose and mouth is required for respiratory disorders provoked by bedding, such as child asthma characterized by frequent wheeze.

  3. Defining frequent use of an urban emergency department

    Science.gov (United States)

    Locker, Thomas E; Baston, Simon; Mason, Suzanne M; Nicholl, Jon

    2007-01-01

    Objective This study aimed to develop a definition of frequent use of an emergency department (ED) by comparing differences in the observed frequency distribution with that of a theoretical frequency distribution. Methods A retrospective analysis of attendance of ED and minor injury unit attendances in one city over 1 year was conducted. From these data, the expected frequency distribution was determined based upon a Poisson distribution. Results During the period studied, 75 141 people attended on 98 908 occasions. The theoretical frequency distribution showed that there were 2764 (3.7%) “frequent users” presenting repeatedly due to non‐random events. These patients made 12 316 (12.4%) attendances. Frequent users were older than chance users (mean age 49.7 vs 44.5 years). A greater proportion arrived by ambulance (55.3% vs 27.5%), presented with psychiatric problems (5.8% vs 1.1%) or alcohol intoxication (1.3% vs 0.5%), and were admitted to hospital (37.4% vs 19.6%). Conclusion We have identified that there is a group of patients who present repeatedly due to non‐random events, confirming the existence of “frequent users”. Their characteristics are clearly different to other patients in the ED. We propose that “frequent users” be defined as any patient who makes more than four attendances per year. PMID:17513534

  4. Social capital and frequent attenders in general practice

    DEFF Research Database (Denmark)

    Pasgaard, Alexander A.; Mæhlisen, Maiken H.; Overgaard, Charlotte

    2018-01-01

    weeks. RESULTS: Using multiple logistic regression, we found that frequent attendance was associated with a lower score in interpersonal trust [OR 0.86 (0.79-0.94)] and social network [OR 0.88 (0.79-0.98)] for women, when adjusted for age, education, income and SF12 health scores. Norms of reciprocity...... at the individual level, and includes cognitive (interpersonal trust and norms of reciprocity) as well as structural (social network and civic engagement) dimensions. Frequent attendance is defined as the upper-quartile of the total number of measured consultations with a general practitioner over a period of 148...... and civic engagement were not significantly associated with frequent attendance for women [OR 1.05 (0.99-1.11) and OR 1.01 (0.92-1.11) respectively]. None of the associations were statistically significant for men. CONCLUSION: This study suggests that for women, some aspects of social capital are associated...

  5. Social environment and frequent attendance in Danish general practice

    DEFF Research Database (Denmark)

    Vedsted, Peter; Olesen, Frede

    2005-01-01

    inequalities in health or whether social factors in themselves determine the use of general practice. AIM: To examine if social factors are associated with frequent attendance in general practice after adjusting for physical and psychological health variables. DESIGN OF STUDY: Population-based cross......BACKGROUND: A lack of social support is associated with increased morbidity and mortality and a decreased effect of prevention. Frequent attenders to primary care are characterised by poorer social conditions than other patients in general practice, but we do not know whether this is due to social...... during the period November 1997-October 1998. A questionnaire about physical, psychological and social factors was sent to the patients. The associations between social factors and frequent attendance were adjusted for physical and psychological health and tendency towards somatisation. RESULTS: A total...

  6. Frequently Used Coping Scales: A Meta-Analysis.

    Science.gov (United States)

    Kato, Tsukasa

    2015-10-01

    This article reports the frequency of the use of coping scales in academic journals published from 1998 to 2010. Two thousand empirical journal articles were selected from the EBSCO database. The COPE, Ways of Coping Questionnaire, Coping Strategies Questionnaire, Coping Inventory for Stressful Situations, Religious-COPE and Coping Response Inventory were frequently mentioned. In particular, the COPE (20.2%) and Ways of Coping Questionnaire (13.6%) were used the most frequently. In this literature reviewed, coping scales were most often used to assess coping with health issues (e.g. illness, pain and medical diagnoses) over other types of stressors, and patients were the most frequent participants. Further, alpha coefficients were estimated for the COPE subscales, and correlations between the COPE subscales and coping outcomes were calculated, including depressive symptoms, anxiety, negative affect, psychological distress, physical symptoms and well-being. Copyright © 2013 John Wiley & Sons, Ltd.

  7. Examination of Operation Quality for High-frequent Railway Operation

    DEFF Research Database (Denmark)

    Landex, Alex; Kaas, Anders H.

    2009-01-01

    take the first train in their direction. The article examines four different approaches to examine operation quality for high-frequent operation that are based on the experiences of the passengers. These approaches are the service frequency of the operation, travel time extension, a combination......The examination of operation quality for high-frequent operation requires other approaches than the typical evaluation of punctuality (trains on time) and reliability (operated trains). This is because passengers in high-frequent railway systems do not necessarily notice train delays as they just...... of the service frequency and travel time approaches, and passenger delays. The service frequency and travel time approaches are simple measurements with low complexity and complement each other. Therefore, the article recommends combining the service frequency and travel time approaches to get a more accurate...

  8. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  9. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  10. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  11. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  12. Distinguishing the relevant features of frequent suicide attempters.

    Science.gov (United States)

    Lopez-Castroman, Jorge; Perez-Rodriguez, Maria de las Mercedes; Jaussent, Isabelle; Alegria, Analucia A; Artes-Rodriguez, Antonio; Freed, Peter; Guillaume, Sébastien; Jollant, Fabrice; Leiva-Murillo, Jose Miguel; Malafosse, Alain; Oquendo, Maria A; de Prado-Cumplido, Mario; Saiz-Ruiz, Jeronimo; Baca-Garcia, Enrique; Courtet, Philippe

    2011-05-01

    In spite of the high prevalence of suicide behaviours and the magnitude of the resultant burden, little is known about why individuals reattempt. We aim to investigate the relationships between clinical risk factors and the repetition of suicidal attempts. 1349 suicide attempters were consecutively recruited in the Emergency Room (ER) of two academic hospitals in France and Spain. Patients were extensively assessed and demographic and clinical data obtained. Data mining was used to determine the minimal number of variables that blinded the rest in relation to the number of suicide attempts. Using this set, a probabilistic graph ranking relationships with the target variable was constructed. The most common diagnoses among suicide attempters were affective disorders, followed by anxiety disorders. Risk of frequent suicide attempt was highest among middle-aged subjects, and diminished progressively with advancing age of onset at first attempt. Anxiety disorders significantly increased the risk of presenting frequent suicide attempts. Pathway analysis also indicated that frequent suicide attempts were linked to greater odds for alcohol and substance abuse disorders and more intensive treatment. Novel statistical methods found several clinical features that were associated with a history of frequent suicide attempts. The identified pathways may promote new hypothesis-driven studies of suicide attempts and preventive strategies. Copyright © 2010 Elsevier Ltd. All rights reserved.

  13. Competence-Based Education and Training– about Frequently Asked Questions

    NARCIS (Netherlands)

    Mulder, M.

    2012-01-01

    This article follows the author's previous piece on practical guidelines for the development of comprehensive competence-based education and training (Mulder, 2012). It is about the questions that have been and are still frequently asked in presentations, workshops and classes about the introduction

  14. Injury patterns in children with frequent emergency department visits

    DEFF Research Database (Denmark)

    Laursen, B

    2006-01-01

    -14 years. Information on all ED visits was obtained from the Danish National Patient Registry. Injury type, place of accident, injury mechanism, admission, and distance to ED were compared between children with frequent ED visits (five or more during the three years) and children with only one visit...... less severe injuries and more dislocations, sprains, and strains....

  15. Hybrid Recommendation System Memanfaatkan Penggalian Frequent Itemset dan Perbandingan Keyword

    OpenAIRE

    Suka Parwita, Wayan Gede; Winarko, Edi

    2015-01-01

    Abstrak Recommendation system sering dibangun dengan memanfaatkan data peringkat item dan data identitas pengguna. Data peringkat item merupakan data yang langka pada sistem yang baru dibangun. Sedangkan, pemberian data identitas pada recommendation system dapat menimbulkan kekhawatiran penyalahgunaan data identitas. Hybrid recommendation system memanfaatkan algoritma penggalian frequent itemset dan perbandingan keyword dapat memberikan daftar rekomendasi tanpa menggunakan data identi...

  16. Vaginal microbiota of women with frequent vulvovaginal candidiasis.

    Science.gov (United States)

    Zhou, Xia; Westman, Rachel; Hickey, Roxana; Hansmann, Melanie A; Kennedy, Colleen; Osborn, Thomas W; Forney, Larry J

    2009-09-01

    Vulvovaginal candidiasis (VVC) is an insidious infection that afflicts a large proportion of women of all ages, and 5 to 8% of affected women experience recurrent VVC (RVVC). The aim of this study was to explore the possible importance of vaginal bacterial communities in reducing the risk of RVVC. The species composition and diversity of microbial communities were evaluated for 42 women with and without frequent VVC based on profiles of terminal restriction fragment polymorphisms of 16S rRNA genes and phylogenetic analysis of cloned 16S rRNA gene sequences from the numerically dominant microbial populations. The data showed that there were no significant differences between the vaginal microbial communities of women in the two groups (likelihood score, 5.948; bootstrap P value, 0.26). Moreover, no novel bacteria were found in the communities of women with frequent VVC. The vaginal communities of most women in both groups (38/42; 90%) were dominated by species of Lactobacillus. The results of this study failed to provide evidence for the existence of altered or unusual vaginal bacterial communities in women who have frequent VVC compared to women who do not have frequent VVC. The findings suggest that commensal vaginal bacterial species may not be able to prevent VVC.

  17. Ban the Book Report: Promoting Frequent and Enthusiastic Reading

    Science.gov (United States)

    Foster, Graham

    2012-01-01

    Teachers recognize that frequent independent reading increases student knowledge on a wide range of topics, enhances vocabulary, and improves comprehension. "Ban the Book Report" inspires teachers to go beyond narrow and analytical book reports by exploring the potential of book talks, alternate book covers, identifying features of informational…

  18. An Adaptive Algorithm for Finding Frequent Sets in Landmark Windows

    DEFF Research Database (Denmark)

    Dang, Xuan-Hong; Ong, Kok-Leong; Lee, Vincent

    2012-01-01

    We consider a CPU constrained environment for finding approximation of frequent sets in data streams using the landmark window. Our algorithm can detect overload situations, i.e., breaching the CPU capacity, and sheds data in the stream to “keep up”. This is done within a controlled error threshold...

  19. Frequent visitors at the psychiatric emergency room - A literature review.

    Science.gov (United States)

    Schmidt, Manuela

    2018-03-01

    Frequent visitors at the psychiatric emergency room (PER) constitute a small subgroup of patients, yet they are responsible for a disproportionate number of visits and thus claim considerable resources. Their needs are often left unmet and their repetitive visits reflect their dissatisfaction as well as that of PERs' staff. Motivated by these dilemmas, this study systematically reviews the literature about frequent visitors at PER and seeks to answer two questions: What characterizes frequent visitors at PER in the literature? and What characterizes PER in the literature? Based on 29 studies, this paper offers answers to the two questions based on a strength weakness opportunities and threats (SWOT) analysis. The results of the review and subsequent analysis of the literature revealed the multiplicity and complexity of frequent visitors' characteristics and how they appear to converge. Commonalities were more difficult to identify in PER characteristics. In some cases, this happened because the characteristics were poorly described or were context specific. As a result, it was not easy to compare the studies on PER. Based on SWOT and the findings of the analysis, the paper proposes new venues of research and suggests how the field of mental health might develop by taking into account its opportunities and threats.

  20. Frequent epigenetic inactivation of Wnt antagonist genes in breast cancer

    Science.gov (United States)

    Suzuki, H; Toyota, M; Caraway, H; Gabrielson, E; Ohmura, T; Fujikane, T; Nishikawa, N; Sogabe, Y; Nojima, M; Sonoda, T; Mori, M; Hirata, K; Imai, K; Shinomura, Y; Baylin, S B; Tokino, T

    2008-01-01

    Although mutation of APC or CTNNB1 (β-catenin) is rare in breast cancer, activation of Wnt signalling is nonetheless thought to play an important role in breast tumorigenesis, and epigenetic silencing of Wnt antagonist genes, including the secreted frizzled-related protein (SFRP) and Dickkopf (DKK) families, has been observed in various tumours. In breast cancer, frequent methylation and silencing of SFRP1 was recently documented; however, altered expression of other Wnt antagonist genes is largely unknown. In the present study, we found frequent methylation of SFRP family genes in breast cancer cell lines (SFRP1, 7 out of 11, 64%; SFRP2, 11 out of 11, 100%; SFRP5, 10 out of 11, 91%) and primary breast tumours (SFRP1, 31 out of 78, 40%; SFRP2, 60 out of 78, 77%; SFRP5, 55 out of 78, 71%). We also observed methylation of DKK1, although less frequently, in cell lines (3 out of 11, 27%) and primary tumours (15 out of 78, 19%). Breast cancer cell lines express various Wnt ligands, and overexpression of SFRPs inhibited cancer cell growth. In addition, overexpression of a β-catenin mutant and depletion of SFRP1 using small interfering RNA synergistically upregulated transcriptional activity of T-cell factor/lymphocyte enhancer factor. Our results confirm the frequent methylation and silencing of Wnt antagonist genes in breast cancer, and suggest that their loss of function contributes to activation of Wnt signalling in breast carcinogenesis. PMID:18283316

  1. GRAMI: Generalized Frequent Subgraph Mining in Large Graphs

    KAUST Repository

    El Saeedy, Mohammed El Sayed

    2011-07-24

    Mining frequent subgraphs is an important operation on graphs. Most existing work assumes a database of many small graphs, but modern applications, such as social networks, citation graphs or protein-protein interaction in bioinformatics, are modeled as a single large graph. Interesting interactions in such applications may be transitive (e.g., friend of a friend). Existing methods, however, search for frequent isomorphic (i.e., exact match) subgraphs and cannot discover many useful patterns. In this paper we propose GRAMI, a framework that generalizes frequent subgraph mining in a large single graph. GRAMI discovers frequent patterns. A pattern is a graph where edges are generalized to distance-constrained paths. Depending on the definition of the distance function, many instantiations of the framework are possible. Both directed and undirected graphs, as well as multiple labels per vertex, are supported. We developed an efficient implementation of the framework that models the frequency resolution phase as a constraint satisfaction problem, in order to avoid the costly enumeration of all instances of each pattern in the graph. We also implemented CGRAMI, a version that supports structural and semantic constraints; and AGRAMI, an approximate version that supports very large graphs. Our experiments on real data demonstrate that our framework is up to 3 orders of magnitude faster and discovers more interesting patterns than existing approaches.

  2. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  3. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  4. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  5. Frequent attenders in general practice: problem solving treatment provided by nurses [ISRCTN51021015

    Directory of Open Access Journals (Sweden)

    van Oppen P

    2005-10-01

    Full Text Available Abstract Background There is a need for assistance from primary care mental health workers in general practice in the Netherlands. General practitioners (GPs experience an overload of frequent attenders suffering from psychological problems. Problem Solving Treatment (PST is a brief psychological treatment tailored for use in a primary care setting. PST is provided by nurses, and earlier research has shown that it is a treatment at least as effective as usual care. However, research outcomes are not totally satisfying. This protocol describes a randomized clinical trial on the effectiveness of PST provided by nurses for patients in general practice. The results of this study, which currently being carried out, will be presented as soon as they are available. Methods/design This study protocol describes the design of a randomized controlled trial to investigate the effectiveness and cost-effectiveness of PST and usual care compared to usual care only. Patients, 18 years and older, who present psychological problems and are frequent attenders in general practice are recruited by the research assistant. The participants receive questionnaires at baseline, after the intervention, and again after 3 months and 9 months. Primary outcome is the reduction of symptoms, and other outcomes measured are improvement in problem solving skills, psychological and physical well being, daily functioning, social support, coping styles, problem evaluation and health care utilization. Discussion Our results may either confirm that PST in primary care is an effective way of dealing with emotional disorders and a promising addition to the primary care in the UK and USA, or may question this assumption. This trial will allow an evaluation of the effects of PST in practical circumstances and in a rather heterogeneous group of primary care patients. This study delivers scientific support for this use and therefore indications for optimal treatment and referral.

  6. Determinants of frequent attendance in Danish general practice

    DEFF Research Database (Denmark)

    Jørgensen, Jeanette Therming; Andersen, John Sahl; Tjønneland, Anne

    2016-01-01

    . below recommended level), and hormone therapy in women (1.52; 1.42-1.63) were all significant determinants of frequent attendance. CONCLUSIONS: In addition to pre-existing medical conditions, gender, socio-demographic and gender-specific factors, lifestyle (obesity, smoking, exercise and alcohol use.......57-0.69, >4 years higher education vs. no vocational training) and employment (0.61; 0.57-0.65) were inversely associated with frequent attendance. Finally, obesity (1.54; 1.14-2.08), smoking (1.21; 1.12-1.30, current vs. never), physical activity (0.84; 0.80-89), alcohol consumption (0.83; 0.78-0.87 above vs...

  7. Frequent rhabdomyolysis in anti-NMDA receptor encephalitis.

    Science.gov (United States)

    Lim, Jung-Ah; Lee, Soon-Tae; Kim, Tae-Joon; Moon, Jangsup; Sunwoo, Jun-Sang; Byun, Jung-Ick; Jung, Keun-Hwa; Jung, Ki-Young; Chu, Kon; Lee, Sang Kun

    2016-09-15

    The aim of this study was to analyze the clinical presentation and provocation factors of rhabdomyolysis in anti-NMDAR encephalitis. Among the 16 patients with anti-NMDAR encephalitis in our institutional cohort, nine patients had elevated CK enzyme levels and clinical evidence of rhabdomyolysis. Rhabdomyolysis was more frequent after immunotherapy. The use of dopamine receptor blocker (DRB) increased the risk of rhabdomyolysis. None of the patients without rhabdomyolysis received DRBs. Rhabdomyolysis is a frequent complication in anti-NMDAR encephalitis and more common after immunotherapy and the use of DRBs increases the risk. Therefore, DRBs should be administered carefully in patients with anti-NMDAR encephalitis. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. Case Report Frequent malaria illness episodes in two Malawian ...

    African Journals Online (AJOL)

    Frequent malaria in two patients on ART after stopping CPT 57. Malawi Medical Journal 29 (1): March 2017 http://dx.doi.org/10.4314/mmj.v29i1.12. Wongani J.S. Nyangulu1, Edson Mwinjiwa1, Titus H. Divala2, Randy G. Mungwira2,. Osward Nyirenda2, Maxwell Kanjala2, Gillian Mbambo3, Jane Mallewa4, Terrie E. Taylor2,.

  9. Longleaf pine restoration in context comparisons of frequent fire forests

    Science.gov (United States)

    Seth Bigelow; Michael C. Stambaugh; Joseph J. O' Brien; Andrew J. Larson; Michael A. Battaglia

    2018-01-01

    To see a frequent-fire forest burn for the first time is to experience a remarkable teat of nature. Most people are accustomed to the slow change of forests with the seasons, not the instantaneous conversion of green and brown plant mass to smoke and char. Yet to visit such a forest a week after it bums is to see bright green shoots emerging, highlighted against a...

  10. Incremental Frequent Subgraph Mining on Large Evolving Graphs

    KAUST Repository

    Abdelhamid, Ehab

    2017-08-22

    Frequent subgraph mining is a core graph operation used in many domains, such as graph data management and knowledge exploration, bioinformatics and security. Most existing techniques target static graphs. However, modern applications, such as social networks, utilize large evolving graphs. Mining these graphs using existing techniques is infeasible, due to the high computational cost. In this paper, we propose IncGM+, a fast incremental approach for continuous frequent subgraph mining problem on a single large evolving graph. We adapt the notion of “fringe” to the graph context, that is the set of subgraphs on the border between frequent and infrequent subgraphs. IncGM+ maintains fringe subgraphs and exploits them to prune the search space. To boost the efficiency, we propose an efficient index structure to maintain selected embeddings with minimal memory overhead. These embeddings are utilized to avoid redundant expensive subgraph isomorphism operations. Moreover, the proposed system supports batch updates. Using large real-world graphs, we experimentally verify that IncGM+ outperforms existing methods by up to three orders of magnitude, scales to much larger graphs and consumes less memory.

  11. Handling Dynamic Weights in Weighted Frequent Pattern Mining

    Science.gov (United States)

    Ahmed, Chowdhury Farhan; Tanbeer, Syed Khairuzzaman; Jeong, Byeong-Soo; Lee, Young-Koo

    Even though weighted frequent pattern (WFP) mining is more effective than traditional frequent pattern mining because it can consider different semantic significances (weights) of items, existing WFP algorithms assume that each item has a fixed weight. But in real world scenarios, the weight (price or significance) of an item can vary with time. Reflecting these changes in item weight is necessary in several mining applications, such as retail market data analysis and web click stream analysis. In this paper, we introduce the concept of a dynamic weight for each item, and propose an algorithm, DWFPM (dynamic weighted frequent pattern mining), that makes use of this concept. Our algorithm can address situations where the weight (price or significance) of an item varies dynamically. It exploits a pattern growth mining technique to avoid the level-wise candidate set generation-and-test methodology. Furthermore, it requires only one database scan, so it is eligible for use in stream data mining. An extensive performance analysis shows that our algorithm is efficient and scalable for WFP mining using dynamic weights.

  12. Workup and management of patients with frequent premature ventricular contractions.

    Science.gov (United States)

    Giles, Katie; Green, Martin S

    2013-11-01

    Premature ventricular contractions (PVCs) are a frequently encountered entity in clinical cardiology. They rarely affect prognosis or management. However, they might produce bothersome symptoms and, in select individuals with a high PVC burden, they might contribute to left ventricular (LV) dysfunction. Workup of patients with very frequent PVCs consists of a thorough history and physical examination to screen for underlying cardiac disease and potential triggers. Routine investigations include a standard 12-lead electrocardiogram, as well as an echocardiogram. A Holter monitor should be performed in those with severe symptoms, a history of syncope, or a malignant family history. Exercise stress testing has a role in evaluating for ischemia and in the assessment of patients with exertional symptoms. More advanced testing is not warranted if these initial investigations are reassuring. Referral to an arrhythmia specialist should be considered in patients with LV dysfunction whose PVC burden exceeds 15%. Frequent ventricular ectopy represents a rare, but reversible cause of LV dysfunction and these patients should be further evaluated for possible catheter ablation. Copyright © 2013 Canadian Cardiovascular Society. Published by Elsevier Inc. All rights reserved.

  13. Intensified follow-up in colorectal cancer patients using frequent Carcino-Embryonic Antigen (CEA) measurements and CEA-triggered imaging : Results of the randomized "CEAwatch" trial

    NARCIS (Netherlands)

    Verberne, C. J.; Zhan, Z.; van den Heuvel, E.; Grossmann, I.; Doornbos, P. M.; Havenga, K.; Manusama, E.; Klaase, J.; van der Mijle, H. C. J.; Lamme, B.; Bosscha, K.; Baas, P.; van Ooijen, B.; Nieuwenhuijzen, G.; Marinelli, A.; van der Zaag, E.; Wasowicz, D.; de Bock, G. H.; Wiggers, T.

    Aim: The value of frequent Carcino-Embryonic Antigen (CEA) measurements and CEA-triggered imaging for detecting recurrent disease in colorectal cancer (CRC) patients was investigated in search for an evidence-based follow-up protocol. Methods: This is a randomized-controlled multicenter prospective

  14. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  15. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  16. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  17. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  18. Ostial left main coronary stenosis in a frequent flyer.

    LENUS (Irish Health Repository)

    O'Sullivan, John F

    2009-05-15

    A 52 year old gentleman presented with chest pain, after a long distance flight from India; he had made long haul flights every 2 weeks over the last 5 years as part of his job. His ECG revealed T wave inversion in leads V1-3. Cardiac biomarkers including troponin were negative; we proceeded to exercise stress testing (EST). This revealed 2 mm ST depression at 2 min of the standard Bruce protocol, associated with chest pain. He was taken immediately to the coronary catheterization laboratory; engagement of the left main caused pressure damping with 6 French, then 5 French diagnostic Judkins left 4 catheters. An ostial left main stenosis was seen; the right and left coronary trees otherwise had no significant stenoses. He had normal LV function. He underwent inpatient CABG 7 days later.

  19. Effects of frequent announced parasitology quizzes on the academic achievement.

    Directory of Open Access Journals (Sweden)

    Ghasem Zamini

    2013-12-01

    Full Text Available The effect of frequent examinations on the students' learning has had inconsistent results. This study aimed to assess the effectiveness of frequent announced quizzes on the learning of a representative sample of Iranian medical students.This experimental study was conducted among 37 fifth semester medical students who had taken the course in Protozoology and Helminthology, in which the same basic information were provided about different types of protozoa and worms. Initially, in the teaching of helminthology, ten routine sessions were handled with lectures and interactive questions and answers. Then at the beginning of the protozoology topic in the beginning of all of the next 9 sessions, the students were informed that they will have a quiz at the end of each session. At the end of the semester, the total scores of quizzes were compared with the mean final scores of protozoology and helminthology using paired t and repeated measure tests.The mean final scores of the protozoology lesson were not significantly different from that of the helminthology (10.45 ± 2.75 vs.11.25 ± 2.56 on the scale of 20, respectively, P=0.13. There was no significant difference in the mean score of the five quizzes compared with the mean final term score of protozoology. The overall mean scores in the helminthology lesson (11.25±2.56, protozoology lesson (10.45±2.75, and the quizzes (9.16 ± 3.55 were significantly different (P <0.0001.Frequent announced quizzes were not effective on increasing the medical students' motivation and learning.

  20. Brain perfusion SPECT in children with frequent fits

    International Nuclear Information System (INIS)

    Heiskala, H.; Launes, J.; Pihko, H.; Nikkinen, P.; Santavuori, P.

    1993-01-01

    We studied 14 children with frequent fits using 99m Tc-HM-PAO single photon emission computed tomography (SPECT). There were 11 patients with partial secondary generalized epilepsy (PSGE) and 3 with Lennox-Gastaut syndrome (LGS). The typical regional cerebral blood flow (rCBF) finding in PSGE was a single area of abnormally low perfused cortex, and that in LGS, multiple hypoperfused areas. Clinically, the LGS patients were more severely affected. SPECT was more sensitive in detecting abnormalities than EEG, CT or MRI. Extensive impairment of rCBF may thus indicate unfavourable development of intellectual performance and poor seizure control. (author)

  1. Managing for Old Growth in Frequent-fire Landscapes

    Directory of Open Access Journals (Sweden)

    Carl E. Fiedler

    2007-12-01

    Full Text Available There is no one-size-fits-all approach to managing frequent-fire, old-growth forests. However, there are general guidelines to follow: 1 set objectives for both structure (tree density, diameter distribution, tree species composition, spatial arrangement, amount of coarse woody debris and function (nutrient cycling, desired tree species regeneration; 2 prioritize treatments according to ecological, economic, and social needs and risks; 3 identify the potential treatments (natural fire, prescribed fire, silvicultural cutting that best meet the objectives and scale of the project; and 4 implement the treatment(s. We discuss each of these guidelines in this article.

  2. Protocollering is essentieel : Behandeling van paracetamolintoxicatie in Nederland

    NARCIS (Netherlands)

    Van Roon, E.N.; Van Den Bemt, P.M.L.A.; Van Zantvoort, C.A.; Touw, D.J.

    2000-01-01

    Paracetamol poisoning occurs frequently in the Netherlands. In order to study the way in which paracetamol poisonings are being treated in Dutch hospitals, a survey was sent to all Dutch hospital pharmacies, in which they were asked to sent their current protocol for the treatment of paracetamol

  3. Implementation of enteral feeding protocol in an intensive care unit

    DEFF Research Database (Denmark)

    Padar, Martin; Uusvel, Gerli; Starkopf, Liis

    2017-01-01

    AIM: To determine the effects of implementing an enteral feeding protocol on the nutritional delivery and outcomes of intensive care patients. METHODS: An uncontrolled, observational before-and-after study was performed in a tertiary mixed medical-surgical intensive care unit (ICU). In 2013......, a nurse-driven enteral feeding protocol was developed and implemented in the ICU. Nutrition and outcome-related data from patients who were treated in the study unit from 2011-2012 (the Before group) and 2014-2015 (the After group) were obtained from a local electronic database, the national Population...... the groups. Patients in the After group had a lower 90-d (P = 0.026) and 120-d (P = 0.033) mortality. In the After group, enteral nutrition was prescribed less frequently (P = 0.039) on day 1 but significantly more frequently on all days from day 3. Implementation of the feeding protocol resulted in a higher...

  4. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  5. Brain intrinsic network connectivity in individuals with frequent tanning behavior.

    Science.gov (United States)

    Ketcherside, Ariel; Filbey, Francesca M; Aubert, Pamela M; Seibyl, John P; Price, Julianne L; Adinoff, Bryon

    2018-05-01

    Emergent studies suggest a bidirectional relationship between brain functioning and the skin. This neurocutaneous connection may be responsible for the reward response to tanning and, thus, may contribute to excessive tanning behavior. To date, however, this association has not yet been examined. To explore whether intrinsic brain functional connectivity within the default mode network (DMN) is related to indoor tanning behavior. Resting state functional connectivity (rsFC) was obtained in twenty adults (16 females) with a history of indoor tanning. Using a seed-based [(posterior cingulate cortex (PCC)] approach, the relationship between tanning severity and FC strength was assessed. Tanning severity was measured with symptom count from the Structured Clinical Interview for Tanning Abuse and Dependence (SITAD) and tanning intensity (lifetime indoor tanning episodes/years tanning). rsFC strength between the PCC and other DMN regions (left globus pallidus, left medial frontal gyrus, left superior frontal gyrus) is positively correlated with tanning symptom count. rsFC strength between the PCC and salience network regions (right anterior cingulate cortex, left inferior parietal lobe, left inferior temporal gyrus) is correlated with tanning intensity. Greater connectivity between tanning severity and DMN and salience network connectivity suggests that heightened self-awareness of salient stimuli may be a mechanism that underlies frequent tanning behavior. These findings add to the growing evidence of brain-skin connection and reflect dysregulation in the reward processing networks in those with frequent tanning.

  6. Cannabis consumption patterns among frequent consumers in Uruguay.

    Science.gov (United States)

    Boidi, María Fernanda; Queirolo, Rosario; Cruz, José Miguel

    2016-08-01

    In 2013, Uruguay became the first country to fully regulate the cannabis market, which now operates under state control. Cannabis can be legally acquired in three ways: growing it for personal use (self-cultivation), cannabis club membership, and from pharmacies (not yet implemented). Users must be entered into a confidential official registry to gain access. This article presents findings of a Respondent Driven Sample survey of 294 high-frequency cannabis consumers in the Montevideo metropolitan area. Frequent consumers resort to more than one method for acquiring cannabis, with illegal means still predominating after 1 year of the new regulation law. Cannabis users overwhelmingly support the current regulation, but many of them are reluctant to register. Some of the attitudes and behaviors of the high-frequency consumers pose a challenge to the success of the cannabis law. Individuals relying on more than one method of access defy the single access clause, a prerequisite for legal use, while the maximum amount of cannabis individuals can access monthly seems too high even for most frequent consumers, which might promote the emergence of a grey market. Reluctance to register among a significant proportion of high-frequency consumers raises doubts about the law's ability to achieve its stated objectives. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Finding Frequent Closed Itemsets in Sliding Window in Linear Time

    Science.gov (United States)

    Chen, Junbo; Zhou, Bo; Chen, Lu; Wang, Xinyu; Ding, Yiqun

    One of the most well-studied problems in data mining is computing the collection of frequent itemsets in large transactional databases. Since the introduction of the famous Apriori algorithm [14], many others have been proposed to find the frequent itemsets. Among such algorithms, the approach of mining closed itemsets has raised much interest in data mining community. The algorithms taking this approach include TITANIC [8], CLOSET+[6], DCI-Closed [4], FCI-Stream [3], GC-Tree [15], TGC-Tree [16] etc. Among these algorithms, FCI-Stream, GC-Tree and TGC-Tree are online algorithms work under sliding window environments. By the performance evaluation in [16], GC-Tree [15] is the fastest one. In this paper, an improved algorithm based on GC-Tree is proposed, the computational complexity of which is proved to be a linear combination of the average transaction size and the average closed itemset size. The algorithm is based on the essential theorem presented in Sect. 4.2. Empirically, the new algorithm is several orders of magnitude faster than the state of art algorithm, GC-Tree.

  8. Promiscuous 2-aminothiazoles (PrATs): a frequent hitting scaffold.

    Science.gov (United States)

    Devine, Shane M; Mulcair, Mark D; Debono, Cael O; Leung, Eleanor W W; Nissink, J Willem M; Lim, San Sui; Chandrashekaran, Indu R; Vazirani, Mansha; Mohanty, Biswaranjan; Simpson, Jamie S; Baell, Jonathan B; Scammells, Peter J; Norton, Raymond S; Scanlon, Martin J

    2015-02-12

    We have identified a class of molecules, known as 2-aminothiazoles (2-ATs), as frequent-hitting fragments in biophysical binding assays. This was exemplified by 4-phenylthiazol-2-amine being identified as a hit in 14/14 screens against a diverse range of protein targets, suggesting that this scaffold is a poor starting point for fragment-based drug discovery. This prompted us to analyze this scaffold in the context of an academic fragment library used for fragment-based drug discovery (FBDD) and two larger compound libraries used for high-throughput screening (HTS). This analysis revealed that such "promiscuous 2-aminothiazoles" (PrATs) behaved as frequent hitters under both FBDD and HTS settings, although the problem was more pronounced in the fragment-based studies. As 2-ATs are present in known drugs, they cannot necessarily be deemed undesirable, but the combination of their promiscuity and difficulties associated with optimizing them into a lead compound makes them, in our opinion, poor scaffolds for fragment libraries.

  9. Proposed protocols for peripheral and renal Doppler

    International Nuclear Information System (INIS)

    Fonseca Portuguez, Adriana

    2009-01-01

    A literature review was performed in order to prepare a summary of the important concepts of Doppler and applications in peripheral vascular evaluation and renal. The normal characteristics are summarized and explained in each vascular system and diagnostic criteria of the disorders frequently encountered in practice. Requested more studies have been identified and proposed protocols and report sheets have been developed to standardize the methodology of realization of several Doppler studies. The variability between operators has been treated to reduce as much as possible and follow-up studies have provided in patients who need. (author) [es

  10. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  11. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  12. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  13. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  14. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  15. Radiotherapy of the most frequent solid tumors in childhood

    International Nuclear Information System (INIS)

    Pfeiffer, J.; Kamprad, F.

    1980-01-01

    During the past decade the prognosis of malignant tumors in childhood could be clearly improved, realized by combining surgery, radiation therapy and chemotherapy. Recommendations for the use of radiotherapy for the most frequent solid tumors in childhood are represented basing on the experience of the study groups 'Pediatric Hematology and Oncology' of the Society for Pediatrics of the GDR and 'Tumors in Childhood' of the Section of Children's Surgery of the GDR. Besides general problems which have to be taken into consideration in the treatment of infantile tumors the radiotherapeutical measures for Wilms' tumors, neuroblastomas, cerebral tumors, embryonal sarcomas of the soft parts and bone tumors are discussed. The necessary close cooperation of the attending branches is pointed out and both the regional centralization of patients' care and a superregional cooperation are required. (author)

  16. Frequently Asked Questions in Fire Probabilistic Safety Assessment

    International Nuclear Information System (INIS)

    Kang, Dae Il; Kim, Kil Yoo; Park, Gee Yong

    2010-05-01

    The FAQs(Frequently Asked Questions) in the Fire Probabilistic Safety Assessment(FPSA) are the issues occurred during performing the engineering evaluation based on NFPA-805. In this report, the background and resolutions are reviewed and described for 17 FAQs related to FPSA among 57 FAQs. The current FAQs related to FPSA are the issues concerning to NUREG/CR-6850, and are almost resolved but for the some FAQ, the current resolutions would be changed depending on the results of the future or on-going research. Among FAQs related to FPSA, best estimate approaches are suggested concerning to the conservative method of NUREG/CR-6850. If these best estimate solutions are used in the FPSA of nuclear power plants, realistic evaluation results of fire risk would be obtained

  17. High prevalence of frequent attendance in the over 65s.

    Science.gov (United States)

    McMahon, C Geraldine; Power Foley, Megan; Robinson, David; O'Donnell, Kate; Poulton, Miriam; Kenny, Rose A; Bennett, Kathleen

    2018-02-01

    Characteristics of older frequent users of Emergency Departments (EDs) are poorly understood. Our aim was to examine the characteristics of the ED frequent attenders (FAs) by age (under 65 and over 65 years). We examined the prevalence of FA attending the ED of an Urban Teaching Hospital in a cross-sectional study between 2009 and 2011. FA was defined as an individual who presented to the ED four or more times over a 12-month period. Randomly selected groups of FA and non-FA from two age groups (under 65 and over 65 years) were then examined to compare the characteristics between older FAs and non-FAs and older FAs and younger FAs. Logistic regression was used to calculate the odds ratio and 95% confidence intervals for 12-month mortality in FA compared with non-FA aged at least 65 years. Overall, 137 150 ED attendances were recorded between 2009 and 2011. A total of 21.6% were aged at least 65 years, 4.4% of whom were FAs, accounting for 18.4% of attendances by patients older than 65 years. There was a bimodal age distribution of FA (mean±SD; under 65 years 40±12.7; and over 65 years 76.9±7.4). Older FAs were five times more likely to present outside normal working hours and 5.5 times more likely to require admission. Cardiovascular emergencies were the most common complaint, in contrast with the younger FA group, where injury and psychosocial conditions dominated. The odds ratio for death at 12 months was 2.07 (95% confidence interval 0.93-4.63; P=0.07), adjusting for age and sex. One-in-five ED patients older than 65 years of age are FAs. Older FAs largely present with complex medical conditions. Enhanced access to expert gerontology assessment should be considered as part of effective intervention strategies for older ED users.

  18. A New Fast Vertical Method for Mining Frequent Patterns

    Directory of Open Access Journals (Sweden)

    Zhihong Deng

    2010-12-01

    Full Text Available Vertical mining methods are very effective for mining frequent patterns and usually outperform horizontal mining methods. However, the vertical methods become ineffective since the intersection time starts to be costly when the cardinality of tidset (tid-list or diffset is very large or there are a very large number of transactions. In this paper, we propose a novel vertical algorithm called PPV for fast frequent pattern discovery. PPV works based on a data structure called Node-lists, which is obtained from a coding prefix-tree called PPC-tree. The efficiency of PPV is achieved with three techniques. First, the Node-list is much more compact compared with previous proposed vertical structure (such as tid-lists or diffsets since transactions with common prefixes share the same nodes of the PPC-tree. Second, the counting of support is transformed into the intersection of Node-lists and the complexity of intersecting two Node-lists can be reduced to O(m+n by an efficient strategy, where m and n are the cardinalities of the two Node-lists respectively. Third, the ancestor-descendant relationship of two nodes, which is the basic step of intersecting Node-lists, can be very efficiently verified by Pre-Post codes of nodes. We experimentally compare our algorithm with FP-growth, and two prominent vertical algorithms (Eclat and dEclat on a number of databases. The experimental results show that PPV is an efficient algorithm that outperforms FP-growth, Eclat, and dEclat.

  19. [Is nocturnal polyuria more frequent among patients with Parkinson's disease?].

    Science.gov (United States)

    Romain, J; Torny, F; Dumas, J-P; Gamé, X; Descazeaud, A

    2015-05-01

    Nocturia is a frequent complaint in the population of idiopathic Parkinson's disease patients (IPD). The consequences of nocturia in the IPD population are at high importance as these patients have motor problems and therefore a risk of nocturnal fall. The aim of the study was to determine the mechanism of nocturia in patients with MPI, by determining the prevalence of nocturnal polyuria (NP) in this population. A prospective study by bladder diary was conducted on 70 consecutive IPD patients consulting for regular neurological follow-up at a non-severe stage. Nocturia was defined as 1 or more awakenings to urinate. Two definitions of NP were used: nocturnal diuresis 33% or higher of the total diuresis (NUV33), which is the ICS (International Continence Society) definition, and nocturnal diuresis 90 mL/h or higher (NUP90). The mean patient age was 71 years (45-86, sex ratio 33/30). On average, patients were diagnosed for IPD 6.76 years earlier. The prevalence of NP was 64.5% according to NUV33 definition, and 17.7% according to NUP90 definition. Among patients with nocturia, the prevalence of NP was 66% (NUV33) and 21.5% (NUP90). No association was observed between disease duration of the IPD and the prevalence of nocturia and NP. Patients 70 years and older were more likely to have NP as defined by NUV33 than those less than 70 years (72.7% versus 55.17%, P=0.015). Men had more frequently nocturia (33.3% versus 20.7%, P=0.027). The prevalence of NP and nocturia was analyzed in patients with IPD at a non-severe stage. This prevalence was not higher than in the general population of the same age. The mechanism of nocturia in patients with IPD is not unambiguous and therefore requires to be explored by a bladder diary. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  20. [Frequent attendance in a Primary Health Care District].

    Science.gov (United States)

    Menéndez Granados, Nicolás; Vaquero Abellán, Manuel; Toledano Estepa, Manuel; Pérez Díaz, Manuel Modesto; Redondo Pedraza, Rosa

    2017-10-09

    To describe the distribution of frequent attenders (FA) through the different primary care practices in Cordoba-Guadalquivir Health District (Córdoba, Spain). An ecological study was performed, including data from 2011 to 2015. Defining FA as those subjects who made12 or more appointments per year; independently analysed for nursing, general practice and paediatrics. Prevalence of frequent attendance and FA/professional ratio were used as dependent variables. Demographic characteristics from district population, number of health professionals and use of general facilities were also examinated. Aiming to understand FA distribution, primary health settings were classified according to facility size and environmental location (urban, suburban and rural). The mean prevalence for FA was 10.86% (0.5 SE) for nursing; general practice 21.70% (0.7 SE) and for paediatrics 16.96% (0.7 SE). FA/professional ratios for the different professional categories were: 101.07 (5.0 SE) for nursing, 239.74 (9.0 SE) for general practice and 159.54 (9.8 SE) for paediatrics. A major part of primary health care users make a high number of consultations. From this group, women overuse nursing and general practitioner services more compared to men. A higher prevalence of FAs was observed in smaller settings, in rural areas. Although taking the FAs:professional ratio as the bar, medium-size practices are more highly overused. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  1. Epidemiology of frequent attenders: a 3-year historic cohort study comparing attendance, morbidity and prescriptions of one-year and persistent frequent attenders

    Directory of Open Access Journals (Sweden)

    ter Riet Gerben

    2009-01-01

    Full Text Available Abstract Background General Practitioners spend a disproportionate amount of time on frequent attenders. So far, trials on the effect of interventions on frequent attenders have shown negative results. However, these trials were conducted in short-term frequent attenders. It would be more reasonable to target intervention at persistent frequent attenders. Typical characteristics of persistent frequent attenders, as opposed to 1-year frequent attenders and non-frequent attenders, may generate hypotheses regarding modifiable factors on which new randomized trials may be designed. Methods We used the data of all 28,860 adult patients from 5 primary healthcare centers. Frequent attenders were patients whose attendance rate ranked in the (age and sex adjusted top 10 percent during 1 year (1-year frequent attenders or 3 years (persistent frequent attenders. All other patients on the register over the 3-year period were referred to as non-frequent attenders. The lists of medical problems coded by the GP using the International Classification of Primary Care (ICPC were used to assess morbidity. First, we determined which proportion of 1-year frequent attenders was still a frequent attender during the next two consecutive years and calculated the GPs' workload for these patients. Second, we compared morbidity and number of prescriptions for non-frequent attenders, 1-year frequent attenders and persistent frequent attenders. Results Of all 1-year frequent attenders, 15.4% became a persistent frequent attender equal to 1.6% of all patients. The 1-year frequent attenders (3,045; 10.6% were responsible for 39% of the face-to-face consultations; the 470 patients who would become persistent frequent attenders (1.6% were responsible for 8% of all consultations in 2003. Persistent frequent attenders presented more social problems, more psychiatric problems and medically unexplained physical symptoms, but also more chronic somatic diseases (especially diabetes

  2. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  3. DMBT1 is frequently downregulated in well-differentiated gastric carcinoma but more frequently upregulated across various gastric cancer types

    DEFF Research Database (Denmark)

    Conde, Ana R; Martins, Ana P; Brito, Miguel

    2007-01-01

    in cell differentiation and protection and has been proposed as a candidate tumour suppressor for brain and epithelial cancer. One study reported a loss of DMBT1 expression in 12.5% (5/40) of gastric cancer samples. Here, we examined in more detail DMBT1 protein and mRNA expression in 78 primary gastric...... preferentially take place in well-differentiated gastric carcinoma. However, an upregulation of DMBT1 expression is more frequently found across all gastric cancer types.......Well-differentiated gastric carcinomas are considered to represent a distinct entity emerging via specific molecular changes different from those found in other gastric carcinoma types. The gene deleted in malignant brain tumours 1 (DMBT1) at 10q25.3-q26.1 codes for a protein presumably involved...

  4. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  5. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  6. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  7. Pilot trial of osteopathic manipulative therapy for patients with frequent episodic tension-type headache.

    Science.gov (United States)

    Rolle, Guido; Tremolizzo, Lucio; Somalvico, Francesco; Ferrarese, Carlo; Bressan, Livio C

    2014-09-01

    Osteopathic manipulative therapy (OMTh; manipulative care provided by foreign-trained osteopaths) may be used for managing headache pain and related disability, but there is a need for high-quality randomized controlled trials to assess the effectiveness of this intervention. To explore the efficacy of OMTh for pain management in frequent episodic tension-type headache (TTH). Single-blind randomized placebo-controlled pilot study. Patients were recruited from 5 primary care settings. Forty-four patients who were affected by frequent episodic TTH and not taking any drugs for prophylactic management of episodic TTH were recruited. Patients were randomly allocated to an experimental or control group. The experimental group received corrective OMTh techniques, tailored for each patient; the control group received assessment of the cranial rhythmic impulse (sham therapy). The study included a 1-month baseline period, a 1-month treatment period, and a 3-month follow-up period. The primary outcome was the change in patient-reported headache frequency, and secondary outcomes included changes in headache pain intensity (discrete score, 1 [lowest perceived pain] to 5 [worst perceived pain]), over-the-counter medication use, and Headache Disability Inventory score. Forty patients completed the study (OMTh, n=21; control, n=19). The OMTh group had a significant reduction in headache frequency over time that persisted 1 month (approximate reduction, 40%; Ptreatment. Moreover, there was an absolute difference between the 2 treatment groups at the end of the study, with a 33% lower frequency of headache in the OMTh group (Ptreatment modalities and may benefit patients who have adverse effects to medications or who have difficulty complying with pharmacologic regimens. This protocol may serve as a model for future studies. © 2014 The American Osteopathic Association.

  8. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  9. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  10. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  11. Chest Pain: The Need to Consider Less Frequent Diagnosis

    Directory of Open Access Journals (Sweden)

    Pedro Magalhães

    2016-01-01

    Full Text Available Chest pain is one of the most frequent patient’s complaints. The commonest underlying causes are well known, but, sometimes, in some clinical scenarios, it is necessary to consider other diagnoses. We report a case of a 68-year-old Caucasian male, chronically hypertensive, who complained of recurrent episodes of chest pain and fever with elevated acute phase reactants. The first investigation was negative for some of the most likely diagnosis and he quickly improved with anti-inflammatory drugs. Over a few months, his symptoms continued to recur periodically, his hypertension was aggravated, and he developed headaches and lower limbs claudication. After a temporal artery biopsy that was negative for vasculitis, he underwent a positron emission tomography suggestive of Takayasu Arteritis. Takayasu Arteritis is a rare chronic granulomatous vasculitis of the aorta and its first-order branches affecting mostly females up to 50 years old. Chest pain is experienced by >40% of the patients and results from the inflammation of the aorta, pulmonary artery, or coronaries.

  12. [Loyal frequent users of hospital emergency departments: the FIDUR project].

    Science.gov (United States)

    Fernández Alonso, Cesáreo; Romero Pareja, Rodolfo; Rivas García, Aristides; Jiménez Gallego, Rosa; Majo Carbajo, Yolanda; Aguilar Mulet, Juan Mariano

    2016-02-01

    To describe the characteristics of frequent users of hospital emergency departments and analyze whether characteristics varied in relation to how revisits were distributed over the course of the year studied. Retrospective study of patients over the age of 14 years who were treated in a hospital emergency department at least 10 times in 2013. Patients were identified in 17 public hospitals in the Spanish autonomous community of Madrid. Data related to the first and successive visits were gathered and analyzed by quarter year. We included 2340 patients with a mean (SD) age of 54 (21) years. A total of 1361 (58.%) were women, 1160 (50%) had no concomitant diseases, 1366 (58.2%) were substance abusers, and 25 (1.1%) were homeless. During the first visit, 2038 (87.1%) complained of a recent health problem, and 289 (12.4%) were admitted. Sixty (2.6%) patients concentrated their revisits in a single quarters 335 (14.3%) in 2 quarters, 914 (39.1%) in 3, and 1005 (42.9%) in 4. Patients whose revisits were distributed over more quarters were older (> 65 years), had more concomitant conditions, were on more medications (P women (P = .012) and more likely to have a specific diagnosis (P loyally comes to the same emergency department over the course of a year. Patients whose revisits are dispersed over a longer period have more complex problems and use more resources during their initial visit.

  13. The semiology of febrile seizures: Focal features are frequent.

    Science.gov (United States)

    Takasu, Michihiko; Kubota, Tetsuo; Tsuji, Takeshi; Kurahashi, Hirokazu; Numoto, Shingo; Watanabe, Kazuyoshi; Okumura, Akihisa

    2017-08-01

    To clarify the semiology of febrile seizures (FS) and to determine the frequency of FS with symptoms suggestive of focal onset. FS symptoms in children were reported within 24h of seizure onset by the parents using a structured questionnaire consisting principally of closed-ended questions. We focused on events at seizure commencement, including changes in behavior and facial expression, and ocular and oral symptoms. We also investigated the autonomic and motor symptoms developing during seizures. The presence or absence of focal and limbic features was determined for each patient. The associations of certain focal and limbic features with patient characteristics were assessed. Information was obtained on FS in 106 children. Various events were recorded at seizure commencement. Behavioral changes were observed in 35 children, changes in facial expression in 53, ocular symptoms in 78, and oral symptoms in 90. In terms of events during seizures, autonomic symptoms were recognized in 78, and convulsive motor symptoms were recognized in 68 children. Focal features were evident in 81 children; 38 children had two or more such features. Limbic features were observed in 44 children, 9 of whom had two or more such features. There was no significant relationship between any patient characteristic and the numbers of focal or limbic features. The semiology of FS varied widely among children, and symptoms suggestive of focal onset were frequent. FS of focal onset may be more common than is generally thought. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Lichenoid keratosis is frequently misdiagnosed as basal cell carcinoma.

    Science.gov (United States)

    Maor, D; Ondhia, C; Yu, L L; Chan, J J

    2017-08-01

    Lichenoid keratosis (LK), also known as benign lichenoid keratosis or lichen planus-like keratosis, is a solitary, pink to red-brown scaly plaque representing a host immunological response to a variety of precursor lesions. LK is often misdiagnosed as a dermatological malignancy owing to its clinical resemblance to basal cell carcinoma (BCC) or Bowen disease. We performed a retrospective analysis of the pathology records of a series of LK lesions with reference to the demographic features and accuracy of clinical diagnosis. The pathology records from 2008 to 2009 of 263 consecutive patients with a histological diagnosis of LK from a specialized skin laboratory were retrieved. Data relating to clinical diagnosis, age, sex, anatomical location, time of year of presentation and any coexistent pathological lesions adjacent to the LK were recorded. Mean age at presentation was 64 years (range 34-96), and 58% of patients were female. The most common anatomical site was the chest/anterior torso, followed by the back and legs. The most common coexisting lesion was solar keratosis at 14%, followed by seborrhoeic keratosis (SK) at 7.8%. The correct clinical diagnosis of LK was made in 29.5% of cases. The most common clinical diagnosis was BCC (47%), while SK was the preferred diagnosis in 18%. A clinical diagnosis was not given in 5.5% of cases. In conclusion, it appears that LK is frequently misdiagnosed, with misdiagnosis occurring in > 70% of cases in this study. © 2017 British Association of Dermatologists.

  15. Smartphone gaming and frequent use pattern associated with smartphone addiction.

    Science.gov (United States)

    Liu, Chun-Hao; Lin, Sheng-Hsuan; Pan, Yuan-Chien; Lin, Yu-Hsuan

    2016-07-01

    The aim of this study was to investigate the risk factors of smartphone addiction in high school students.A total of 880 adolescents were recruited from a vocational high school in Taiwan in January 2014 to complete a set of questionnaires, including the 10-item Smartphone Addiction Inventory, Chen Internet Addiction Scale, and a survey of content and patterns of personal smartphone use. Of those recruited, 689 students (646 male) aged 14 to 21 and who owned a smartphone completed the questionnaire. Multiple linear regression models were used to determine the variables associated with smartphone addiction.Smartphone gaming and frequent smartphone use were associated with smartphone addiction. Furthermore, both the smartphone gaming-predominant and gaming with multiple-applications groups showed a similar association with smartphone addiction. Gender, duration of owning a smartphone, and substance use were not associated with smartphone addiction.Our findings suggest that smartphone use patterns should be part of specific measures to prevent and intervene in cases of excessive smartphone use.

  16. Frequently Occurring Reconnection Jets from Sunspot Light Bridges

    Science.gov (United States)

    Tian, Hui; Yurchyshyn, Vasyl; Peter, Hardi; Solanki, Sami K.; Young, Peter R.; Ni, Lei; Cao, Wenda; Ji, Kaifan; Zhu, Yingjie; Zhang, Jingwen; Samanta, Tanmoy; Song, Yongliang; He, Jiansen; Wang, Linghua; Chen, Yajie

    2018-02-01

    Solid evidence of magnetic reconnection is rarely reported within sunspots, the darkest regions with the strongest magnetic fields and lowest temperatures in the solar atmosphere. Using the world’s largest solar telescope, the 1.6 m Goode Solar Telescope, we detect prevalent reconnection through frequently occurring fine-scale jets in the Hα line wings at light bridges, the bright lanes that may divide the dark sunspot core into multiple parts. Many jets have an inverted Y-shape, shown by models to be typical of reconnection in a unipolar field environment. Simultaneous spectral imaging data from the Interface Region Imaging Spectrograph show that the reconnection drives bidirectional flows up to 200 km s‑1, and that the weakly ionized plasma is heated by at least an order of magnitude up to ∼80,000 K. Such highly dynamic reconnection jets and efficient heating should be properly accounted for in future modeling efforts of sunspots. Our observations also reveal that the surge-like activity previously reported above light bridges in some chromospheric passbands such as the Hα core has two components: the ever-present short surges likely to be related to the upward leakage of magnetoacoustic waves from the photosphere, and the occasionally occurring long and fast surges that are obviously caused by the intermittent reconnection jets.

  17. Frequent premature ventricular contractions in an orbital spaceflight participant.

    Science.gov (United States)

    Jennings, Richard T; Stepanek, Jan P; Scott, Luis R; Voronkov, Yury I

    2010-06-01

    Commercial spaceflight participants on orbital flights typically are older than career astronauts and they often have medical conditions that have not been studied at high g or in microgravity. This is a case report of a 56-yr-old orbital spaceflight participant with essential tremor and frequent premature ventricular contractions that occurred at rates up to 7000 per day. Before training and spaceflight, he was required to complete extensive clinical investigations to demonstrate normal cardiac structures and the absence of cardiac pathology. The evaluation included signal averaged ECG, transthoracic stress echocardiography, exercise tolerance tests, electrophysiological studies, cardiac MRI, electron beam CT, Holter monitoring, and overnight oximetry. While no cardiac pathology was demonstrated, the Russian medical team required that the PVCs be treated prior to training and spaceflight. For the initial flight, a selective beta-1 receptor beta blocker was used and for the second a calcium channel blocker was used in combination with a nonselective beta blocker for tremor control. Analogue environment testing assured that this combination of medications was compatible. The spaceflight participant's PVCs were incompletely suppressed with a low-dose selective beta-1 blocker, but were well suppressed by a calcium channel blocker. He tolerated in-flight periodic use of a nonselective beta blocker in combination with a calcium channel blocker. In-flight ECG and blood pressure monitoring results were normal, and an ECG obtained midmission and on landing day showed successful PVC suppression. He did not have any cardiac difficulty with launch, on-orbit operations, entry, or recovery

  18. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  19. Frequent food insecurity among injection drug users: correlates and concerns

    Directory of Open Access Journals (Sweden)

    Strike Carol

    2012-12-01

    Full Text Available Abstract Background Food insecurity and nutrition are two topics that are under-researched among injection drug users (IDUs. Our study examined the extent and correlates of food insecurity among a sample of IDUs and explored whether there is an association between food insecurity and injection-related HIV risk. Methods A cross-sectional survey was conducted using interviewer-administered questionnaires. Data were collected at a needle exchange program in London, Ontario, Canada between September 2006 and January 2007. Participants included 144 English-speaking IDUs who had injected drugs in the past 30 days. Participants were asked about their socio-demographic characteristics, HIV risk behaviours, food insecurity, and health/social service use. Results In the past 6 months, 54.5% of participants reported that on a daily/weekly basis they did not have enough to eat because of a lack of money, while 22.1% reported this type of food insecurity on a monthly basis. Moreover, 60.4% and 24.3% reported that they did not eat the quality or quantity of food they wanted on a daily/weekly or a monthly basis, respectively. Participants reported re-using someone else’s injection equipment: 21% re-used a needle, 19% re-used water, and 37.3% re-used a cooker. The odds of sharing injection equipment were increased for food insecure individuals. Conclusions Findings show that IDUs have frequent and variable experiences of food insecurity and these experiences are strongly correlated with sharing of injection-related equipment. Such behaviours may increase the likelihood of HIV and HCV transmission in this population. Addressing food-related needs among IDUs is urgently needed.

  20. Children with Crohn's Disease Frequently Consume Select Food Additives.

    Science.gov (United States)

    Lee, Dale; Swan, C Kaiulani; Suskind, David; Wahbeh, Ghassan; Vanamala, Jairam; Baldassano, Robert N; Leonard, Mary B; Lampe, Johanna W

    2018-06-04

    Certain food additives may promote the pathogenesis of Crohn's disease (CD), but thus far the evaluation of food additive exposures in humans has been limited. The objective of this study was to quantify food additive exposures in children with CD. In a trial for bone health in CD, children were followed over 24 months with evaluation of disease characteristics, dietary intake, and body composition. At baseline, participants completed three 24-h dietary recalls. Foods were categorized, and the ingredient list for each item was evaluated for the presence of select food additives: polysorbate-80, carboxymethylcellulose, xanthan gum, soy lecithin, titanium dioxide, carrageenan, maltodextrin, and aluminosilicates. The frequency of exposures to these food additives was described for study participants and for food categories. At study baseline, 138 participants, mean age 14.2 ± 2.8 years, 95% having inactive or mild disease, were enrolled and dietary recalls were collected. A total of 1325 unique foods were recorded. Mean exposures per day for xanthan gum was 0.96 ± 0.72, carrageenan 0.58 ± 0.63, maltodextrin 0.95 ± 0.77, and soy lecithin 0.90 ± 0.74. The other additives had less than 0.1 exposures per day. For the 8 examined food additives, participants were exposed to a mean (SD) of 3.6 ± 2.1 total additives per recall day and a mean (SD) of 2.4 ± 1.0 different additives per day. Children with CD frequently consume food additives, and the impact on disease course needs further study.

  1. Comparison of MANET Routing Protocols in Different Traffic and Mobility Models

    Directory of Open Access Journals (Sweden)

    J. Baraković

    2010-06-01

    Full Text Available Routing protocol election in MANET (Mobile Ad Hoc Network is a great challenge, because of its frequent topology changes and routing overhead. This paper compares performances of three routing protocols: Destination Sequenced Distance Vector (DSDV, Ad Hoc Ondemand Distance Vector (AODV and Dynamic Source Routing (DSR, based on results analysis obtained using simulations with different load and mobility scenarios performed with Network Simulator version 2 (NS-2. In low load and low mobility scenarios routing protocols perform in a similar manner. However, with mobility and load increasing DSR outperforms AODV and DSDV protocols.

  2. FREQUENT SUBGRAPH MINING OF PERSONALIZED SIGNALING PATHWAY NETWORKS GROUPS PATIENTS WITH FREQUENTLY DYSREGULATED DISEASE PATHWAYS AND PREDICTS PROGNOSIS.

    Science.gov (United States)

    Durmaz, Arda; Henderson, Tim A D; Brubaker, Douglas; Bebek, Gurkan

    2017-01-01

    Large scale genomics studies have generated comprehensive molecular characterization of numerous cancer types. Subtypes for many tumor types have been established; however, these classifications are based on molecular characteristics of a small gene sets with limited power to detect dysregulation at the patient level. We hypothesize that frequent graph mining of pathways to gather pathways functionally relevant to tumors can characterize tumor types and provide opportunities for personalized therapies. In this study we present an integrative omics approach to group patients based on their altered pathway characteristics and show prognostic differences within breast cancer (p network-based classifier algorithms and showed that our unsupervised approach generates more robust and biologically relevant clustering whereas previous approaches failed to report specific functions for similar patient groups or classify patients into prognostic groups. These results could serve as a means to improve prognosis for future cancer patients, and to provide opportunities for improved treatment options and personalized interventions. The proposed novel graph mining approach is able to integrate PPI networks with gene expression in a biologically sound approach and cluster patients in to clinically distinct groups. We have utilized breast cancer and glioblastoma multiforme datasets from microarray and RNA-Seq platforms and identified disease mechanisms differentiating samples. Supplementary methods, figures, tables and code are available at https://github.com/bebeklab/dysprog.

  3. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  4. Insomnia is a frequent finding in adults with Asperger syndrome

    Directory of Open Access Journals (Sweden)

    von Wendt Lennart

    2003-10-01

    Full Text Available Abstract Background Asperger syndrome (AS is a neurodevelopmental disorder belonging to autism spectrum disorders with prevalence rate of 0,35% in school-age children. It has been most extensively studied in childhood while there is scarcity of reports concerning adulthood of AS subjects despite the lifelong nature of this syndrome. In children with Asperger syndrome the initiation and continuity of sleep is disturbed because of the neuropsychiatric deficits inherent of AS. It is probable that sleep difficulties are present in adulthood as well. Our hypothesis was that adults with AS suffer from difficulty in initiating and maintaining sleep and nonrestorative sleep (insomnia. Methods 20 AS without medication were compared with 10 healthy controls devoid of neuropsychiatric anamnesis. Clinical examination, blood test battery and head MRI excluded confounding somatic illnesses. Structured psychiatric interview for axis-I and axis-II disorders were given to both groups as well as Beck Depression Inventory and Wechsler adult intelligence scale, revised version. Sleep quality was assessed with sleep questionnaire, sleep diary during 6 consecutive days and description of possible sleep problems by the participants own words was requested. Results compared with controls and with normative values of good sleep, AS adults had frequent insomnia. In sleep questionnaire 90% (18/20, in sleep diary 75% (15/20 and in free description 85% (17/20 displayed insomnia. There was a substantial psychiatric comorbidity with only 4 AS subject devoid of other axis-I or axis-II disorders besides AS. Also these persons displayed insomnia. It can be noted that the distribution of psychiatric diagnoses in AS subjects was virtually similar to that found among patient with chronic insomnia. Conclusions the neuropsychiatric deficits inherent of AS predispose both to insomnia and to anxiety and mood disorders. Therefore a careful assessment of sleep quality should be an

  5. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  6. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  7. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  8. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  9. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  10. The Effect of Nicotine Administration on Physical and Psychological Signs of Withdrawal Syndrome Induced by Single or Frequent Doses of Morphine in Rats

    Directory of Open Access Journals (Sweden)

    Mohammad Allahtavakoli

    2012-07-01

    Full Text Available Introduction. Morphine addiction and morphine withdrawal syndrome are the two main problems of today’s human society. The present study has investigated the effects of nicotine on the strength of physical and psychological dependency in single and repeated doses morphine administrated rats. Materials and methods. Male Wistar rats were subjected to morphine consumption with single or frequent dose protocols. In the single dose protocol, rats received only one dose of morphine and 24hrs later they also received one dose of nicotine 30 min prior to injection of naloxone. In the repeated dose protocol, rats received incremental doses of morphine for 7 days and 24hr after the last dose (the 8th day were given naloxone. However, the nicotine regimen of this group was injected 15 min before the morphine injection, for 4 days, from the 4th to the 7th day. Five minutes after naloxone injection, each rat′s behavior was captured for 30 min, and then physical and psychological signs of withdrawal syndrome were recorded. Data were analyzed by ANOVA followed by Tukey tests and p<0.05 was considered as significant difference. Findings. Results showed that the injection of frequent and single doses of morphine lead to morphine dependency. In single dose protocol, nicotine consumption attenuated the signs of withdrawal syndrome, especially weight of excrement and total withdrawal score. In frequent dose protocol, in addition to these effects, nicotine induced weight loss and place aversion. Conclusion. The inhibitory effects of nicotine on signs of withdrawal syndrome may involve a dopaminergic portion of the central nervous system and is mediated by central nicotinic receptors. There is also a cross-dependence between nicotine and morphine.

  11. ‌‌The effect of nicotine administration on physical and psychological signs of withdrawal syndrome induced by single or frequent doses of morphine in rats

    Directory of Open Access Journals (Sweden)

    Ali Shamsizadeh

    2012-07-01

    Full Text Available Introduction: Morphine addiction and morphine withdrawal syndrome are the two main problems of today’s human society. The present study has investigated the effects of nicotine on the strength of physical and psychological dependency in single and repeated doses morphine administrated rats. Methods: Male Wistar rats were subjected to morphine consumption with single or frequent dose protocols. In the single dose protocol, rats received only one dose of morphine and 24hrs later they also received one dose of nicotine 30 min prior to injection of naloxone. In the repeated dose protocol, rats received incremental doses of morphine for 7 days and 24hr after the last dose (the 8th day were given naloxone. However, the nicotine regimen of this group was injected 15 min before the morphine injection, for 4 days, from the 4th to the 7th day. Five minutes after naloxone injection, each rat′s behavior was captured for 30 min, and then physical and psychological signs of withdrawal syndrome were recorded. Data were analyzed by ANOVA followed by Tukey tests and p<0.05 was considered as significant difference. Results: Results showed that the injection of frequent and single doses of morphine lead to morphine dependency. In single dose protocol, nicotine consumption attenuated the signs of withdrawal syndrome, especially weight of excrement and total withdrawal score. In frequent dose protocol, in addition to these effects, nicotine induced weight loss and place aversion. Discussion: The inhibitory effects of nicotine on signs of withdrawal syndrome may involve a dopaminergic portion of the central nervous system and is mediated by central nicotinic receptors. There is also a cross-dependence between nicotine and morphine.

  12. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  13. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  14. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  15. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  16. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  17. Congestion control for vehicular delay tolerant network routing protocols

    OpenAIRE

    Oham, Chuka Finbars

    2014-01-01

    The Vehicular Delay Tolerant Network (VDTN) is a special and challenging type of the Delay Tolerant Network because of its high mobility, frequent disconnections and nodal congestion features. These challenging features make it prone to congestion which leads to a considerable amount of message drops in the network. To minimize the impact of congestion in the network, we designed and implemented the Congestion Aware Spray and Wait (CASaW) routing protocol. We varied the buffer sizes of the no...

  18. Order Entry Protocols Are an Amenable Target for Workflow Automation.

    Science.gov (United States)

    Tudor, James; Klochko, Chad; Patel, Milind; Siegal, Daniel

    2018-04-21

    Order entry protocol selection of advanced imaging studies is labor-intensive, can disrupt workflow, and may displace staff from more valuable tasks. The aim of this study was to explore and compare the behaviors of radiologic technologists and radiologists when determining protocol to identify opportunities for workflow automation. A data set of over 273,000 cross-sectional examination orders from four hospitals within our health system was created. From this data set, we isolated the 12 most frequently requested examinations, which represent almost 50% of the entirety of advanced imaging volume. Intergroup comparisons were made between behavior of radiologic technologists and radiologists or residents when determining protocol. Frequencies of changes were calculated. Common parameters of changed examinations were identified. The overall change rate for both radiologists and residents (4%) is very low and comparable to the overall change rate of radiologic technologists (1%). The change rates for the 12 most ordered examinations were calculated and compared individually. Most examinations that underwent change involved a patient with a low estimated glomerular filtration rate, a patient with a contrast allergy, or a provider ordering a general examination but in fact wanting an organ-specific protocol or an angiographic study. Order entry protocol selection of the most frequently ordered advanced imaging examinations was rarely a value-added activity because these examinations are rarely changed. Changes follow predictable patterns that make order entry protocol selection of most radiology orders for advanced imaging amenable to workflow automation. Copyright © 2018 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  19. Impact of frequent cerebrospinal fluid sampling on Aβ levels: systematic approach to elucidate influencing factors.

    Science.gov (United States)

    Van Broeck, Bianca; Timmers, Maarten; Ramael, Steven; Bogert, Jennifer; Shaw, Leslie M; Mercken, Marc; Slemmon, John; Van Nueten, Luc; Engelborghs, Sebastiaan; Streffer, Johannes Rolf

    2016-05-19

    Cerebrospinal fluid (CSF) amyloid-beta (Aβ) peptides are predictive biomarkers for Alzheimer's disease and are proposed as pharmacodynamic markers for amyloid-lowering therapies. However, frequent sampling results in fluctuating CSF Aβ levels that have a tendency to increase compared with baseline. The impact of sampling frequency, volume, catheterization procedure, and ibuprofen pretreatment on CSF Aβ levels using continuous sampling over 36 h was assessed. In this open-label biomarker study, healthy participants (n = 18; either sex, age 55-85 years) were randomized into one of three cohorts (n = 6/cohort; high-frequency sampling). In all cohorts except cohort 2 (sampling started 6 h post catheterization), sampling through lumbar catheterization started immediately post catheterization. Cohort 3 received ibuprofen (800 mg) before catheterization. Following interim data review, an additional cohort 4 (n = 6) with an optimized sampling scheme (low-frequency and lower volume) was included. CSF Aβ(1-37), Aβ(1-38), Aβ(1-40), and Aβ(1-42) levels were analyzed. Increases and fluctuations in mean CSF Aβ levels occurred in cohorts 1-3 at times of high-frequency sampling. Some outliers were observed (cohorts 2 and 3) with an extreme pronunciation of this effect. Cohort 4 demonstrated minimal fluctuation of CSF Aβ both on a group and an individual level. Intersubject variability in CSF Aβ profiles over time was observed in all cohorts. CSF Aβ level fluctuation upon catheterization primarily depends on the sampling frequency and volume, but not on the catheterization procedure or inflammatory reaction. An optimized low-frequency sampling protocol minimizes or eliminates fluctuation of CSF Aβ levels, which will improve the capability of accurately measuring the pharmacodynamic read-out for amyloid-lowering therapies. ClinicalTrials.gov NCT01436188 . Registered 15 September 2011.

  20. The Frequent Fliers of New Mexico: Hospital Readmissions among the Homeless Population.

    Science.gov (United States)

    Dirmyer, Victoria F

    2016-07-01

    It is estimated that there are 1.7 million homeless individuals in the United States; 36% are families with children under the age of 18. Due to lack of resources, individuals who are homeless frequent emergency departments for immediate health care needs. The aim of this study was to examine a homeless population over a 3-year time period who were admitted to an Albuquerque area hospital at any time during the time period. A comparison of demographic characteristics as well as hospitalization characteristics between two populations was analyzed: individuals who were homeless and had a 30-day readmission compared to those that did not have a 30-day readmission. There were 850 unique homeless patients that were admitted to an Albuquerque area hospital during the 3-year time period. The mean age was 43.8 years with the majority of the population being male. The 3-year average 30-day readmission rate was 30.1%. Multivariate regression analysis indicated that homeless patients older than 19 years, individuals with more than 1 admission during the time period, and individuals who left against medical advice had increased odds of a 30-day readmission. Individuals who were homeless who were admitted for respiratory conditions or cardiovascular disease had decreased odds of a 30-day readmission compared to patients admitted for neuropsychiatric conditions. In New Mexico, patients who were homeless experienced a high 30-day readmission rate. These results suggest a need for further research into the healthcare needs of this population and how to improve discharge protocols to prevent future readmissions.

  1. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  2. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  3. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  4. Application of Protocol-Oriented MVVM Architecture in iOS Development

    OpenAIRE

    Luong Nguyen, Khoi Nguyen

    2017-01-01

    The mobile application industry is fast paced. Requirements change, additions of new features occur on a daily basis and demand frequent code structure adjustment. Thus, a flexible and maintainable software architecture is often a key factor for an application’s success. The major objective of this thesis is to propose a practical use case of Protocol Oriented Model View View Model, an architecture inspired by the Protocol Oriented Programming paradigm. This thesis explains the architectur...

  5. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    OpenAIRE

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  6. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  7. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  8. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  9. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  10. GRAMI: Frequent subgraph and pattern mining in a single large graph

    KAUST Repository

    Elseidy, M.; Abdelhamid, Ehab; Skiadopoulos, S.; Kalnis, Panos

    2014-01-01

    Mining frequent subgraphs is an important operation on graphs; it is defined as finding all subgraphs that appear frequently in a database according to a given frequency threshold. Most existing work assumes a database of many small graphs

  11. Predicting the transition from frequent cannabis use to cannabis dependence: a three-year prospective study.

    NARCIS (Netherlands)

    van der Pol, P.; Liebregts, N.; de Graaf, R.; Korf, D.J.; van den Brink, W.; van Laar, M.

    2013-01-01

    Background Frequent cannabis users are at high risk of dependence, still most (near) daily users are not dependent. It is unknown why some frequent users develop dependence, whereas others do not. This study aims to identify predictors of first-incidence DSM-IV cannabis dependence in frequent

  12. Predicting the transition from frequent cannabis use to cannabis dependence: a three-year prospective study

    NARCIS (Netherlands)

    van der Pol, Peggy; Liebregts, Nienke; de Graaf, Ron; Korf, Dirk J.; van den Brink, Wim; van Laar, Margriet

    2013-01-01

    Frequent cannabis users are at high risk of dependence, still most (near) daily users are not dependent. It is unknown why some frequent users develop dependence, whereas others do not. This study aims to identify predictors of first-incidence DSM-IV cannabis dependence in frequent cannabis users. A

  13. Frequent Users of Pornography. A Population Based Epidemiological Study of Swedish Male Adolescents

    Science.gov (United States)

    Svedin, Carl Goran; Akerman, Ingrid; Priebe, Gisela

    2011-01-01

    Frequent use of pornography has not been sufficiently studied before. In a Swedish survey 2015 male students aged 18 years participated. A group of frequent users of pornography (N = 200, 10.5%) were studied with respect to background and psychosocial correlates. The frequent users had a more positive attitude to pornography, were more often…

  14. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  15. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  16. Efficacy of Low-Dose Protocol in Follow-Up of Lymphoproliferative Disorders - Preliminary Results

    International Nuclear Information System (INIS)

    Popic-Ramac, J.; Brnic, Z.; Klasic, B.; Hebrang, A.; Knezevic, Z.

    2011-01-01

    Most medically-related radiation is caused by diagnostic examinations, in particular by computed tomography (CT). The purpose of this research is to reduce radiation doses faced by the population frequently exposed to such procedures-those with lymphoproliferative disorders. The research was conducted comparing radiation-exposition doses received by the radiosensitive organs (thyroid, lens, breast and gonad) using the standard thoracic CT protocol with the radiation received using the low-dose protocol, while maintaining display quality. The standard-dose thoracic protocol implies 120 kV and 150 mAs. The low-dose protocol was conducted on the same device using 120 kV and 30 mAs. We confirmed the hypothesis that the use of the low-dose thoracic CT protocol leads to a reduction in radiation dose without compromising display quality. It is further expected that a reduction in doses will reduce the risk of radiation-related mutations. (author)

  17. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  18. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  19. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  20. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  1. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  2. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  3. AN EFFICIENT DATA MINING METHOD TO FIND FREQUENT ITEM SETS IN LARGE DATABASE USING TR- FCTM

    Directory of Open Access Journals (Sweden)

    Saravanan Suba

    2016-01-01

    Full Text Available Mining association rules in large database is one of most popular data mining techniques for business decision makers. Discovering frequent item set is the core process in association rule mining. Numerous algorithms are available in the literature to find frequent patterns. Apriori and FP-tree are the most common methods for finding frequent items. Apriori finds significant frequent items using candidate generation with more number of data base scans. FP-tree uses two database scans to find significant frequent items without using candidate generation. This proposed TR-FCTM (Transaction Reduction- Frequency Count Table Method discovers significant frequent items by generating full candidates once to form frequency count table with one database scan. Experimental results of TR-FCTM shows that this algorithm outperforms than Apriori and FP-tree.

  4. Clinical and genetic features of pediatric acute lymphoblastic leukemia in Down syndrome in the Nordic countries

    Science.gov (United States)

    2014-01-01

    Background Children with Down syndrome (DS) have an increased risk for acute lymphoblastic leukemia (ALL). Although previous studies have shown that DS-ALL differs clinically and genetically from non-DS-ALL, much remains to be elucidated as regards genetic and prognostic factors in DS-ALL. Methods To address clinical and genetic differences between DS-ALL and non-DS-ALL and to identify prognostic factors in DS-ALL, we ascertained and reviewed all 128 pediatric DS-ALL diagnosed in the Nordic countries between 1981 and 2010. Their clinical and genetic features were compared with those of the 4,647 B-cell precursor (BCP) ALL cases diagnosed during the same time period. Results All 128 DS-ALL were BCP ALL, comprising 2.7% of all such cases. The 5-year event-free survival (EFS) and overall survival (OS) were significantly (P = 0.026 and P = 0.003, respectively) worse for DS-ALL patients with white blood cell counts ≥50 × 109/l. The age distributions varied between the DS and non-DS cases, with age peaks at 2 and 3 years, respectively; none of the DS patients had infant ALL (P = 0.029). The platelet counts were lower in the DS-ALL group (P = 0.005). Abnormal karyotypes were more common in non-DS-ALL (P < 0.0001), and there was a significant difference in the modal number distribution, with only 2% high hyperdiploid DS-ALL cases (P < 0.0001). The 5-year EFS and 5-year OS were significantly worse for DS-ALL (0.574 and 0.691, respectively) compared with non-DS-ALL (0.783 and 0.894, respectively) in the NOPHO ALL-1992/2000 protocols (P < 0.001). Conclusions The present study adds further support for genetic and clinical differences between DS-ALL and non-DS-ALL. PMID:24726034

  5. Oral breathing: new early treatment protocol

    Directory of Open Access Journals (Sweden)

    Gloria Denotti

    2014-01-01

    Full Text Available Oral breathing is a respiratory dysfunction that affects approximately 10-15% of child population. It is responsable of local effects and systemic effects, both immediate and long-term. They affect the growth of the subject and his physical health in many ways: pediatric, psycho-behavioral and cognitive. The etiology is multifactorial. It’s important the establishment of a vicious circle involving more areas and it is essential to stop it as soon as possible. In order to correct this anomaly, the pediatric dentist must be able to make a correct diagnosis to treat early the disfunction and to avoid the onset of cascade mechanisms. Who plays a central role is the pediatrician who first and frequently come into contact with little patients. He can identify the anomalies, and therefore collaborate with other specialists, including the dentist. The key aspect that guides us in the diagnosis, and allows us to identify the oral respirator, is the “adenoid facies”. The purpose of the study is to highlight the importance and benefits of an early and multidisciplinary intervention (pediatric, orthopedic-orthodontic-functional. A sample of 20 patients was selected with the following inclusion criteria: mouth breathing, transverse discrepancy > 4 mm, early mixed dentition, central and lateral permenent incisors, overjet increased, lip and nasal incompetence, snoring and/or sleep apnea episodes. The protocol of intervention includes the use of the following devices and procedures: a maxillary rapid expander (to correct the transverse discrepancy, to increase the amplitude of the upper respiratory airway and to reduce nasal resistances tract in association with myo-functional devices (nasal stimulator and oral obturator. They allow the reconstruction of a physiological balance between the perioral musculature and tongue, the acquisition of nasal and lips competence and the reduction of overjet. This protocol speeds up and stabilizes the results. The

  6. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  7. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  8. Frequent use of emergency departments by older people: a comparative cohort study of characteristics and outcomes.

    Science.gov (United States)

    Street, Maryann; Berry, Debra; Considine, Julie

    2018-04-12

    To characterise older people who frequently use emergency departments (EDs) and compare patient outcomes with older non-frequent ED attenders. Retrospective comparative cohort study. Logistic regression modelling of patient characteristics and health service usage, comparing older frequent ED attenders (≥4 ED attendances in 12 months) to non-frequent ED attenders. Three Australian public hospital EDs, with a total of 143 327 emergency attendances in the 12 months. People aged ≥65 years attending the ED in financial year 2013/2014. The primary outcome was frequent ED use; secondary outcomes were ED length of stay, discharge destination from ED, hospital length of stay, re-presentation within 48 h, hospital readmission within 30 days and in-hospital mortality. Five percent of older people were frequent attenders (n = 1046/21 073), accounting for 16.9% (n = 5469/32 282) of all attendances by older people. Frequent ED attenders were more likely to be male, aged 75-84 years, arrive by ambulance and have a diagnosis relating to chronic illness. Frequent attenders stayed 0.4 h longer in ED (P < 0.001), were more likely to be admitted to hospital (69.2% vs 67.2%; P = 0.004), and had a 1 day longer hospital stay (P < 0.001). In-hospital mortality for older frequent ED attenders was double that of non-frequent attenders (7.0% vs 3.2%, P < 0.001) over 12 months. Older frequent ED attenders had more chronic disease and care needs requiring hospital admission than non-frequent attenders. A new approach to care planning and coordination is recommended, to optimise the patient journey and improve outcomes.

  9. СHILDREN OF MEGAPOLISES WHO FALL ILL FREQUENTLY: ACUTE RESPIRATORY INFECTION PREVENTION AND TREATMENT

    Directory of Open Access Journals (Sweden)

    R.M. Torshkhoeva

    2006-01-01

    Full Text Available The article is devoted to prevention and treatment of acute respiratory diseases children of megapolises who fall ill frequently. The authors prove the thesis that children falling ill frequently and residing in mega cities, and not only in Russia, have a similar immune status, according to which not only therapeutic but also preventive immunomodulatory treatment courses must be administered to them.Key words: frequently ill children, bacterial immunomodulation, cytokinic status.

  10. Psychological distress as a predictor of frequent attendance in family practice: a cohort study

    DEFF Research Database (Denmark)

    Vedsted, Peter; Fink, Per; Olesen, Frede

    2001-01-01

    In cross-sectional studies, psychological distress has been associated with frequent health care utilization. However, there is a need for prospective studies to confirm these findings. This cohort study evaluated whether psychological distress predicted frequent attendance in family practice.......16 [0.99-1.36] for SCL and OR 1.31 [1.05-1.65] for Whiteley). Psychological distress involved an increased risk of future frequent attendance among adult patients consulting family practice in the daytime about an illness....

  11. Clinical characteristics of persistent frequent attenders in primary care: case–control study

    OpenAIRE

    Patel, Shireen; Kai, Joe; Atha, Christopher; Avery, Anthony; Guo, Boliang; James, Marilyn; Malins, Samuel; Sampson, Christopher James; Stubley, Michelle; Morriss, Richard K.

    2015-01-01

    Background. Most frequent attendance in primary care is temporary, but persistent frequent attendance is expensive and may be suitable for psychological intervention. To plan appropriate intervention and service delivery, there is a need for research involving standardized psychiatric interviews with assessment of physical health and health status.\\ud \\ud Objective. To compare the mental and physical health characteristics and health status of persistent frequent attenders (FAs) in primary ca...

  12. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  13. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  14. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  15. Frequent callers to crisis helplines: who are they and why do they call?

    Science.gov (United States)

    Spittal, Matthew J; Fedyszyn, Izabela; Middleton, Aves; Bassilios, Bridget; Gunn, Jane; Woodward, Alan; Pirkis, Jane

    2015-01-01

    Frequent callers present a challenge for crisis helplines, which strive to achieve optimal outcomes for all callers within finite resources. This study aimed to describe frequent callers to Lifeline (the largest crisis helpline in Australia) and compare them with non-frequent callers, with a view to furthering knowledge about models of service delivery that might meet the needs of frequent callers. Lifeline provided an anonymous dataset on calls made between December 2011 and May 2013. We assumed calls from the same (encrypted) phone number were made by the same person, and aggregated call level data up to the person level. Individuals who made 0.667 calls per day in any period from 1 week to the full 549 days for which we had data (i.e. 4.7 calls in 7 days, 20 calls in 30 days, 40 calls in 60 days, etc.) were regarded as frequent callers. Our analysis dataset included 411,725 calls made by 98,174 individuals, 2594 (2.6%) of whom met our definition of frequent callers. We identified a number of predictors of being a frequent caller, including being male or transgender, and never having been married. The odds increased with age until 55-64 years, and then declined. Suicidality, self-harm, mental health issues, crime, child protection and domestic violence issues all predicted being a frequent caller. Collectively, frequent callers have a significant impact on crisis lines, and solutions need to be found for responding to them that are in everybody's best interests (i.e. the frequent callers themselves, other callers, telephone crisis supporters who staff crisis lines, and those who manage crisis lines). In striking this balance, the complex and multiple needs of frequent callers must be taken into account. © The Royal Australian and New Zealand College of Psychiatrists 2014.

  16. Restrictions of frequent frames as cues to categories: the case of Dutch

    NARCIS (Netherlands)

    Erkelens, M.A.; Chan, H.; Kapia, E.; Jacob, H.

    2008-01-01

    Why Dutch 12-month-old infants do not use frequent frames in early categorization Mintz (2003) proposes that very local distributional contexts of words in the input-so-called 'frequent frames'-function as reliable cues for categories corresponding to the adult verb and noun. He shows that

  17. Undifferentiated spondyloarthritis is more frequently seen in women than in men

    Directory of Open Access Journals (Sweden)

    Sukran Erten

    2015-01-01

    Conclusion SpA are frequent diseases and physicians other than rheumatologists should also be aware of them. uSpA is more frequent in women than men. Early diagnosis of SpA is important because early treatment with new biological therapies may lead to much better Results than applying them in the advanced stages.

  18. Associations of work ability with frequent and long-term sickness absence

    NARCIS (Netherlands)

    Notenbomer, A.; Groothoff, J. W.; van Rhenen, W.; Roelen, C. A. M.

    Background Reduced work ability is related to long-term sickness absence. The relationship between work ability and frequent sickness absence has not previously been investigated. It is important to distinguish between frequent and long-term sickness absence as they are outcomes of different

  19. A construction scheme of web page comment information extraction system based on frequent subtree mining

    Science.gov (United States)

    Zhang, Xiaowen; Chen, Bingfeng

    2017-08-01

    Based on the frequent sub-tree mining algorithm, this paper proposes a construction scheme of web page comment information extraction system based on frequent subtree mining, referred to as FSM system. The entire system architecture and the various modules to do a brief introduction, and then the core of the system to do a detailed description, and finally give the system prototype.

  20. Drought, tree mortality, and wildfire in forests adapted to frequent fire

    Science.gov (United States)

    Scott L Stephens; Brandon M Collins; Christopher J Fettig; Mark A Finney; Chad M Hoffman; Eric E Knapp; Malcolm P North; Hugh Safford; Rebecca B Wayman

    2018-01-01

    Massive tree mortality has occurred rapidly in frequent-fire-adapted forests of the Sierra Nevada, California. This mortality is a product of acute drought compounded by the long-established removal of a key ecosystem process: frequent, low- to moderate-intensity fire. The recent tree mortality has many implications for the future of these forests and the ecological...

  1. Why do they keep coming back? Persistent frequent attenders in primary care

    NARCIS (Netherlands)

    Smits, F.T.M.

    2014-01-01

    The background of frequent attenders (FAs) of the General Practitioner (GP) often remains unclear. This thesis examines persistent frequent attendance, the relationship with (medical) conditions, methods to treat FAs, the impact of FAs on the GP’s workload and costs of healthcare, which medical file

  2. Effects of frequent cannabis use on hippocampal activity during an associative memory task

    NARCIS (Netherlands)

    Jager, Gerry; van Hell, Hendrika H.; de Win, Maartje M. L.; Kahn, Rene S.; van den Brink, Wim; van Ree, Jan M.; Ramsey, Nick F.

    2007-01-01

    Interest is growing in the neurotoxic potential of cannabis on human brain function. We studied non-acute effects of frequent cannabis use on hippocampus-dependent associative memory, investigated with functional Magnetic Resonance Imaging (fMRI) in 20 frequent cannabis users and 20 non-users

  3. Measurements of radio frequent cavity volt ages by X-ray spectrum measurements

    Directory of Open Access Journals (Sweden)

    Toprek Dragan

    2005-01-01

    Full Text Available This paper deals with X-ray spectrum measurement as a method for the measurement of radio frequent cavity voltage and the theory of X-ray spectrum calculation. Experimental results at 72 MHz for three different values of the radio frequent power of ACCEL K250 super conducting cyclotron are being presented.

  4. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  5. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  6. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  7. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  8. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  9. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  10. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  11. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  12. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  13. PROTOCOL OF TREATMENT IN LOW BACK PAIN

    Directory of Open Access Journals (Sweden)

    Alisson Guimbala dos Santos Araujo

    2013-09-01

    Full Text Available Low back pain can be considered as one of the main factors that lead to decreased functional capacity of the human being. Being a frequent dysfunction in people, causing a decrease in quality of life, productivity and functional disability and is associated with important social and economic impact. Therefore the objective of the research was to assess the treatment protocols in low back pain. The study is characterized by being a literature of scientific articles, based on data published in PubMed, SciELO, BIREME and Cochrane from 2000 to 2012. We found eight scientific articles that addressed physical therapy methods in the treatment of low back pain, including a literature review. Related Articles show variation from one to 55 patients in groups, with a total of 185 patients studied. It was concluded then that it hasn’t met a specific treatment that is placed as the most effective for this pathology, although all include electrotherapy, manual therapy, exercise and RPG they show significant results in pain relief, quality of life thereby increasing functionality.

  14. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  15. Protocol for the quantification of greenhouse gas emissions from waste management activities

    International Nuclear Information System (INIS)

    2013-10-01

    The Waste Sector GHG Protocol is intended to provide guidelines for calculating and reporting greenhouse gas (GHG) emissions associated with a waste management service, over a specific time period (usually one year) and based on simple operational data. The Protocol itself has evolved with time, going through 4 version updates. The different versions correspond to evolutions initiated by the original Entreprises pour l'Environnement Working Group (Seche Environnement, Suez Environnement and Veolia Environnement) but also to the suggestions and feedback provided by several waste associations that have reviewed and commented on the Protocol. As a result, several worldwide associations have validated and used the Protocol for their own greenhouse gas inventories. The version 5 of the Waste Sector GHG Protocol has received the 'Built on the GHG Protocol' label. With such label, the Waste Sector Protocol reinforces its desire to be the reference tool for the waste sector by ensuring its users of a total and transparent coherence and conformity with the GHG Protocol Corporate Standard's requirements. The Protocol is also available on the following web page: http://www.ghgprotocol.org/Tools-Built-on-GHG-Protocol. The Waste Sector GHG Protocol aims at: Providing a consistent and transparent approach to quantify, report and verify GHG direct (scope 1), indirect (scope 2) and avoided emissions of waste management actors; Establishing best practice across the waste sector for the implementation of coherent and homogeneous GHG emissions inventories; Explaining waste sector's particularities in terms of GHG emissions (diffuse emission from landfills, GHG avoided emissions, carbon sequestration); Helping companies to take proper commitments and stakeholders to understand and verify those commitments. The Protocol consists of a manual with two additional documents: A 'Frequently Asked Questions' document; A 'Follow-up of modifications

  16. Altered gene expression in blood and sputum in COPD frequent exacerbators in the ECLIPSE cohort.

    Directory of Open Access Journals (Sweden)

    Dave Singh

    Full Text Available Patients with chronic obstructive pulmonary disease (COPD who are defined as frequent exacerbators suffer with 2 or more exacerbations every year. The molecular mechanisms responsible for this phenotype are poorly understood. We investigated gene expression profile patterns associated with frequent exacerbations in sputum and blood cells in a well-characterised cohort. Samples from subjects from the ECLIPSE COPD cohort were used; sputum and blood samples from 138 subjects were used for microarray gene expression analysis, while blood samples from 438 subjects were used for polymerase chain reaction (PCR testing. Using microarray, 150 genes were differentially expressed in blood (>±1.5 fold change, p≤0.01 between frequent compared to non-exacerbators. In sputum cells, only 6 genes were differentially expressed. The differentially regulated genes in blood included downregulation of those involved in lymphocyte signalling and upregulation of pro-apoptotic signalling genes. Multivariate analysis of the microarray data followed by confirmatory PCR analysis identified 3 genes that predicted frequent exacerbations; B3GNT, LAF4 and ARHGEF10. The sensitivity and specificity of these 3 genes to predict the frequent exacerbator phenotype was 88% and 33% respectively. There are alterations in systemic immune function associated with frequent exacerbations; down-regulation of lymphocyte function and a shift towards pro-apoptosis mechanisms are apparent in patients with frequent exacerbations.

  17. Frequent fliers, school phobias, and the sick student: school health personnel's perceptions of students who refuse school.

    Science.gov (United States)

    Torrens Armstrong, Anna M; McCormack Brown, Kelli R; Brindley, Roger; Coreil, Jeannine; McDermott, Robert J

    2011-09-01

    This study explored school personnel's perceptions of school refusal, as it has been described as a "common educational and public health problem" that is less tolerated due to increasing awareness of the potential socioeconomic consequences of this phenomenon. In-depth interviews were conducted with school personnel at the middle school (N = 42), high school (N = 40), and district levels (N = 10). The findings focus on emergent themes from interviews with school health personnel (N = 12), particularly those themes related to their perceptions of and role in working with school-refusing students. Personnel, especially school health services staff, constructed a typification of the school-refusing student as "the sick student," which conceptualized student refusal due to reasons related to illness. Personnel further delineated sick students by whether they considered the illness legitimate. School health personnel referenced the infamous "frequent fliers" and "school phobics" within this categorization of students. Overarching dynamics of this typification included parental control, parental awareness, student locus of control, blame, and victim status. These typifications influenced how personnel reacted to students they encountered, particularly in deciding which students need "help" versus "discipline," thus presenting implications for students and screening of students. Overall, findings suggest school health personnel play a pivotal role in screening students who are refusing school as well as keeping students in school, underscoring policy that supports an increased presence of school health personnel. Recommendations for school health, prevention, and early intervention include the development of screening protocols and staff training. © 2011, American School Health Association.

  18. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  19. HSMNR belongs to the most frequent types of hereditary neuropathy in the Czech Republic and is twice more frequent than HMSNL.

    Science.gov (United States)

    Šafka Brožková, D; Haberlová, J; Mazanec, R; Laštůvková, J; Seeman, P

    2016-08-01

    Hereditary motor and sensory neuropathy type Russe (HMSNR), also called CMT4G, is an autosomal recessive inherited peripheral neuropathy (IPN) caused by a founder mutation in the HK1 gene. HMSNR affects only patients with Roma origin, similar to the better known HMSN type Lom clarified earlier. By testing IPN patients with Roma origin, we realized that HMSNR affects surprisingly many patients in the Czech Republic. HMSNR is one of the most frequent types of IPN in this country and appears to be twice more frequent than HMSNL. Pronounced lower limb atrophies and severe deformities often lead to walking inability in even young patients, but hands are usually only mildly affected even after many years of disease duration. The group of 20 patients with HMSNR presented here is the first report about the prevalence of HMSNR from central Europe. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  20. [Prevalence and factors associated with frequent attendence in family medicine clinic].

    Science.gov (United States)

    Parejo Maestre, N; Lendínez-de la Cruz, J M; Bermúdez-Torres, F M; Gónzalez-Contero, L; Gutierrez-Espinosa de Los Monteros, M P; Espejo-Almazán María, T

    2016-01-01

    The use of health services has seen a steep rise. The frequent users are responsible for significant economic, human and social impact. The objective is to analyze the characteristics of frequent attenders in our Health Center, in order to evaluate the possibility of taking corrective measures to improve the quality of care and efficiency in the use of resources. Descriptive observational study of a sample of 379 patients over 18 years old. The dependent variables were attendance (number of visits to their family doctor during the previous year), frequent attendance (10 or more visits to the family doctor in the last year), and persistent frequent attenders (10 or more visits to the family doctor in each of the last two years). Data were collected from medical records and by telephone interview. The mean attendance was 6.83 (95%CI: 6.13-7.53), frequent attendance reached 25.4% (95%CI: 21.4-29.6), and persistent frequent attenders, 1.6% (95%CI: 0.5-2.9). Frequent attendance was associated with sex, age, marital status, educational level, family structure, existence of chronic disease, use of anxiolytic and antidepressants, request for additional tests, and referrals to other specialists, proximity to the health center, and level of satisfaction with their family doctor. The low persistent frequent attenders found suggests that frequent attendance could be largely due to factors related to professional and organization. Studies are required to address the high level of consumption of psychotropic drugs, and improving professional skills in dealing with mental problems. Copyright © 2014 Sociedad Española de Médicos de Atención Primaria (SEMERGEN). Publicado por Elsevier España, S.L.U. All rights reserved.

  1. Categorizing "frequent visitors" in the psychiatric emergency room: a semistructured interview study

    DEFF Research Database (Denmark)

    Buus, Niels

    2011-01-01

    Nurses can become demoralized and hostile toward frequent visitors in psychiatric emergency rooms because of the number of visits. The aim of this study was to develop more knowledge about the ways in which nurses categorize frequent visitors. Eleven nurses were interviewed, and their categorizing...... practices were examined from a social constructionist perspective. The results showed that the nurses did not categorize frequent visitors as particularly unlikeable or difficult to treat. Like other visitors, they could be categorized as difficult if they obstructed a smooth flow of successful referrals...... through the emergency room and/or there was poor rapport with the nurses....

  2. A protocol for eliciting nonmaterial values through a cultural ecosystem services frame.

    Science.gov (United States)

    Gould, Rachelle K; Klain, Sarah C; Ardoin, Nicole M; Satterfield, Terre; Woodside, Ulalia; Hannahs, Neil; Daily, Gretchen C; Chan, Kai M

    2015-04-01

    Stakeholders' nonmaterial desires, needs, and values often critically influence the success of conservation projects. These considerations are challenging to articulate and characterize, resulting in their limited uptake in management and policy. We devised an interview protocol designed to enhance understanding of cultural ecosystem services (CES). The protocol begins with discussion of ecosystem-related activities (e.g., recreation, hunting) and management and then addresses CES, prompting for values encompassing concepts identified in the Millennium Ecosystem Assessment (2005) and explored in other CES research. We piloted the protocol in Hawaii and British Columbia. In each location, we interviewed 30 individuals from diverse backgrounds. We analyzed results from the 2 locations to determine the effectiveness of the interview protocol in elucidating nonmaterial values. The qualitative and spatial components of the protocol helped characterize cultural, social, and ethical values associated with ecosystems in multiple ways. Maps and situational, or vignette-like, questions helped respondents articulate difficult-to-discuss values. Open-ended prompts allowed respondents to express a diversity of ecosystem-related values and proved sufficiently flexible for interviewees to communicate values for which the protocol did not explicitly probe. Finally, the results suggest that certain values, those mentioned frequently throughout the interview, are particularly salient for particular populations. The protocol can provide efficient, contextual, and place-based data on the importance of particular ecosystem attributes for human well-being. Qualitative data are complementary to quantitative and spatial assessments in the comprehensive representation of people's values pertaining to ecosystems, and this protocol may assist in incorporating values frequently overlooked in decision making processes. © 2014 The Authors. Conservation Biology published by Wiley Periodicals

  3. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  4. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  5. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  6. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  7. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  8. [The intervention mapping protocol: A structured process to develop, implement and evaluate health promotion programs].

    Science.gov (United States)

    Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J

    2016-02-01

    Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.

  9. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  10. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  11. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  12. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  13. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  14. Acute calcific tendonitis of dorsal interosseous muscles of the hand: uncommon site of a frequent disease

    Directory of Open Access Journals (Sweden)

    D. Schneider

    2017-05-01

    Full Text Available Acute calcific tendinopathy is one of the manifestations of hydroxyapatite crystal deposition disease. While it is more frequent in the shoulder, it has been described in virtually all areas of the body, but rarely in the muscles of the hand. Its etiopathogenesis is not yet fully understood and despite being a fairly frequent condition, it is commonly misdiagnosed. The onset of the disease is usually acute and resolves spontaneously. Acute calcific tendinitis of the interosseous tendons of the hand is an uncommon site of a frequent condition. The clinical presentation is similar to other entities, thus errors in diagnosis frequently occur, resulting in over-treatment or unnecessary tests. We describe a case of acute calcific tendinitis of the interosseous muscles of the hand with a brief review of the current literature with emphasis on diagnostic imaging methods.

  15. Internal wave-mediated shading causes frequent vertical migrations in fishes

    KAUST Repository

    Kaartvedt, Stein; Klevjer, TA; Aksnes, Dag L.

    2012-01-01

    We provide evidence that internal waves cause frequent vertical migrations (FVM) in fishes. Acoustic data from the Benguela Current revealed that pelagic scattering layers of fish below ~140 m moved in opposite phases to internal waves, ascending

  16. Psychological distress as a predictor of frequent attendance in family practice: a cohort study

    DEFF Research Database (Denmark)

    Vedsted, Peter; Fink, Per; Olesen, Frede

    2001-01-01

    In cross-sectional studies, psychological distress has been associated with frequent health care utilization. However, there is a need for prospective studies to confirm these findings. This cohort study evaluated whether psychological distress predicted frequent attendance in family practice.......16 [0.99-1.36] for SCL and OR 1.31 [1.05-1.65] for Whiteley). Psychological distress involved an increased risk of future frequent attendance among adult patients consulting family practice in the daytime about an illness........ In 1990, 185 consecutive adults who consulted their primary care physician (PCP) about an illness were rated on two psychometric scales (Hopkins Symptom Check List [SCL-8] and Whiteley-7), and their annual number of face-to-face contacts with a family practice was followed until 1996. Frequent attenders...

  17. An Efficient Approach to Mining Maximal Contiguous Frequent Patterns from Large DNA Sequence Databases

    Directory of Open Access Journals (Sweden)

    Md. Rezaul Karim

    2012-03-01

    Full Text Available Mining interesting patterns from DNA sequences is one of the most challenging tasks in bioinformatics and computational biology. Maximal contiguous frequent patterns are preferable for expressing the function and structure of DNA sequences and hence can capture the common data characteristics among related sequences. Biologists are interested in finding frequent orderly arrangements of motifs that are responsible for similar expression of a group of genes. In order to reduce mining time and complexity, however, most existing sequence mining algorithms either focus on finding short DNA sequences or require explicit specification of sequence lengths in advance. The challenge is to find longer sequences without specifying sequence lengths in advance. In this paper, we propose an efficient approach to mining maximal contiguous frequent patterns from large DNA sequence datasets. The experimental results show that our proposed approach is memory-efficient and mines maximal contiguous frequent patterns within a reasonable time.

  18. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  19. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  20. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  1. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  2. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  3. Esophageal motor disorders are frequent during pre and post lung transplantation. Can they influence lung rejection?

    Science.gov (United States)

    Ciriza de Los Ríos, Constanza; Canga Rodríguez-Valcárcel, Fernando; de Pablo Gafas, Alicia; Castel de Lucas, Isabel; Lora Pablos, David; Castellano Tortajada, Gregorio

    2018-06-01

    lung transplantation (LTx) is a viable option for most patients with end-stage lung diseases. Esophageal motor disorders (EMD) are frequent in candidates for LTx, but there is very little data about changes in esophageal motility post-LTx. the aim of our study was to assess esophageal motor disorders by high resolution manometry (HRM) both pre-LTx and six months post-LTx in patients with and without organ rejection. HRM (Manoscan®) was performed in 57 patients both pre-LTx and six months post-LTx. HRM plots were analyzed according to the Chicago classification 3.0. EMD were found in 33.3% and in 49.1% of patients pre-LTx and post-LTx, respectively, and abnormal peristalsis was more frequently found post-LTx (p = 0.018). Hypercontractile esophagus was frequently found post-LTx (1.8% and 19.3% pre-LTx and post-LTx, respectively). Esophagogastric junction (EGJ) morphology changed significantly pre-LTx and post-LTx; type I (normal) was more frequent post-LTx (63-2% and 82.5% respectively, p = 0.007). EMD were more frequent post-LTx in both the non-rejection and rejection group, although particularly in the rejection group (43.2% and 69.2% respectively, p = 0.09). EMD such as distal spasm, hypercontractile esophagus and EGJ outflow obstruction were also observed more frequently post-LTx in the rejection group. significant changes in esophageal motility were observed pre-LTx and particularly post-LTx; hypercontractile esophagus was a frequent EMD found post-LTx. EMD were more frequent in the group of patients that experienced organ rejection compared to the non-rejection group. EMD leading to an impaired esophageal clearance should be considered as an additional factor that contributes to LTx failure.

  4. Social capital and frequent attenders in general practice: a register-based cohort study.

    Science.gov (United States)

    Pasgaard, Alexander A; Mæhlisen, Maiken H; Overgaard, Charlotte; Ejlskov, Linda; Torp-Pedersen, Christian; Bøggild, Henrik

    2018-03-02

    Frequent attendance to primary care constitutes a large use of resources for the health care system. The association between frequent attendance and illness-related factors has been examined in several studies, but little is known about the association between frequent attendance and individual social capital. The aim of this study is to explore this association. The analysis is conducted on responders to the North Denmark Region Health Profile 2010 (n = 23,384), individually linked with information from administrative registers. Social capital is operationalized at the individual level, and includes cognitive (interpersonal trust and norms of reciprocity) as well as structural (social network and civic engagement) dimensions. Frequent attendance is defined as the upper-quartile of the total number of measured consultations with a general practitioner over a period of 148 weeks. Using multiple logistic regression, we found that frequent attendance was associated with a lower score in interpersonal trust [OR 0.86 (0.79-0.94)] and social network [OR 0.88 (0.79-0.98)] for women, when adjusted for age, education, income and SF12 health scores. Norms of reciprocity and civic engagement were not significantly associated with frequent attendance for women [OR 1.05 (0.99-1.11) and OR 1.01 (0.92-1.11) respectively]. None of the associations were statistically significant for men. This study suggests that for women, some aspects of social capital are associated with frequent attendance in general practice, and the statistically significant dimensions belonged to both cognitive and structural aspects of social capital. This association was not seen for men. This indicates a multifaceted and heterogeneous relationship between social capital and frequent attendance among genders.

  5. Bayesian Method for Building Frequent Landsat-Like NDVI Datasets by Integrating MODIS and Landsat NDVI

    OpenAIRE

    Limin Liao; Jinling Song; Jindi Wang; Zhiqiang Xiao; Jian Wang

    2016-01-01

    Studies related to vegetation dynamics in heterogeneous landscapes often require Normalized Difference Vegetation Index (NDVI) datasets with both high spatial resolution and frequent coverage, which cannot be satisfied by a single sensor due to technical limitations. In this study, we propose a new method called NDVI-Bayesian Spatiotemporal Fusion Model (NDVI-BSFM) for accurately and effectively building frequent high spatial resolution Landsat-like NDVI datasets by integrating Moderate Resol...

  6. BACTERIAL LYSATES IN COMPLEX TREATMENT OF RESPIRATORY INFECTIONS IN FREQUENTLY SICK CHILDREN

    Directory of Open Access Journals (Sweden)

    I.N. Lupan

    2011-01-01

    Full Text Available The literature review analyzes the results of Imudon administration in pediatrics. The drug contains a mixture of purified lyzates of bacteria which are the most frequent causative agents of pathologic processes in oral cavity and throat. Presented data show high efficacy and safety of a drug.Key words: frequently sick children, respiratory infections, topical immunocorrector, clinical studies.(Voprosy sovremennoi pediatrii — Current Pediatrics. 2011; 10 (4: 41–46

  7. Frequent hospital admissions in Singapore: clinical risk factors and impact of socioeconomic status.

    Science.gov (United States)

    Low, Lian Leng; Tay, Wei Yi; Ng, Matthew Joo Ming; Tan, Shu Yun; Liu, Nan; Lee, Kheng Hock

    2018-01-01

    Frequent admitters to hospitals are high-cost patients who strain finite healthcare resources. However, the exact risk factors for frequent admissions, which can be used to guide risk stratification and design effective interventions locally, remain unknown. Our study aimed to identify the clinical and sociodemographic risk factors associated with frequent hospital admissions in Singapore. An observational study was conducted using retrospective 2014 data from the administrative database at Singapore General Hospital, Singapore. Variables were identified a priori and included patient demographics, comorbidities, prior healthcare utilisation, and clinical and laboratory variables during the index admission. Multivariate logistic regression analysis was used to identify independent risk factors for frequent admissions. A total of 16,306 unique patients were analysed and 1,640 (10.1%) patients were classified as frequent admitters. On multivariate logistic regression, 16 variables were independently associated with frequent hospital admissions, including age, cerebrovascular disease, history of malignancy, haemoglobin, serum creatinine, serum albumin, and number of specialist outpatient clinic visits, emergency department visits, admissions preceding index admission and medications dispensed at discharge. Patients staying in public rental housing had a 30% higher risk of being a frequent admitter after adjusting for demographics and clinical conditions. Our study, the first in our knowledge to examine the clinical risk factors for frequent admissions in Singapore, validated the use of public rental housing as a sensitive indicator of area-level socioeconomic status in Singapore. These risk factors can be used to identify high-risk patients in the hospital so that they can receive interventions that reduce readmission risk. Copyright: © Singapore Medical Association

  8. Optimising social information by game theory and ant colony method to enhance routing protocol in opportunistic networks

    Directory of Open Access Journals (Sweden)

    Chander Prabha

    2016-09-01

    Full Text Available The data loss and disconnection of nodes are frequent in the opportunistic networks. The social information plays an important role in reducing the data loss because it depends on the connectivity of nodes. The appropriate selection of next hop based on social information is critical for improving the performance of routing in opportunistic networks. The frequent disconnection problem is overcome by optimising the social information with Ant Colony Optimization method which depends on the topology of opportunistic network. The proposed protocol is examined thoroughly via analysis and simulation in order to assess their performance in comparison with other social based routing protocols in opportunistic network under various parameters settings.

  9. Mining top-k frequent closed itemsets in data streams using sliding window

    International Nuclear Information System (INIS)

    Rehman, Z.; Shahbaz, M.

    2013-01-01

    Frequent itemset mining has become a popular research area in data mining community since the last few years. T here are two main technical hitches while finding frequent itemsets. First, to provide an appropriate minimum support value to start and user need to tune this minimum support value by running the algorithm again and again. Secondly, generated frequent itemsets are mostly numerous and as a result a number of association rules generated are also very large in numbers. Applications dealing with streaming environment need to process the data received at high rate, therefore, finding frequent itemsets in data streams becomes complex. In this paper, we present an algorithm to mine top-k frequent closed itemsets using sliding window approach from streaming data. We developed a single-pass algorithm to find frequent closed itemsets of length between user's defined minimum and maximum- length. To improve the performance of algorithm and to avoid rescanning of data, we have transformed data into bitmap based tree data structure. (author)

  10. Unhappiness Intensifies the Avoidance of Frequent Losses While Happiness Overcomes It.

    Science.gov (United States)

    Yechiam, Eldad; Telpaz, Ariel; Krupenia, Stas; Rafaeli, Anat

    2016-01-01

    The implication of spontaneous and induced unhappiness to people's decision style is examined. It is postulated that unhappy individuals have a greater tendency to avoid frequent losses because these can have depleting effects, and unhappy individuals are more sensitive to such effects. This is evaluated in Study 1 by using an annoying customer call manipulation to induce negative affect; and by examining the effect of this manipulation on choices in an experiential decision task (the Iowa Gambling task). In Study 2 we examined the association between self-reported (un)happiness and choices on the same decision task. In Study 1 the induction of negative affect led to avoidance of choice alternatives with frequent losses, compared to those yielding rarer but larger losses. Specifically, this pertained to the advantageous alternatives with frequent vs. non-frequent losses. In Study 2 unhappiness was similarly associated with less exposure to frequent losses; while extreme high happiness was associated with no tendency to avoid frequent losses when these were part of an advantageous alternative. The findings clarify the role of happiness in decision making processes by indicating that unhappiness induces sensitivity to the frequency rather than to the total effect of negative events.

  11. The Frequent Unusual Headache Syndromes: A Proposed Classification Based on Lifetime Prevalence.

    Science.gov (United States)

    Valença, Marcelo M; de Oliveira, Daniella A

    2016-01-01

    There is no agreement on a single cutoff point or prevalence for regarding a given disease as rare. The concept of what is a rare headache disorder is even less clear and the spectrum from a very frequent, frequent, occasional to rare headache syndrome is yet to be established. An attempt has been made to estimate the lifetime prevalence of each of the headache subtypes classified in the ICHD-II. Using the ICHD-II, 199 different headache subtypes were identified. The following classification was made according to the estimated lifetime prevalence of each headache disorder: very frequent (prevalence >10%); frequent (between 1 and 10%); occasional (between 0.07 and 1%); and unusual or rare (headache disorders, 7/199 (4%) as very frequent, 9/199 (5%) as frequent, and 29/199 (15%) as occasional forms of headache disorder. The unusual headache syndromes do not appear to be as infrequent in clinical practice as has been generally believed. About three-fourths of the classified headache disorders found in the ICHD-II can be considered as rare. This narrative review article may be regarded as an introduction to the concept of unusual headaches and a proposed classification of all headaches (at least those listed in the ICHD-II). © 2015 American Headache Society.

  12. A tree routing protocol for cognitive radio network

    Directory of Open Access Journals (Sweden)

    Mohammed Hashem

    2017-07-01

    Full Text Available Cognitive Radio (CR technology is an agile solution for spectrum congestion and spectrum access utilization problems that result from the legacy fixed spectrum management policies. CR technology can exploit unused licensed band to meet the increasing demand for radio frequency. The routing process faces many challenges in CR Network (CRN such as the absence of centralized infrastructure, the coordination between the routing module and spectrum management module, in addition to the frequent link failure due to the sudden appearance of PUs. In this paper we propose a Tree routing protocol for cognitive radio network (C-TRP that jointly utilizes the tree routing algorithm with a spectrum management module in routing decisions, and also we proposed a new metric used in taking the best route decisions. In addition, we enhance the traditional tree routing algorithm by using a neighbor table technique that speeds up the forwarding data packets. Moreover, we add a robust recovery module to C-TRP to resume the network in case of the link failure. The main motivation in the design of C-TRP is quick data transmission and maximization of date rates. The performance evaluation is carried out in NS2 simulator. The simulation results proved that C-TRP protocol achieves better performance in terms of average “PDR”, “end-to-end delay” and “routing overhead ratio “compared to “CTBR” and “STOD-RP” routing protocols.

  13. A SURVEY on WIRELESS MESH NETWORKS, ROUTING METRICS and PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Safak DURUKAN ODABASI

    2013-01-01

    Full Text Available Today, Internet has become an indispensable part of our daily lives. It has a growing user community in many fields from banking transactions to online entertainment. It will be very efficient for users, as the next generation internet access becomes wireless like frequently used services such as cellular phones. But for providing this, a new network is needed to be designed or an existing network must be improved as well as making changes on infrastructure. At this point, mesh network infrastructure arises and offers more sophisticated internet access with less need. The most important advantage of mesh networks is the capability of working without infrastructure. Mesh networks are an additional access technology more than being a renewed one in the next generation wireless networks called 4G. In this study, wireless mesh networks and example applications are mentioned. Base architecture and design factors are emphasized, current routing protocols that are used on wireless mesh networks and routing metrics on which these protocols are based, are explained. Finally, the performance effects of these protocols and metrics on different network topologies are referred.

  14. Consumo frequente de bebidas alcoólicas por adolescentes escolares: estudo de fatores associados Frequent consumption of alcohol by school age adolescents: study of associated factors

    Directory of Open Access Journals (Sweden)

    Analy Marquardt de Matos

    2010-06-01

    Full Text Available OBJETIVO: Analisar fatores associados ao consumo frequente de bebidas alcoólicas por adolescentes escolares em Feira de Santana, BA. MÉTODO: Estudo transversal, com amostra aleatória, estratificada por conglomerado, totalizando 10 escolas de portes diferenciados e 776 estudantes de ambos os sexos que relataram consumo de bebidas alcoólicas, na faixa etária de 14 a 19 anos, assegurando representatividade das escolas e alunos. O instrumento auto-aplicável foi elaborado segundo a Organização Mundial de Saúde (OMS e questionários validados em outros estudos. A coleta garantiu procedimentos para anonimato e sigilo. Foram considerados expostos adolescentes que referiram consumo frequente (em pelo menos todo final de semana. RESULTADOS: O consumo frequente/pesado mostrou associações significantes com sexo masculino, consumo precoce, parceiro sexual pouco conhecido, problemas com substâncias psicoativas (SPAs na família, coabitação com companheiro, renda própria, tráfico de drogas, consumo com amigos, atividades na escola, motivações (ansiedade, animação/prazer; e consequências (outras SPAs, brigas, inadimplência ao trabalhoescola. CONCLUSÕES: O conhecimento dos fatores pessoais, interpessoais, familiares e ambientais associados ao consumo de bebidas alcoólicas por adolescentes devem ser considerados na implementação de programas escolares e políticas públicas de prevenção, visando comportamentos que minimizem a exposição ao risco associado.OBJECTIVES: To analyze factors associated with the frequent consumption of alcohol by school age adolescents in Feira de Santana, Bahia. METHOD: Cross sectional study with random sampling, stratified by clusters, totaling 10 schools of different sizes. Although 1,409 students were included in the sample, only 776 of both genders, aged 14 to 19 years who reported alcohol drinking were included in the analysis, providing representativeness of schools and students. Data collection tools

  15. Infrequent and Frequent Nondaily Smokers and Daily Smokers: Their Characteristics and Other Tobacco Use Patterns.

    Science.gov (United States)

    Wang, Yingning; Sung, Hai-Yen; Yao, Tingting; Lightwood, James; Max, Wendy

    2018-05-03

    The proportion of smokers who do not smoke daily has increased over time, but nondaily smokers are a heterogeneous group. We compare characteristics and other tobacco product use of infrequent nondaily, frequent nondaily, and daily US adult smokers. We analyzed data from the 1998, 2000, 2005, and 2010 National Health Interview Surveys. Current smokers were categorized as daily, infrequent nondaily (smoked 1-12 days in the past 30 days), and frequent nondaily (smoked 13-29 days in the past 30 days) smokers. Multinomial logistic regression analysis was used to analyze the correlates of infrequent nondaily, frequent nondaily, and daily smoking. Among current smokers, 8.3% were infrequent nondaily, 8.1% were frequent nondaily, and 83.6% were daily smokers. The prevalence of infrequent versus daily smoking increased over time, with a smaller increase among non-Hispanic Blacks than non-Hispanic Whites. The adjusted odds of both infrequent and frequent smoking versus daily smoking differed by age, race/ethnicity, education, poverty status, marital status, region, quit attempts in the past 12 months, and binge drinking. Snuff users (vs. non-snuff users) were 2.4 times as likely to be infrequent than daily smokers. There were also differences in race/ethnicity, education, marital status, region, quit attempts, and snuff use between infrequent versus frequent smokers. Infrequent smokers differ from both frequent and daily smokers in socio-demographics, quit attempts, and snuff use. The heterogeneity of nondaily smokers should be considered in developing targeted tobacco control and smoking cessation programs. Infrequent and frequent nondaily smokers were found to differ from daily smokers in age, race/ethnicity, education, poverty status, marital status, region, and quit attempts and they were different from each other in race/ethnicity, education, marital status, region, and quit attempts. Binge drinkers were more likely to be infrequent smokers and frequent smokers versus

  16. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  17. Evaluation and comparison of four protein extraction protocols for mono- and two-dimensional electrophoresis in Mytilus galloprovincialis

    Directory of Open Access Journals (Sweden)

    Marina Ceruso

    2015-09-01

    Full Text Available In this study, four protein extraction protocols from Mytilus galloprovincialis were evaluated with the aim to identify the most practical, efficient and reproducible method. Four extraction protocols frequently used for mussels and organic matrices were selected and compared. The methods were based on the use of: i TRIzol reagent; ii Lysis buffer; iii phenylmethanesulfonyl fluoride; iv trichloroacetic acid-acetone. Protein concentration was measured by the Bradford method. Three specimens of mussels were studied and the analysis was conducted in triplicate for each of the four protocols. Results indicated that the four methods could extract significantly different protein profiles. The highest number of protein spots resolved in 2DE gels and the best reproducibility was obtained using trichloroacetic acid-acetone protocol. Results afforded the selection of a suitable extraction protocol to be used for ecotoxicoproteomics studies from mussels and for other proteomic studies conducted by particularly complex tissues such as Mytilus galloprovincialis.

  18. A statistical approach to discriminate between non-fallers, rare fallers and frequent fallers in older adults based on posturographic data.

    Science.gov (United States)

    Maranesi, E; Merlo, A; Fioretti, S; Zemp, D D; Campanini, I; Quadri, P

    2016-02-01

    Identification of future non-fallers, infrequent and frequent fallers among older people would permit focusing the delivery of prevention programs on selected individuals. Posturographic parameters have been proven to differentiate between non-fallers and frequent fallers, but not between the first group and infrequent fallers. In this study, postural stability with eyes open and closed on both a firm and a compliant surface and while performing a cognitive task was assessed in a consecutive sample of 130 cognitively able elderly, mean age 77(7)years, categorized as non-fallers (N=67), infrequent fallers (one/two falls, N=45) and frequent fallers (more than two falls, N=18) according to their last year fall history. Principal Component Analysis was used to select the most significant features from a set of 17posturographic parameters. Next, variables derived from principal component analysis were used to test, in each task, group differences between the three groups. One parameter based on a combination of a set of Centre of Pressure anterior-posterior variables obtained from the eyes-open on a compliant surface task was statistically different among all groups, thus distinguishing infrequent fallers from both non-fallers (Peyes-open on a compliant surface condition and this new parameter could be used, in a future study, to improve the performance of protocols and to verify the ability of this method to identify new-fallers in elderly without cognitive impairment. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  20. Moderators of the relationship between frequent family demands and inflammation among adolescents.

    Science.gov (United States)

    Levine, Cynthia S; Hoffer, Lauren C; Chen, Edith

    2017-05-01

    Frequent demands from others in relationships are associated with worse physiological and health outcomes. The present research investigated 2 potential moderators of the relationship between frequency of demands from one's family and inflammatory profiles among adolescents: (a) closeness of adolescents' relationships with their families, and (b) the frequency with which adolescents provided help to their families. Two hundred thirty-four adolescents, ages 13-16 (Mage = 14.53; 47.83% male), completed a daily dairy in which they reported on the frequency of demands made by family members. They were also interviewed about the closeness of their family relationships and reported in the daily diary on how frequently they provided help to their families. Adolescents also underwent a blood draw to assess low-grade inflammation and proinflammatory cytokine production in response to bacterial stimulation. More frequent demands from family predicted higher levels of low-grade inflammation and cytokine production in response to bacterial stimulation in adolescents. Family closeness moderated the relationship between frequent demands and stimulated cytokine production such that more frequent demands predicted higher cytokine production among adolescents who were closer to their families. Furthermore, frequency of providing help moderated the relationship between frequent demands and both low-grade inflammation and stimulated cytokine production, such that more frequent demands predicted worse inflammatory profiles among adolescents who provided more help to their families. These findings build on previous work on family demands and health to show under what circumstances family demands might have a physiological cost. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  2. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  3. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  4. Adaptations to Short, Frequent Sessions of Endurance and Strength Training Are Similar to Longer, Less Frequent Exercise Sessions When the Total Volume Is the Same.

    Science.gov (United States)

    Kilen, Anders; Hjelvang, Line B; Dall, Niels; Kruse, Nanna L; Nordsborg, Nikolai B

    2015-11-01

    The hypothesis that the distribution of weekly training across several short sessions, as opposed to fewer longer sessions, enhances maximal strength gain without compromising maximal oxygen uptake was evaluated. Twenty-nine subjects completed an 8-week controlled parallel-group training intervention. One group ("micro training" [MI]: n = 21) performed nine 15-minute training sessions weekly, whereas a second group ("classical training" [CL]: n = 8) completed exactly the same training on a weekly basis but as three 45-minute sessions. For each group, each session comprised exclusively strength, high-intensity cardiovascular training or muscle endurance training. Both groups increased shuttle run performance (MI: 1,373 ± 133 m vs. 1,498 ± 126 m, p ≤ 0.05; CL: 1,074 ± 213 m vs. 1,451 ± 202 m, p training intervention. In conclusion, similar training adaptations can be obtained with short, frequent exercise sessions or longer, less frequent sessions where the total volume of weekly training performed is the same.

  5. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  6. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  7. Comparison of two oestrus synchronisation protocols administered to dairy cows during routine reproduction services

    DEFF Research Database (Denmark)

    Viora, L; Denwood, M; Ellis, K

    2015-01-01

    Progesterone-based oestrus synchronisation protocols are frequently used for treatment of cows presented for examination during routine reproduction management service. This study aimed to evaluate the effect of the addition of gonadotrophin-releasing hormone (GnRH) at the start of a progesterone......-based oestrus synchronisation protocol for cows presented for examination during routine veterinary service on a commercial dairy farm over 10 months. Overall 139 animals were retained in the study, of which 78 received a standard progesterone-based treatment (STD) and 61 received the same treatment...

  8. Extremely frequent behavior in consumer research: theory and empirical evidence for chronic casino gambling.

    Science.gov (United States)

    Perfetto, Ralph; Woodside, Arch G

    2009-09-01

    The present study informs understanding of customer segmentation strategies by extending Twedt's heavy-half propositions to include a segment of users that represent less than 2% of all households-consumers demonstrating extremely frequent behavior (EFB). Extremely frequent behavior (EFB) theory provides testable propositions relating to the observation that few (2%) consumers in many product and service categories constitute more than 25% of the frequency of product or service use. Using casino gambling as an example for testing EFB theory, an analysis of national survey data shows that extremely frequent casino gamblers do exist and that less than 2% of all casino gamblers are responsible for nearly 25% of all casino gambling usage. Approximately 14% of extremely frequent casino users have very low-household income, suggesting somewhat paradoxical consumption patterns (where do very low-income users find the money to gamble so frequently?). Understanding the differences light, heavy, and extreme users and non-users can help marketers and policymakers identify and exploit "blue ocean" opportunities (Kim and Mauborgne, Blue ocean strategy, Harvard Business School Press, Boston, 2005), for example, creating effective strategies to convert extreme users into non-users or non-users into new users.

  9. Efficacy of levamisole in children with frequently relapsing and steroid-dependent nephrotic syndrome.

    Science.gov (United States)

    Ekambaram, Sudha; Mahalingam, Vijayakumar; Nageswaran, Prahlad; Udani, Amish; Geminiganesan, Sangeetha; Priyadarshini, Shweta

    2014-05-01

    To assess the efficacy of levamisole in frequently relapsing nephrotic syndrome and steroid-dependent nephrotic syndrome. Retrospective analysis of hospital case records. Pediatric nephrology department of a tertiary referral pediatric hospital. 62 children with frequently relapsing nephrotic syndrome and 35 children with steroid-dependent nephrotic syndrome. Case records of children who were diagnosed as steroid-dependant or frequently-relapsing nephrotic syndrome from June 2004 to June 2011, were reviewed. Levamisole was given daily (2 mg/kg/d) along with tapering doses of alternate day steroids after remission on daily steroids. Levamisole was effective in 77.3% children with a better (80.6%) efficacy in frequently relapsing nephrotic syndrome. A total of 34 children completed 1 year follow-up post levamisole therapy. The cumulative mean (SD) steroid dose 1-year before therapy was 4109(1154) mg/m2 and 1-year post therapy was 661 (11) mg/m2 (P<0.001). The relapses were also less during the period of post-levamisole therapy. Levamisole is an effective alternative therapy in frequently relapsing and steroid-dependent nephrotic syndrome.

  10. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  11. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  12. Compact wireless control network protocol with fast path switching

    Directory of Open Access Journals (Sweden)

    Yasutaka Kawamoto

    2017-08-01

    Full Text Available Sensor network protocol stacks require the addition or adjustment of functions based on customer requirements. Sensor network protocols that require low delay and low packet error rate (PER, such as wireless control networks, often adopt time division multiple access (TDMA. However, it is difficult to add or adjust functions in protocol stacks that use TDMA methods. Therefore, to add or adjust functions easily, we propose NES-SOURCE, a compact wireless control network protocol with a fast path-switching function. NES-SOURCE is implemented using carrier sense multiple access/collision avoidance (CSMA/CA rather than TDMA. Wireless control networks that use TDMA prevent communication failure by duplicating the communication path. If CSMA/CA networks use duplicate paths, collisions occur frequently, and communication will fail. NES-SOURCE switches paths quickly when communication fails, which reduces the effect of communication failures. Since NES-SOURCE is implemented using CSMA/CA rather than TDMA, the implementation scale is less than one-half that of existing network stacks. Furthermore, since NES-SOURCE’s code complexity is low, functions can be added or adjusted easily and quickly. Communication failures occur owing to changes in the communication environment and collisions. Experimental results demonstrate that the proposed NES-SOURCE’s path-switching function reduces the amount of communication failures when the communication environment changes owing to human movement and others. Furthermore, we clarify the relationships among the probability of a changing communication environment, the collision occurrence rate, and the PER of NES-SOURCE.

  13. "Frequent frames" in German child-directed speech: a limited cue to grammatical categories.

    Science.gov (United States)

    Stumper, Barbara; Bannard, Colin; Lieven, Elena; Tomasello, Michael

    2011-08-01

    Mintz (2003) found that in English child-directed speech, frequently occurring frames formed by linking the preceding (A) and succeeding (B) word (A_x_B) could accurately predict the syntactic category of the intervening word (x). This has been successfully extended to French (Chemla, Mintz, Bernal, & Christophe, 2009). In this paper, we show that, as for Dutch (Erkelens, 2009), frequent frames in German do not enable such accurate lexical categorization. This can be explained by the characteristics of German including a less restricted word order compared to English or French and the frequent use of some forms as both determiner and pronoun in colloquial German. Finally, we explore the relationship between the accuracy of frames and their potential utility and find that even some of those frames showing high token-based accuracy are of limited value because they are in fact set phrases with little or no variability in the slot position. Copyright © 2011 Cognitive Science Society, Inc.

  14. Predicting frequent emergency department visits among children with asthma using EHR data.

    Science.gov (United States)

    Das, Lala T; Abramson, Erika L; Stone, Anne E; Kondrich, Janienne E; Kern, Lisa M; Grinspan, Zachary M

    2017-07-01

    For children with asthma, emergency department (ED) visits are common, expensive, and often avoidable. Though several factors are associated with ED use (demographics, comorbidities, insurance, medications), its predictability using electronic health record (EHR) data is understudied. We used a retrospective cohort study design and EHR data from one center to examine the relationship of patient factors in 1 year (2013) and the likelihood of frequent ED use (≥2 visits) in the following year (2014), using bivariate and multivariable statistics. We applied and compared several machine-learning algorithms to predict frequent ED use, then selected a model based on accuracy, parsimony, and interpretability. We identified 2691 children. In bivariate analyses, future frequent ED use was associated with demographics, co-morbidities, insurance status, medication history, and use of healthcare resources. Machine learning algorithms had very good AUC (area under the curve) values [0.66-0.87], though fair PPV (positive predictive value) [48-70%] and poor sensitivity [16-27%]. Our final multivariable logistic regression model contained two variables: insurance status and prior ED use. For publicly insured patients, the odds of frequent ED use were 3.1 [2.2-4.5] times that of privately insured patients. Publicly insured patients with 4+ ED visits and privately insured patients with 6+ ED visits in a year had ≥50% probability of frequent ED use the following year. The model had an AUC of 0.86, PPV of 56%, and sensitivity of 23%. Among children with asthma, prior frequent ED use and insurance status strongly predict future ED use. © 2017 Wiley Periodicals, Inc.

  15. Integrating Entropy and Closed Frequent Pattern Mining for Social Network Modelling and Analysis

    Science.gov (United States)

    Adnan, Muhaimenul; Alhajj, Reda; Rokne, Jon

    The recent increase in the explicitly available social networks has attracted the attention of the research community to investigate how it would be possible to benefit from such a powerful model in producing effective solutions for problems in other domains where the social network is implicit; we argue that social networks do exist around us but the key issue is how to realize and analyze them. This chapter presents a novel approach for constructing a social network model by an integrated framework that first preparing the data to be analyzed and then applies entropy and frequent closed patterns mining for network construction. For a given problem, we first prepare the data by identifying items and transactions, which arc the basic ingredients for frequent closed patterns mining. Items arc main objects in the problem and a transaction is a set of items that could exist together at one time (e.g., items purchased in one visit to the supermarket). Transactions could be analyzed to discover frequent closed patterns using any of the well-known techniques. Frequent closed patterns have the advantage that they successfully grab the inherent information content of the dataset and is applicable to a broader set of domains. Entropies of the frequent closed patterns arc used to keep the dimensionality of the feature vectors to a reasonable size; it is a kind of feature reduction process. Finally, we analyze the dynamic behavior of the constructed social network. Experiments were conducted on a synthetic dataset and on the Enron corpus email dataset. The results presented in the chapter show that social networks extracted from a feature set as frequent closed patterns successfully carry the community structure information. Moreover, for the Enron email dataset, we present an analysis to dynamically indicate the deviations from each user's individual and community profile. These indications of deviations can be very useful to identify unusual events.

  16. Bringing stability to the COPD patient: clinical and pharmacological considerations for frequent exacerbators

    Science.gov (United States)

    Gulati, Swati

    2017-01-01

    Acute exacerbations of chronic obstructive pulmonary disease (AECOPD) are critical events associated with accelerated loss of lung function, increased morbidity, and excess mortality. AECOPD are heterogeneous in nature and this may directly impact clinical decision making, specifically in patients with frequent exacerbations. A “frequent exacerbator” is a sub-phenotype of COPD that is defined as an individual who experiences ≥2 moderate to severe exacerbations per year. This distinct subgroup has higher mortality and account for more than half of COPD-related hospitalizations annually. Thus, it is imperative to identify individuals at risk for frequent exacerbations and choose optimal strategies to minimize risk for these events. New paradigms for utilizing combination inhalers and the introduction of novel oral compounds provide expanded treatment options to reduce the risk and frequency of exacerbations. The goals of managing frequent exacerbators or patients at risk for AECOPD are: 1) maximizing bronchodilation, 2) reducing inflammation, and 3) targeting specific molecular pathways implicated in COPD and AECOPD pathogenesis. Novel inhaler therapies include combination long acting muscarinic agents (LAMA) plus long acting beta agonists (LABA) show promising results compared to monotherapy or LABA inhaled corticosteroid (ICS) combination in reducing exacerbation risk among individuals at risk for exacerbations and among frequent exacerbators. Likewise, oral medications including macrolides and phosphodiesterase (PDE4) inhibitors reduce the risk for AECOPD in select groups of individuals at high risk for exacerbation. Future direction in COPD management is based on identification of various subtypes or “endotypes” and targeting therapies based on their pathophysiology. This review aims to describe the impact of AECOPD, challenges posed by frequent exacerbators, and explores the rationale for different pharmacologic approaches to preventing AECOPD in these

  17. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  18. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  19. Predicting hospital mortality among frequently readmitted patients: HSMR biased by readmission

    Directory of Open Access Journals (Sweden)

    Kelder Johannes C

    2011-03-01

    Full Text Available Abstract Background Casemix adjusted in-hospital mortality is one of the measures used to improve quality of care. The adjustment currently used does not take into account the effects of readmission, because reliable data on readmission is not readily available through routinely collected databases. We have studied the impact of readmissions by linking admissions of the same patient, and as a result were able to compare hospital mortality among frequently, as opposed to, non-frequently readmitted patients. We also formulated a method to adjust for readmission for the calculation of hospital standardised mortality ratios (HSMRs. Methods We conducted a longitudinal retrospective analysis of routinely collected hospital data of six large non-university teaching hospitals in the Netherlands with casemix adjusted standardised mortality ratios ranging from 65 to 114 and a combined value of 93 over a five-year period. Participants concerned 240662 patients admitted 418566 times in total during the years 2003 - 2007. Predicted deaths by the HSMR model 2008 over a five-year period were compared with observed deaths. Results Numbers of readmissions per patient differ substantially between the six hospitals, up to a factor of 2. A large interaction was found between numbers of admissions per patient and HSMR-predicted risks. Observed deaths for frequently admitted patients were significantly lower than HSMR-predicted deaths, which could be explained by uncorrected factors surrounding readmissions. Conclusions Patients admitted more frequently show lower risks of dying on average per admission. This decline in risk is only partly detected by the current HSMR. Comparing frequently admitted patients to non-frequently admitted patients commits the constant risk fallacy and potentially lowers HSMRs of hospitals treating many frequently admitted patients and increases HSMRs of hospitals treating many non-frequently admitted patients. This misleading effect can

  20. Predicting hospital mortality among frequently readmitted patients: HSMR biased by readmission

    Science.gov (United States)

    2011-01-01

    Background Casemix adjusted in-hospital mortality is one of the measures used to improve quality of care. The adjustment currently used does not take into account the effects of readmission, because reliable data on readmission is not readily available through routinely collected databases. We have studied the impact of readmissions by linking admissions of the same patient, and as a result were able to compare hospital mortality among frequently, as opposed to, non-frequently readmitted patients. We also formulated a method to adjust for readmission for the calculation of hospital standardised mortality ratios (HSMRs). Methods We conducted a longitudinal retrospective analysis of routinely collected hospital data of six large non-university teaching hospitals in the Netherlands with casemix adjusted standardised mortality ratios ranging from 65 to 114 and a combined value of 93 over a five-year period. Participants concerned 240662 patients admitted 418566 times in total during the years 2003 - 2007. Predicted deaths by the HSMR model 2008 over a five-year period were compared with observed deaths. Results Numbers of readmissions per patient differ substantially between the six hospitals, up to a factor of 2. A large interaction was found between numbers of admissions per patient and HSMR-predicted risks. Observed deaths for frequently admitted patients were significantly lower than HSMR-predicted deaths, which could be explained by uncorrected factors surrounding readmissions. Conclusions Patients admitted more frequently show lower risks of dying on average per admission. This decline in risk is only partly detected by the current HSMR. Comparing frequently admitted patients to non-frequently admitted patients commits the constant risk fallacy and potentially lowers HSMRs of hospitals treating many frequently admitted patients and increases HSMRs of hospitals treating many non-frequently admitted patients. This misleading effect can only be demonstrated by an

  1. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  2. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  3. Validity of the reduced-sample insulin modified frequently-sampled intravenous glucose tolerance test using the nonlinear regression approach.

    Science.gov (United States)

    Sumner, Anne E; Luercio, Marcella F; Frempong, Barbara A; Ricks, Madia; Sen, Sabyasachi; Kushner, Harvey; Tulloch-Reid, Marshall K

    2009-02-01

    The disposition index, the product of the insulin sensitivity index (S(I)) and the acute insulin response to glucose, is linked in African Americans to chromosome 11q. This link was determined with S(I) calculated with the nonlinear regression approach to the minimal model and data from the reduced-sample insulin-modified frequently-sampled intravenous glucose tolerance test (Reduced-Sample-IM-FSIGT). However, the application of the nonlinear regression approach to calculate S(I) using data from the Reduced-Sample-IM-FSIGT has been challenged as being not only inaccurate but also having a high failure rate in insulin-resistant subjects. Our goal was to determine the accuracy and failure rate of the Reduced-Sample-IM-FSIGT using the nonlinear regression approach to the minimal model. With S(I) from the Full-Sample-IM-FSIGT considered the standard and using the nonlinear regression approach to the minimal model, we compared the agreement between S(I) from the Full- and Reduced-Sample-IM-FSIGT protocols. One hundred African Americans (body mass index, 31.3 +/- 7.6 kg/m(2) [mean +/- SD]; range, 19.0-56.9 kg/m(2)) had FSIGTs. Glucose (0.3 g/kg) was given at baseline. Insulin was infused from 20 to 25 minutes (total insulin dose, 0.02 U/kg). For the Full-Sample-IM-FSIGT, S(I) was calculated based on the glucose and insulin samples taken at -1, 1, 2, 3, 4, 5, 6, 7, 8,10, 12, 14, 16, 19, 22, 23, 24, 25, 27, 30, 40, 50, 60, 70, 80, 90, 100, 120, 150, and 180 minutes. For the Reduced-Sample-FSIGT, S(I) was calculated based on the time points that appear in bold. Agreement was determined by Spearman correlation, concordance, and the Bland-Altman method. In addition, for both protocols, the population was divided into tertiles of S(I). Insulin resistance was defined by the lowest tertile of S(I) from the Full-Sample-IM-FSIGT. The distribution of subjects across tertiles was compared by rank order and kappa statistic. We found that the rate of failure of resolution of S(I) by

  4. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  5. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  6. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  7. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  8. A universal cue for grammatical categories in the input to children: Frequent frames.

    Science.gov (United States)

    Moran, Steven; Blasi, Damián E; Schikowski, Robert; Küntay, Aylin C; Pfeiler, Barbara; Allen, Shanley; Stoll, Sabine

    2018-06-01

    How does a child map words to grammatical categories when words are not overtly marked either lexically or prosodically? Recent language acquisition theories have proposed that distributional information encoded in sequences of words or morphemes might play a central role in forming grammatical classes. To test this proposal, we analyze child-directed speech from seven typologically diverse languages to simulate maximum variation in the structures of the world's languages. We ask whether the input to children contains cues for assigning syntactic categories in frequent frames, which are frequently occurring nonadjacent sequences of words or morphemes. In accord with aggregated results from previous studies on individual languages, we find that frequent word frames do not provide a robust distributional pattern for accurately predicting grammatical categories. However, our results show that frames are extremely accurate cues cross-linguistically at the morpheme level. We theorize that the nonadjacent dependency pattern captured by frequent frames is a universal anchor point for learners on the morphological level to detect and categorize grammatical categories. Whether frames also play a role on higher linguistic levels such as words is determined by grammatical features of the individual language. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  9. Frequent Frames as a Cue for Grammatical Categories in Child Directed Speech

    Science.gov (United States)

    Mintz, Toben H.

    2003-01-01

    This paper introduces the notion of frequent frames, distributional patterns based on co-occurrence patterns of words in sentences, then investigates the usefulness of this information in grammatical categorization. A frame is defined as two jointly occurring words with one word intervening. Qualitative and quantitative results from distributional…

  10. Turning Off Frequently Overridden Drug Alerts: Limited Opportunities for Doing It Safely

    NARCIS (Netherlands)

    I.H. van der Sijs (Heleen); J.E.C.M. Aarts (Jos); T. van Gelder (Teun); M. Berg (Marc); A.G. Vulto (Arnold)

    2008-01-01

    textabstractObjectives: This study sought to identify opportunities to safely turn off frequently overridden drug-drug interaction alerts (DDIs) in computerized physician order entry (CPOE). Design: Quantitative retrospective analysis of drug safety alerts overridden during 1 month and qualitative

  11. Efficient frequent pattern mining algorithm based on node sets in cloud computing environment

    Science.gov (United States)

    Billa, V. N. Vinay Kumar; Lakshmanna, K.; Rajesh, K.; Reddy, M. Praveen Kumar; Nagaraja, G.; Sudheer, K.

    2017-11-01

    The ultimate goal of Data Mining is to determine the hidden information which is useful in making decisions using the large databases collected by an organization. This Data Mining involves many tasks that are to be performed during the process. Mining frequent itemsets is the one of the most important tasks in case of transactional databases. These transactional databases contain the data in very large scale where the mining of these databases involves the consumption of physical memory and time in proportion to the size of the database. A frequent pattern mining algorithm is said to be efficient only if it consumes less memory and time to mine the frequent itemsets from the given large database. Having these points in mind in this thesis we proposed a system which mines frequent itemsets in an optimized way in terms of memory and time by using cloud computing as an important factor to make the process parallel and the application is provided as a service. A complete framework which uses a proven efficient algorithm called FIN algorithm. FIN algorithm works on Nodesets and POC (pre-order coding) tree. In order to evaluate the performance of the system we conduct the experiments to compare the efficiency of the same algorithm applied in a standalone manner and in cloud computing environment on a real time data set which is traffic accidents data set. The results show that the memory consumption and execution time taken for the process in the proposed system is much lesser than those of standalone system.

  12. Predictors of frequent exacerbations in (ex)smoking and never smoking adults with severe asthma

    NARCIS (Netherlands)

    Westerhof, Guus A.; de Groot, Jantina C.; Amelink, Marijke; de Nijs, Selma B.; ten Brinke, Anneke; Weersink, Els J.; Bel, Elisabeth H.

    2016-01-01

    Persistent eosinophilic airway inflammation is an important driver for asthma exacerbations in non-smokers with asthma. Whether eosinophilic inflammation is also a predictor of asthma exacerbations in (ex)smokers is not known. The aim was to investigate factors associated with frequent exacerbations

  13. Competence-Based Education and Training--About Frequently Asked Questions

    Science.gov (United States)

    Mulder, Martin

    2012-01-01

    This article follows the author's previous piece on practical guidelines for the development of comprehensive competence-based education and training (Mulder, 2012). It is about the questions that have been and are still frequently asked in presentations, workshops and classes about the introduction of competence-based education. Here, the author…

  14. Cancer mortality among women frequently exposed to radiographic examinations for spinal disorders

    NARCIS (Netherlands)

    Ronckers, Cécile M.; Land, Charles E.; Miller, Jeremy S.; Stovall, Marilyn; Lonstein, John E.; Doody, Michele M.

    2010-01-01

    We studied cancer mortality in a cohort of 5,573 women with scoliosis and other spine disorders who were diagnosed between 1912 and 1965 and were exposed to frequent diagnostic X-ray procedures. Patients were identified from medical records in 14 orthopedic medical centers in the United States and

  15. Contact allergy in children with and without atopic dermatitis; which are the frequent allergens?

    NARCIS (Netherlands)

    Lubbes, S.; Rustemeyer, T.; Schuttelaar, M.L.A.; Sillevis Smitt, J.H.; Middelkamp-Hup, M.A.

    2014-01-01

    Background: Data on contact allergies in children are conflicting. This study aims to identify frequent contact allergens and their relevance in children with and without atopic dermatitis (AD). This will allow better identification of potential sensitizers and improve patients' care in children.

  16. Occupational Portrayal of Men and Women on the Most Frequently Mentioned Television Shows of Preschool Children.

    Science.gov (United States)

    Shechtman, Stephen A.

    The purpose of this study was to assess the distribution of male vs. female occupational portrayals in terms of occupational prestige on the six television shows most frequently mentioned by preschool children. The following shows were viewed and analyzed six times: Sesame Street, Bugs Bunny, Roadrunner, Batman, Flintstones, and Happy Days.…

  17. In a Manner of Speaking: Assessing Frequent Spoken Figurative Idioms to Assist ESL/EFL Teachers

    Science.gov (United States)

    Grant, Lynn E.

    2007-01-01

    This article outlines criteria to define a figurative idiom, and then compares the frequent figurative idioms identified in two sources of spoken American English (academic and contemporary) to their frequency in spoken British English. This is done by searching the spoken part of the British National Corpus (BNC), to see whether they are frequent…

  18. Approximating Frequent Items in Asynchronous Data Stream over a Sliding Window

    DEFF Research Database (Denmark)

    Ting, Hing-Fung; Lee, Lap Kei; Chan, Ho-Leung

    2011-01-01

    with sufficient accuracy. Prior to our work, the best solution is given by Cormode et al. [1], who gave an O (1/ε log W log (εB/ log W) min {log W, 1/ε} log |U|)- space data structure that can approximate the frequent items within an ε error bound, where W and B are parameters of the sliding window, and U...

  19. Frequent Symptom Sets Identification from Uncertain Medical Data in Differentially Private Way

    Directory of Open Access Journals (Sweden)

    Zhe Ding

    2017-01-01

    Full Text Available Data mining techniques are applied to identify hidden patterns in large amounts of patient data. These patterns can assist physicians in making more accurate diagnosis. For different physical conditions of patients, the same physiological index corresponds to a different symptom association probability for each patient. Data mining technologies based on certain data cannot be directly applied to these patients’ data. Patient data are sensitive data. An adversary with sufficient background information can make use of the patterns mined from uncertain medical data to obtain the sensitive information of patients. In this paper, a new algorithm is presented to determine the top K most frequent itemsets from uncertain medical data and to protect data privacy. Based on traditional algorithms for mining frequent itemsets from uncertain data, our algorithm applies sparse vector algorithm and the Laplace mechanism to ensure differential privacy for the top K most frequent itemsets for uncertain medical data and the expected supports of these frequent itemsets. We prove that our algorithm can guarantee differential privacy in theory. Moreover, we carry out experiments with four real-world scenario datasets and two synthetic datasets. The experimental results demonstrate the performance of our algorithm.

  20. 25 CFR 115.405 - How frequently will a minor's statement of performance be mailed?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How frequently will a minor's statement of performance be mailed? 115.405 Section 115.405 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL... minor's statement of performance be mailed? We will mail a minor's statement of performance to the...

  1. Effectiveness of small daily amounts of progressive resistance training for frequent neck/shoulder pain

    DEFF Research Database (Denmark)

    Andersen, Lars; Saervoll, Charlotte A; Mortensen, Ole S

    2011-01-01

    Regular physical exercise is a cornerstone in rehabilitation programs, but adherence to comprehensive exercise remains low. This study determined the effectiveness of small daily amounts of progressive resistance training for relieving neck/shoulder pain in healthy adults with frequent symptoms...

  2. The Role of Frequent Short Exams in Improving Student Performance in Hybrid Global Business Classes

    Science.gov (United States)

    Nakos, George; Whiting, Anita

    2018-01-01

    The authors investigate whether frequent in class exams can improve the performance of students in hybrid global business courses. An experiment was conducted in three hybrid sections of a global business course exposing students to short in class exams. The expectation of a short exam forces students to watch the online lectures and study the…

  3. Automatic detection of frequent pronunciation errors made by L2-learners

    NARCIS (Netherlands)

    Truong, K.P.; Neri, A.; Wet, F. de; Cucchiarini, C.; Strik, H.

    2005-01-01

    In this paper, we present an acoustic-phonetic approach to automatic pronunciation error detection. Classifiers using techniques such as Linear Discriminant Analysis and Decision Trees were developed for three sounds that are frequently pronounced incorrectly by L2-learners of Dutch: /a/, /y/ and

  4. Frequent users of emergency services: associated factors and reasons for seeking care

    Directory of Open Access Journals (Sweden)

    Aline Marques Acosta

    2015-04-01

    Full Text Available Aim: to identify the profile of frequent users of emergency services, to verify the associated factors and to analyze the reasons for the frequent use of the services. METHOD: An explanatory sequential type mixed method was adopted. Quantitative data were collected from the electronic medical records, with a sample of 385 users attended four or more times in an emergency service, during the year 2011. Qualitative data were collected through semi-structured interviews with 18 users, intentionally selected from the results of the quantitative stage. Quantitative data were analyzed using descriptive and inferential statistics and qualitative data using thematic analysis. RESULTS: It was found that 42.9% were elderly, 84.9% had chronic diseases, 63.5% were classified as urgent, 42.1% stayed for more than 24 hours in the service and 46.5% were discharged. Scheduled follow-up appointment, risk classification, length of stay and outcome were factors associated with frequent use. The reasons for seeking the services were mainly related to the exacerbation of chronic diseases, to easier access and concentration of technology, to the bond, and to the scheduled appointments. CONCLUSIONS: The results contribute to comprehending the repeated use of emergency services and provide additional data to plan alternatives to reduce frequent use.

  5. Food for Thought: Frequent Interracial Dining Experiences as a Predictor of Students' Racial Climate Perceptions

    Science.gov (United States)

    Lowe, Maria R.; Byron, Reginald A.; Ferry, Griffin; Garcia, Melissa

    2013-01-01

    This article describes a study that explored factors which influenced undergraduate students' perceptions of the racial climate at a predominantly white liberal arts university in the South. Mixed methods results suggest that race, aspects of the institutional climate, and frequent interracial dining experiences in the campus cafeteria…

  6. Mining Productive-Associated Periodic-Frequent Patterns in Body Sensor Data for Smart Home Care.

    Science.gov (United States)

    Ismail, Walaa N; Hassan, Mohammad Mehedi

    2017-04-26

    The understanding of various health-oriented vital sign data generated from body sensor networks (BSNs) and discovery of the associations between the generated parameters is an important task that may assist and promote important decision making in healthcare. For example, in a smart home scenario where occupants' health status is continuously monitored remotely, it is essential to provide the required assistance when an unusual or critical situation is detected in their vital sign data. In this paper, we present an efficient approach for mining the periodic patterns obtained from BSN data. In addition, we employ a correlation test on the generated patterns and introduce productive-associated periodic-frequent patterns as the set of correlated periodic-frequent items. The combination of these measures has the advantage of empowering healthcare providers and patients to raise the quality of diagnosis as well as improve treatment and smart care, especially for elderly people in smart homes. We develop an efficient algorithm named PPFP-growth (Productive Periodic-Frequent Pattern-growth) to discover all productive-associated periodic frequent patterns using these measures. PPFP-growth is efficient and the productiveness measure removes uncorrelated periodic items. An experimental evaluation on synthetic and real datasets shows the efficiency of the proposed PPFP-growth algorithm, which can filter a huge number of periodic patterns to reveal only the correlated ones.

  7. Myenteric plexitis: A frequent feature in patients undergoing surgery for colonic diverticular disease.

    Science.gov (United States)

    Bassotti, Gabrio; Villanacci, Vincenzo; Sidoni, Angelo; Nascimbeni, Riccardo; Dore, Maria P; Binda, Gian A; Bandelloni, Roberto; Salemme, Marianna; Del Sordo, Rachele; Cadei, Moris; Manca, Alessandra; Bernardini, Nunzia; Maurer, Christoph A; Cathomas, Gieri

    2015-12-01

    Diverticular disease of the colon is frequent in clinical practice, and a large number of patients each year undergo surgical procedures worldwide for their symptoms. Thus, there is a need for better knowledge of the basic pathophysiologic mechanisms of this disease entity. Because patients with colonic diverticular disease have been shown to display abnormalities of the enteric nervous system, we assessed the frequency of myenteric plexitis (i.e. the infiltration of myenteric ganglions by inflammatory cells) in patients undergoing surgery for this condition. We analyzed archival resection samples from the proximal resection margins of 165 patients undergoing left hemicolectomy (60 emergency and 105 elective surgeries) for colonic diverticulitis, by histology and immunochemistry. Overall, plexitis was present in almost 40% of patients. It was subdivided into an eosinophilic (48%) and a lymphocytic (52%) subtype. Plexitis was more frequent in younger patients; and it was more frequent in those undergoing emergency surgery (50%), compared to elective (28%) surgery (p = 0.007). All the severe cases of plexitis displayed the lymphocytic subtype. In conclusion, myenteric plexitis is frequent in patients with colonic diverticular disease needing surgery, and it might be implicated in the pathogenesis of the disease.

  8. Supporting Frequent Updates in R-Trees: A Bottom-Up Approach

    DEFF Research Database (Denmark)

    Lee, Mong Li; Hsu, Wynne; Jensen, Christian Søndergaard

    2004-01-01

    Advances in hardware-related technologies promise to enable new data management applications that monitor continuous processes. In these applications, enormous amounts of state samples are obtained via sensors and are streamed to a database. Further, updates are very frequent and may exhibit loca...

  9. Experimental evaluation of ontology-based HIV/AIDS frequently asked question retrieval system.

    Science.gov (United States)

    Ayalew, Yirsaw; Moeng, Barbara; Mosweunyane, Gontlafetse

    2018-05-01

    This study presents the results of experimental evaluations of an ontology-based frequently asked question retrieval system in the domain of HIV and AIDS. The main purpose of the system is to provide answers to questions on HIV/AIDS using ontology. To evaluate the effectiveness of the frequently asked question retrieval system, we conducted two experiments. The first experiment focused on the evaluation of the quality of the ontology we developed using the OQuaRE evaluation framework which is based on software quality metrics and metrics designed for ontology quality evaluation. The second experiment focused on evaluating the effectiveness of the ontology in retrieving relevant answers. For this we used an open-source information retrieval platform, Terrier, with retrieval models BM25 and PL2. For the measurement of performance, we used the measures mean average precision, mean reciprocal rank, and precision at 5. The results suggest that frequently asked question retrieval with ontology is more effective than frequently asked question retrieval without ontology in the domain of HIV/AIDS.

  10. Memory complaints are frequent but qualitatively different in young and elderly healthy people

    NARCIS (Netherlands)

    Ginó, Sandra; Mendes, Tiago; Maroco, João; Ribeiro, Filipa; Schmand, Ben A.; de Mendonça, Alexandre; Guerreiro, Manuela

    2010-01-01

    BACKGROUND: Subjective memory complaints are frequently reported by the elderly. There is less information about the characterization of subjective memory complaints in young people. OBJECTIVE: To determine different memory complaints between young and elderly people with the use of the Subjective

  11. Memory complaints are frequent but qualitatively different in young and elderly healthy people

    NARCIS (Netherlands)

    Ginó, S.; Mendes, T.; Maroco, J.; Ribeiro, F.; Schmand, B.A.; de Mendonca, A.; Guerreiro, M.

    2010-01-01

    Background: Subjective memory complaints are frequently reported by the elderly. There is less information about the characterization of subjective memory complaints in young people. Objective: To determine different memory complaints between young and elderly people with the use of the Subjective

  12. GRAMI: Frequent subgraph and pattern mining in a single large graph

    KAUST Repository

    Elseidy, M.

    2014-01-01

    Mining frequent subgraphs is an important operation on graphs; it is defined as finding all subgraphs that appear frequently in a database according to a given frequency threshold. Most existing work assumes a database of many small graphs, but modern applications, such as social networks, citation graphs, or proteinprotein interactions in bioinformatics, are modeled as a single large graph. In this paper we present GRAMI, a novel framework for frequent subgraph mining in a single large graph. GRAMI undertakes a novel approach that only finds the minimal set of instances to satisfy the frequency threshold and avoids the costly enumeration of all instances required by previous approaches. We accompany our approach with a heuristic and optimizations that significantly improve performance. Additionally, we present an extension of GRAMI that mines frequent patterns. Compared to subgraphs, patterns offer a more powerful version of matching that captures transitive interactions between graph nodes (like friend of a friend) which are very common in modern applications. Finally, we present CGRAMI, a version supporting structural and semantic constraints, and AGRAMI, an approximate version producing results with no false positives. Our experiments on real data demonstrate that our framework is up to 2 orders of magnitude faster and discovers more interesting patterns than existing approaches. 2014 VLDB Endowment.

  13. PROGRAM RATIONALE OF TREATMENT AND PREVENTION IN CHILDREN WITH FREQUENT RESPIRATORY DISEASES

    Directory of Open Access Journals (Sweden)

    A. V. Deryusheva

    2017-01-01

    Full Text Available The results of complex clinical and laboratory examination of 146 children aged 2—3 years attending kindergarten were presented. The leading predictors of frequent respiratory disease: disturbance of microbiocenosis oropharyngeal mucosa, immunoglobulins decrease, respiratory allergic pathology were established and scientifically substantiated. The results obtained prove the main directions of therapeutic and preventive measures.

  14. Onset of frequent dust storms in northern China at ~AD 1100.

    Science.gov (United States)

    He, Yuxin; Zhao, Cheng; Song, Mu; Liu, Weiguo; Chen, Fahu; Zhang, Dian; Liu, Zhonghui

    2015-11-26

    Dust storms in northern China strongly affect the living and health of people there and the dusts could travel a full circle of the globe in a short time. Historically, more frequent dust storms occurred during cool periods, particularly the Little Ice Age (LIA), generally attributed to the strengthened Siberian High. However, limited by chronological uncertainties in proxy records, this mechanism may not fully reveal the causes of dust storm frequency changes. Here we present a late Holocene dust record from the Qaidam Basin, where hydrological changes were previously reconstructed, and examine dust records from northern China, including the ones from historical documents. The records, being broadly consistent, indicate the onset of frequent dust storms at ~AD 1100. Further, peaked dust storm events occurred at episodes of high total solar irradiance or warm-dry conditions in source regions, superimposed on the high background of frequent dust storms within the cool LIA period. We thus suggest that besides strong wind activities, the centennial-scale dust storm events over the last 1000 years appear to be linked to the increased availability of dust source. With the anticipated global warming and deteriorating vegetation coverage, frequent occurrence of dust storms in northern China would be expected to persist.

  15. Mining Productive-Associated Periodic-Frequent Patterns in Body Sensor Data for Smart Home Care

    Directory of Open Access Journals (Sweden)

    Walaa N. Ismail

    2017-04-01

    Full Text Available The understanding of various health-oriented vital sign data generated from body sensor networks (BSNs and discovery of the associations between the generated parameters is an important task that may assist and promote important decision making in healthcare. For example, in a smart home scenario where occupants’ health status is continuously monitored remotely, it is essential to provide the required assistance when an unusual or critical situation is detected in their vital sign data. In this paper, we present an efficient approach for mining the periodic patterns obtained from BSN data. In addition, we employ a correlation test on the generated patterns and introduce productive-associated periodic-frequent patterns as the set of correlated periodic-frequent items. The combination of these measures has the advantage of empowering healthcare providers and patients to raise the quality of diagnosis as well as improve treatment and smart care, especially for elderly people in smart homes. We develop an efficient algorithm named PPFP-growth (Productive Periodic-Frequent Pattern-growth to discover all productive-associated periodic frequent patterns using these measures. PPFP-growth is efficient and the productiveness measure removes uncorrelated periodic items. An experimental evaluation on synthetic and real datasets shows the efficiency of the proposed PPFP-growth algorithm, which can filter a huge number of periodic patterns to reveal only the correlated ones.

  16. Increasing resiliency in frequent fire forests: Lessons from the Sierra Nevada and western Australia

    Science.gov (United States)

    Scott L. Stephens

    2014-01-01

    This paper will primarily focus on the management and restoration of forests adapted to frequent, low-moderate intensity fire regimes. These are the forest types that are most at risk from large, high-severity wildfires and in many regions their fire regimes are changing. Fire as a landscape process can exhibit self-limiting characteristics in some forests which can...

  17. The Role of Old-growth Forests in Frequent-fire Landscapes

    Directory of Open Access Journals (Sweden)

    Daniel Binkley

    2007-12-01

    Full Text Available Classic ecological concepts and forestry language regarding old growth are not well suited to frequent-fire landscapes. In frequent-fire, old-growth landscapes, there is a symbiotic relationship between the trees, the understory graminoids, and fire that results in a healthy ecosystem. Patches of old growth interspersed with younger growth and open, grassy areas provide a wide variety of habitats for animals, and have a higher level of biodiversity. Fire suppression is detrimental to these forests, and eventually destroys all old growth. The reintroduction of fire into degraded frequent-fire, old-growth forests, accompanied by appropriate thinning, can restore a balance to these ecosystems. Several areas require further research and study: 1 the ability of the understory to respond to restoration treatments, 2 the rate of ecosystem recovery following wildfires whose level of severity is beyond the historic or natural range of variation, 3 the effects of climate change, and 4 the role of the microbial community. In addition, it is important to recognize that much of our knowledge about these old-growth systems comes from a few frequent-fire forest types.

  18. A search for covert precipitating clinical parameters in frequent exacerbators of chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Ankit Bhatia

    2016-01-01

    Full Text Available Introduction: Acute exacerbations are a significant source of morbidity and mortality associated with chronic obstructive pulmonary disease (COPD. Some patients suffer an inordinate number of exacerbations while others remain relatively protected. The aim of this study was to evaluate the potentially modifiable precipitating parameters of frequent severe exacerbations requiring hospital admission in COPD. Materials and Methods: Consecutive patients admitted with acute exacerbation of COPD for a period of one year in a tertiary care hospital were evaluated prospectively. Data regarding the number of exacerbations in the previous year, current comorbidities, medications, and clinical and functional status of COPD patients were evaluated. Results: We included 98 COPD patients (81.63% men admitted consecutively with exacerbations in our department. The mean number of severe exacerbations was (2.42 per patient/per year, and 65% of the patients had frequent severe exacerbations. Multivariate analysis indicated that serum uric acid, serum total IgE, depression and anxiety, gastroesophageal reflux disease symptoms, air pollution, poor adherence to inhaled therapy, and irregular outpatient followup visits were independent predictors of frequent severe exacerbations. Conclusion: COPD patients with frequent exacerbations should be carefully assessed for modifiable confounding risk factors regardless of poor lung function to decrease exacerbation frequency and related poor prognosis. Raised serum total IgE levels may point towards atopy as an additional comorbidity in COPD while uric acid can have a clinically useful role in risk stratification in a primary care setting.

  19. GraMi: Generalized Frequent Pattern Mining in a Single Large Graph

    KAUST Repository

    Saeedy, Mohammed El

    2011-11-01

    Mining frequent subgraphs is an important operation on graphs. Most existing work assumes a database of many small graphs, but modern applications, such as social networks, citation graphs or protein-protein interaction in bioinformatics, are modeled as a single large graph. Interesting interactions in such applications may be transitive (e.g., friend of a friend). Existing methods, however, search for frequent isomorphic (i.e., exact match) subgraphs and cannot discover many useful patterns. In this paper the authors propose GRAMI, a framework that generalizes frequent subgraph mining in a large single graph. GRAMI discovers frequent patterns. A pattern is a graph where edges are generalized to distance-constrained paths. Depending on the definition of the distance function, many instantiations of the framework are possible. Both directed and undirected graphs, as well as multiple labels per vertex, are supported. The authors developed an efficient implementation of the framework that models the frequency resolution phase as a constraint satisfaction problem, in order to avoid the costly enumeration of all instances of each pattern in the graph. The authors also implemented CGRAMI, a version that supports structural and semantic constraints; and AGRAMI, an approximate version that supports very large graphs. The experiments on real data demonstrate that the authors framework is up to 3 orders of magnitude faster and discovers more interesting patterns than existing approaches.

  20. Exposure of Medical Students to Pharmaceutical Marketing in Primary Care Settings: Frequent and Influential

    Science.gov (United States)

    Sarikaya, Ozlem; Civaner, Murat; Vatansever, Kevser

    2009-01-01

    It is known that interaction between pharmaceutical companies and medical professionals may lead to corruption of professional values, irrational use of medicine, and negative effects on the patient-physician relationship. Medical students frequently interact with pharmaceutical company representatives and increasingly accept their gifts.…

  1. Review of the Instruments Most Frequently Employed to Assess Tactics in Physical Education and Youth Sports

    Science.gov (United States)

    Arias, Jose L.; Castejon, Francisco Javier

    2012-01-01

    Investigators' increased interest in teaching game tactics requires generalizable assessment instruments that are appropriate to whatever is needed by the tactic. This literature review aims to provide information about the instruments most frequently used to assess tactics in youth sports. We found that very few studies used instruments that…

  2. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  3. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  4. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  5. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  6. Characteristics of women who frequently under report their energy intake: a doubly labelled water study.

    Science.gov (United States)

    Scagliusi, F B; Ferriolli, E; Pfrimer, K; Laureano, C; Cunha, C S F; Gualano, B; Lourenço, B H; Lancha, A H

    2009-10-01

    We applied three dietary assessment methods and aimed at obtaining a set of physical, social and psychological variables that can discriminate those individuals who did not underreport ('never under-reporters'), those who underreported in one dietary assessment method ('occasional under-reporters') and those who underreported in two or three dietary assessment methods ('frequent under-reporters'). Sixty-five women aged 18-57 years were recruited for this study. Total energy expenditure was determined by doubly labelled water, and energy intake was estimated by three 24-h diet recalls, 3-day food records and a food frequency questionnaire. A multiple discriminant analysis was used to identify which of those variables better discriminated the three groups: body mass index (BMI), income, education, social desirability, nutritional knowledge, dietary restraint, physical activity practice, body dissatisfaction and binge-eating symptoms. Twenty-three participants were 'never under-reporters'. Twenty-four participants were 'occasional under-reporters' and 18 were 'frequent under-reporters'. Four variables entered the discriminant model: income, BMI, social desirability and body dissatisfaction. According to potency indices, income contributed the most to the total discriminant power, followed in decreasing order by social desirability score, BMI and body dissatisfaction. Income, social desirability and BMI were the characteristics that mainly separated the 'never under-reporters' from the under-reporters (occasional or frequent). Body dissatisfaction better discriminated the 'occasional under-reporters' from the 'frequent under-reporters'. 'Frequent under-reporters' have a greater BMI, social desirability score, body dissatisfaction score and lower income. These four variables seemed to be able to discriminate individuals who are more prone to systematic under reporting.

  7. Key factors of case management interventions for frequent users of healthcare services: a thematic analysis review.

    Science.gov (United States)

    Hudon, Catherine; Chouinard, Maud-Christine; Lambert, Mireille; Diadiou, Fatoumata; Bouliane, Danielle; Beaudin, Jérémie

    2017-10-22

    The aim of this paper was to identify the key factors of case management (CM) interventions among frequent users of healthcare services found in empirical studies of effectiveness. Thematic analysis review of CM studies. We built on a previously published review that aimed to report the effectiveness of CM interventions for frequent users of healthcare services, using the Medline, Scopus and CINAHL databases covering the January 2004-December 2015 period, then updated to July 2017, with the keywords 'CM' and 'frequent use'. We extracted factors of successful (n=7) and unsuccessful (n=6) CM interventions and conducted a mixed thematic analysis to synthesise findings. Chaudoir's implementation of health innovations framework was used to organise results into four broad levels of factors: (1) ,environmental/organisational level, (2) practitioner level, (3) patient level and (4) programme level. Access to, and close partnerships with, healthcare providers and community services resources were key factors of successful CM interventions that should target patients with the greatest needs and promote frequent contacts with the healthcare team. The selection and training of the case manager was also an important factor to foster patient engagement in CM. Coordination of care, self-management support and assistance with care navigation were key CM activities. The main issues reported by unsuccessful CM interventions were problems with case finding or lack of care integration. CM interventions for frequent users of healthcare services should ensure adequate case finding processes, rigorous selection and training of the case manager, sufficient intensity of the intervention, as well as good care integration among all partners. Other studies could further evaluate the influence of contextual factors on intervention impacts. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted

  8. Antibody deficiency in patients with frequent exacerbations of Chronic Obstructive Pulmonary Disease (COPD).

    Science.gov (United States)

    McCullagh, Brian N; Comellas, Alejandro P; Ballas, Zuhair K; Newell, John D; Zimmerman, M Bridget; Azar, Antoine E

    2017-01-01

    Chronic Obstructive Pulmonary Disease is the third leading cause of death in the US, and is associated with periodic exacerbations, which account for the largest proportion of health care utilization, and lead to significant morbidity, mortality, and worsening lung function. A subset of patients with COPD have frequent exacerbations, occurring 2 or more times per year. Despite many interventions to reduce COPD exacerbations, there is a significant lack of knowledge in regards to their mechanisms and predisposing factors. We describe here an important observation that defines antibody deficiency as a potential risk factor for frequent COPD exacerbations. We report a case series of patients who have frequent COPD exacerbations, and who were found to have an underlying primary antibody deficiency syndrome. We also report on the outcome of COPD exacerbations following treatment in a subset with of these patients with antibody deficiency. We identified patients with COPD who had 2 or more moderate to severe exacerbations per year; immune evaluation including serum immunoglobulin levels and pneumococcal IgG titers was performed. Patients diagnosed with an antibody deficiency syndrome were treated with either immunoglobulin replacement therapy or prophylactic antibiotics, and their COPD exacerbations were monitored over time. A total of 42 patients were identified who had 2 or more moderate to severe COPD exacerbations per year. Twenty-nine patients had an underlying antibody deficiency syndrome: common variable immunodeficiency (8), specific antibody deficiency (20), and selective IgA deficiency (1). Twenty-two patients had a follow-up for at least 1 year after treatment of their antibody deficiency, which resulted in a significant reduction of COPD exacerbations, courses of oral corticosteroid use and cumulative annual dose of oral corticosteroid use, rescue antibiotic use, and hospitalizations for COPD exacerbations. This case series identifies antibody deficiency as a

  9. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  10. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  11. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  12. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  13. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  14. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  15. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  16. A nurse-initiated pain protocol in the ED improves pain treatment in patients with acute musculoskeletal pain

    NARCIS (Netherlands)

    Pierik, J.G.; Berben, S.A.A.; IJzerman, M.J.; Gaakeer, M.I.; Eenennaam, F.L. van; Vugt, A.B. van; Doggen, C.J.

    2016-01-01

    While acute musculoskeletal pain is a frequent complaint, its management is often neglected. An implementation of a nurse-initiated pain protocol based on the algorithm of a Dutch pain management guideline in the emergency department might improve this. A pre-post intervention study was performed as

  17. A nurse-initiated pain protocol in the ED improves pain treatment in patients with acute musculoskeletal pain

    NARCIS (Netherlands)

    Pierik, Jorien; Berben, Sivera A.; IJzerman, Maarten Joost; Gaakeer, Menno I.; Eenennaam, Fred L.; van Vugt, Arie B.; Doggen, Catharina Jacoba Maria

    2016-01-01

    While acute musculoskeletal pain is a frequent complaint, its management is often neglected. An implementation of a nurse-initiated pain protocol based on the algorithm of a Dutch pain management guideline in the emergency department might improve this. A pre–post intervention study was performed as

  18. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  19. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  20. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  1. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  2. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  3. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  4. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  5. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    Science.gov (United States)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  6. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  7. Practical considerations for optimizing cardiac computed tomography protocols for comprehensive acquisition prior to transcatheter aortic valve replacement.

    Science.gov (United States)

    Khalique, Omar K; Pulerwitz, Todd C; Halliburton, Sandra S; Kodali, Susheel K; Hahn, Rebecca T; Nazif, Tamim M; Vahl, Torsten P; George, Isaac; Leon, Martin B; D'Souza, Belinda; Einstein, Andrew J

    2016-01-01

    Transcatheter aortic valve replacement (TAVR) is performed frequently in patients with severe, symptomatic aortic stenosis who are at high risk or inoperable for open surgical aortic valve replacement. Computed tomography angiography (CTA) has become the gold standard imaging modality for pre-TAVR cardiac anatomic and vascular access assessment. Traditionally, cardiac CTA has been most frequently used for assessment of coronary artery stenosis, and scanning protocols have generally been tailored for this purpose. Pre-TAVR CTA has different goals than coronary CTA and the high prevalence of chronic kidney disease in the TAVR patient population creates a particular need to optimize protocols for a reduction in iodinated contrast volume. This document reviews details which allow the physician to tailor CTA examinations to maximize image quality and minimize harm, while factoring in multiple patient and scanner variables which must be considered in customizing a pre-TAVR protocol. Copyright © 2016 Society of Cardiovascular Computed Tomography. Published by Elsevier Inc. All rights reserved.

  8. THE PREVALENCE OF INFECTION WITH HERPES VIRUSES AMONG FREQUENTLY ILL CHILDREN

    Directory of Open Access Journals (Sweden)

    Volyansky AY

    2014-10-01

    Full Text Available Frequently ill children (FIC - a group of dispensary an inclusion criterion which is the frequency of episodes of colds are over 4-6 throughout the year depending on age. In children population among all diseases marked the absolute predominance (90% of acute respiratory infections (ARI. The maximum incidence of acute respiratory infections among children there is between the ages of 1 to 3 years, and then gradually decreases. Among primary school children the incidence is 2-5 cases a year, among teens - no more than 2-4 diseases throughout the year. Opinions of scholars and practitioners pediatricians as to the legality of frequent classification of cases of children to pathologic conditions of the immune system are different and often diametrically opposed. Objective: To determine the prevalence of infection with herpes viruses of frequently ill children. Materials and methods. The analysis consists the results of clinical and laboratory examination of 170 frequently ill children. The criterion for selection of children for the study is the frequency of episodes of colds according to the classification of A.A.Baranov V.Yu.Albitskiy. Analysis of clinical and anamnesis data revealed that in the observed group of children there is a high rate of recurrent respiratory diseases. Thus, in the observed group of children the average incidence of ARI was 7,42 ± 0,92 episodes a year. The average duration of an episode of disease was 9,12 ± 2,75 days. The complicated course occurred in 32% of cases, the average duration of a complicated episode grew to 12,37 ± 3,91 days. This study led to the following conclusions: 1. To 3 years of age, about 85% frequently ill children are infected with at least one virus of the family Herpesviridae. By 6 years of age the number grows to 95%, to 11 years - to 98%. 2. Infectiousness 3 or more herpes viruses among children up to 3 years is more than 30%, among children 3-6 years is 48%, in the age group 6-11 years more

  9. A Parallel Approach for Frequent Subgraph Mining in a Single Large Graph Using Spark

    Directory of Open Access Journals (Sweden)

    Fengcai Qiao

    2018-02-01

    Full Text Available Frequent subgraph mining (FSM plays an important role in graph mining, attracting a great deal of attention in many areas, such as bioinformatics, web data mining and social networks. In this paper, we propose SSiGraM (Spark based Single Graph Mining, a Spark based parallel frequent subgraph mining algorithm in a single large graph. Aiming to approach the two computational challenges of FSM, we conduct the subgraph extension and support evaluation parallel across all the distributed cluster worker nodes. In addition, we also employ a heuristic search strategy and three novel optimizations: load balancing, pre-search pruning and top-down pruning in the support evaluation process, which significantly improve the performance. Extensive experiments with four different real-world datasets demonstrate that the proposed algorithm outperforms the existing GraMi (Graph Mining algorithm by an order of magnitude for all datasets and can work with a lower support threshold.

  10. Bit-Table Based Biclustering and Frequent Closed Itemset Mining in High-Dimensional Binary Data

    Directory of Open Access Journals (Sweden)

    András Király

    2014-01-01

    Full Text Available During the last decade various algorithms have been developed and proposed for discovering overlapping clusters in high-dimensional data. The two most prominent application fields in this research, proposed independently, are frequent itemset mining (developed for market basket data and biclustering (applied to gene expression data analysis. The common limitation of both methodologies is the limited applicability for very large binary data sets. In this paper we propose a novel and efficient method to find both frequent closed itemsets and biclusters in high-dimensional binary data. The method is based on simple but very powerful matrix and vector multiplication approaches that ensure that all patterns can be discovered in a fast manner. The proposed algorithm has been implemented in the commonly used MATLAB environment and freely available for researchers.

  11. Communication Assessment of the Most Frequented Breast Cancer Websites: Evaluation of Design and Theoretical Criteria.

    Science.gov (United States)

    Whitten, Pamela; Smith, Sandi; Munday, Samantha; LaPlante, Carolyn

    2008-07-01

    The internet is a prominent source of health information for the public. This research evaluated both basic use and design tenets and the presence of theoretical components to motivate healthy breast cancer behavior for users of the most frequented breast cancer websites. Each website was evaluated with 2 sets of questions. The first attends to the basic use and design tenets of the website. The second coding form assessed the websites use of 3 behavior change theories. The majority of the websites fared well with regards to their use of basic tenet and design principles. Theoretical components were used sparingly on the majority of websites. The most frequented breast cancer websites are currently well equipped with basic use and design tenets. However, their lack of behavioral change components is likely to impede users' motivations to protect themselves against breast cancer.

  12. Approximating Frequent Items in Asynchronous Data Stream over a Sliding Window

    Directory of Open Access Journals (Sweden)

    Ho-Leung Chan

    2011-09-01

    Full Text Available In an asynchronous data stream, the data items may be out of order with respect to their original timestamps. This paper studies the space complexity required by a data structure to maintain such a data stream so that it can approximate the set of frequent items over a sliding time window with sufficient accuracy. Prior to our work, the best solution is given by Cormode et al. [1], who gave an O (1/ε log W log (εB/ log W min {log W, 1/ε} log |U|- space data structure that can approximate the frequent items within an ε error bound, where W and B are parameters of the sliding window, and U is the set of all possible item names. We gave a more space-efficient data structure that only requires O (1/ε log W log (εB/ logW log log W space.

  13. [Which are the most frequently occurring enteropathogenic bacteria in clinical practice?].

    Science.gov (United States)

    Rohrbach, M; Gualzata, M D; Hollfelder, R; Viollier, A F; Viollier, M; Viollier, E H

    1988-12-10

    Diarrhea is an increasingly frequent clinical finding in Swiss medical practice. One reason is the volume of tourism in countries with different climatic and social circumstances. To obtain an overview of the enteropathogenic bacteria spectrum as a cause of diarrhea, we analyzed 11,163 stool specimens from a representative group of patients throughout Switzerland. Enteropathogenic bacteria were found in 15.2% of all specimens; 50% were Campylobacter jejuni/coli, 35% Salmonella spp., 8% Aeromonas hydrophila group, 4% Shigella spp. and 3% Yersinia enterocolitica. This distribution is taken for all age groups and for both sexes. In the infant age there was a maximum evidence of enteropathogenic bacteria of the female sex. In childhood this maximum concerned to the male sex. Patients older than fifty had no positive stool specimens. As expected the most frequent positive stool specimens were in summer.

  14. Frequent Pattern Mining of Eye-Tracking Records Partitioned into Cognitive Chunks

    Directory of Open Access Journals (Sweden)

    Noriyuki Matsuda

    2014-01-01

    Full Text Available Assuming that scenes would be visually scanned by chunking information, we partitioned fixation sequences of web page viewers into chunks using isolate gaze point(s as the delimiter. Fixations were coded in terms of the segments in a 5×5 mesh imposed on the screen. The identified chunks were mostly short, consisting of one or two fixations. These were analyzed with respect to the within- and between-chunk distances in the overall records and the patterns (i.e., subsequences frequently shared among the records. Although the two types of distances were both dominated by zero- and one-block shifts, the primacy of the modal shifts was less prominent between chunks than within them. The lower primacy was compensated by the longer shifts. The patterns frequently extracted at three threshold levels were mostly simple, consisting of one or two chunks. The patterns revealed interesting properties as to segment differentiation and the directionality of the attentional shifts.

  15. Estimated Bioaccessibility to 5-hydroxymethylfurfural from Frequently Consumed Dried Fruits in Iran

    Directory of Open Access Journals (Sweden)

    Nooshin Rahimzadeh

    2014-08-01

    Full Text Available We sought to determine levels of oral bioaccessibility of hydroxymethylfurfural (HMF from frequently consumed dried fruits in Iran. Fifty samples from frequently consumed types of dried fruits were analyzed for moisture, acidity and HMF content before and after in vitro digestion. Besides, bioaccessibility of HMF in dried fruits using an in vitro gastrointestinal digestive model and HMF intake from dried fruits based on consumption of each dried fruit groups wasdetermined. The mean estimated intake of HMF was 72.90 mg/kg and the maximum intake was 240.23 mg/kg for fruit bread. The mean bioaccessibility was 60.26%. There was a correlation between HMF and acid content of fruit bread (r= 0.98, P<0.05. In conclusion, the HMF levels in dried fruits remains high even after the in vitro digestion.

  16. EFFECTIVENESS OF SECRETOLYTIC THERAPY IN REHABILITATION PROGRAM IN FREQUENTLY AILING CHILDREN

    Directory of Open Access Journals (Sweden)

    V.V. Kiselev

    2008-01-01

    Full Text Available A problem of rehabilitation of frequently ailing children (FAC is one of the actual problems in pediatrics. Disorders of mucosal immunity, depending on different factors including the state of mucociliary transport, play important role in formation of FAC group including patients with recurrent episodes of obstructive bronchitis. Morphological and functional unity of mucous tunic of respiratory tract allows determining the state of mucociliary clearance and effectiveness of secretolytic therapy by the state of mucosal tunic of nose and nasopharynx (it is the most accessible mucosal tunic for the objective examination. Specified rates of time of mucociliary transport in different groups of FAC are presented in this article. An effectiveness of mucoregulatory medication ambroxol in complex treatment of FAC with adenoids and recurrent episodes of obstructive bronchitis, and advisability of its prolonged (14–18 days use for the recovery of disturbed system of mucociliary transport were described in this article.Key words: frequently ailing children, somatotype, mucociliary clearance, treatment.

  17. Frequent flyer business travelers. The role of the occupational health nurse.

    Science.gov (United States)

    Tompkins, Olga S; Randolph, Susan A; Ostendorf, Judith S

    2005-03-01

    When managing frequent flyer business travelers, occupational health nurses focus on health promotion and health protection goals. The three types of prevention (i.e., primary, secondary, tertiary) follow a timeline beginning with complete prevention, and proceeding through and ending with management of a disease process. Occupational health nurses design and implement practice strategies based on this progression. Travel health nursing is rapidly expanding as the number of travelers, immunizations, and modes of transportation increase. Physicians focus on disease, industrial hygienists focus on hazard exposure, and safety professionals address occupational issues related to illnesses and injuries. Occupational health nurses are the professionals who focus on all three areas, in addition to health promotion and health protection. Frequent flyer business travelers have specific and complex needs that occupational health nurses are in a unique position to address.

  18. Frequent nonprescription stimulant use and risky behaviors in college students: the role of effortful control.

    Science.gov (United States)

    Reid, Adam M; Graziano, Paulo A; Balkhi, Amanda M; McNamara, Joseph P H; Cottler, Linda B; Meneses, Evander; Geffken, Gary R

    2015-01-01

    The goal of this study was to (a) investigate the association between nonprescription stimulant use (NPSU) and risky behaviors, including risky sex, driving, financial behaviors, and drug use and (b) collect preliminary evidence on mechanisms that may link NPSU to risky behaviors. A sample of 555 college students was collected between August 2010 and February 2012. Students completed several self-report measures assessing their drug use history, attention-deficit and hyperactivity symptoms, temperament, and risky behaviors beyond drug use. Those who reported more frequent NPSU were more likely to engage in high-risk behavior across all 4 domains studied. Further, effortful control abilities partially mediated the link between NPSU and risky behaviors. These results highlight the associated risks of frequent NPSU for college students as well as provide future directions for examining effortful control as a potentially important mechanism linking NPSU to other risky behaviors.

  19. Students’ perception of frequent assessments and its relation to motivation and grades in a statistics course: a pilot study

    NARCIS (Netherlands)

    Vaessen, B.E.; van den Beemt, A.A.J.; van de Watering, G.A.; van Meeuwen, L.W.; Lemmens, A.M.C.; den Brok, P.J.

    2017-01-01

    This pilot study measures university students’ perceptions of graded frequent assessments in an obligatory statistics course using a novel questionnaire. Relations between perceptions of frequent assessments, intrinsic motivation and grades were also investigated. A factor analysis of the

  20. Characteristics of women who frequently under report their energy intake: a doubly labelled water study

    OpenAIRE

    Scagliusi, Fernanda Baeza [UNIFESP; Ferriolli, E.; Pfrimer, K.; Laureano, C.; Cunha, C. S. F.; Gualano, B.; Lourenco, B. H.; Lancha, A. H.

    2009-01-01

    Background/Objectives: We applied three dietary assessment methods and aimed at obtaining a set of physical, social and psychological variables that can discriminate those individuals who did not underreport ('never under-reporters'), those who underreported in one dietary assessment method ('occasional under-reporters') and those who underreported in two or three dietary assessment methods ('frequent under-reporters').Participants/Methods: Sixty-five women aged 18-57 years were recruited for...

  1. THE FREQUENT LABOUR TURNOVER IN INSURANCE COMPANIES IN NIGERIA : (Case : Nigerian Insurance sector)

    OpenAIRE

    Onashile, Ademola

    2012-01-01

    The essence of this thesis is to ascertain the causes, effects and solutions to the frequent labour turnover in the Nigerian insurance companies. Incessant labour turnover has become a phenomenon which many insurance companies have been vehemently battling with as this has undermined their potentials and strengths. The research methodology adopted is the qualitative method which involves the use of telephone interview with the aid of a voice recorder gadget. Therefore, the telepho...

  2. Frequent use of household cleaning products is associated with rhinitis in Chinese children.

    Science.gov (United States)

    Liu, Xudong; Lao, Xiang Qian; Wong, Claudie Chiu-Yi; Tan, Lixing; Zhang, Zilong; Wong, Tze Wai; Tse, Lap-Ah; Lau, Arthur P S; Yu, Ignatius T S

    2016-09-01

    Despite the popular use of household cleaning products worldwide, there is no published study investigating the health effects of these products on rhinitis in children. We sought to investigate the household use of cleaning products and rhinitis patterns in Chinese children. A total of 2299 children were recruited from 21 primary schools with wide geographic coverage in Hong Kong. Self-administered questionnaires were completed by parents/guardians to collect detailed information on respiratory symptoms and household use of 14 types of chemical cleaning products, as well as clean water. Students were categorized into 4 mutually exclusive rhinitis patterns (never, occasional, frequent, and persistent). The total chemical burden (TCB) score was used as the exposure indicator by calculating the total time of exposure to the 14 cleaning products. Multinomial logistic regression was used to assess the relationship between rhinitis patterns and the use of household cleaning products. Every 10-unit increment of TCB score was associated with an increase in the odds of occasional (odds ratio [OR], 1.21; 95% CI, 1.05-1.41), frequent (OR, 1.36; 95% CI, 1.13-1.60), and persistent (OR, 1.21; 95% CI, 1.01-1.56) rhinitis after adjustment for a wide range of potential confounders. Compared with the children within the lowest tertile of TCB scores, the adjusted ORs of occasional, frequent, and persistent rhinitis in children within the highest tertile were 1.29 (95% CI, 1.01-1.65), 1.97 (95% CI, 1.40-2.76), and 1.67 (95% CI, 1.10-2.54), respectively. Frequent use of chemical cleaning products at home is associated with an increase in the odds of rhinitis in Chinese primary school children. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  3. Retrieval program system of Chinese Evaluated (frequently useful) Nuclear Decay Database

    International Nuclear Information System (INIS)

    Huang Xiaolong; Zhou Chunmei

    1995-01-01

    The Chinese Evaluated (frequently useful) Nuclear Decay Database has been set up in MICRO-VAX-11 computer at Chinese Nuclear Data Center (CNDC). For users' convenience, the retrieval program system of the database is written. Retrieval can be carried out for one nucleus or multi-nucleus. The retrieved results can be displayed on terminal screen or output to M3081 printer and laser printer in ENSDF format, table report or scheme diagrams

  4. TOPICAL IMMUNOCORRECTION IN PROPHYLAXIS AND TREATMENT OF FREQUENTLY AND LONG AILING CHILDREN

    Directory of Open Access Journals (Sweden)

    Ye. A. Vishneva

    2011-01-01

    Full Text Available Treatment and prophylaxis of acute respiratory infections remain serious social and economical problem. Modern medicine estimates immunomodulators as one of promising methods of treatment and preventing of acute respiratory infections (ARI especially in frequently and long ailing children. Prophylactic administration of immunomodulators allows decreasing the risk of recurrent ARI, and treatment with these drugs in acute phase shortens terms of a disease and compensates immunosuppression.

  5. Risk factors for frequent readmissions and barriers to transplantation in patients with cirrhosis.

    Directory of Open Access Journals (Sweden)

    Swaytha Ganesh

    Full Text Available Hospital readmission rate is receiving increasing regulatory scrutiny. Patients with cirrhosis have high hospital readmissions rates but the relationship between frequent readmissions and barriers to transplantation remains unexplored. The goal of this study was to determine risk factors for frequent readmissions among patients with cirrhosis and identify barriers to transplantation in this population.We retrospectively reviewed medical records of 587 patients with a confirmed diagnosis of cirrhosis admitted to a large tertiary care center between May 1, 2008 and May 1, 2009. Demographics, clinical factors, and outcomes were recorded. Multivariate logistic regression was performed to identify risk factors for high readmission rates. Transplant-related factors were assessed for patients in the high readmission group.The 587 patients included in the study had 1557 admissions during the study period. A subset of 87 (15% patients with 5 or more admissions accounted for 672 (43% admissions. The factors associated with frequent admissions were non-white race (OR = 2.45, p = 0.01, diabetes (OR = 2.04, p = 0.01, higher Model for End-Stage Liver Disease (MELD score (OR = 35.10, p30 and younger age (OR = 0.98, p = 0.02. Among the 87 patients with ≥5 admissions, only 14 (16% underwent liver transplantation during the study period. Substance abuse, medical co-morbidities, and low (<15 MELD scores were barriers to transplantation in this group.A small group of patients with cirrhosis account for a disproportionately high number of hospital admissions. Interventions targeting this high-risk group may decrease frequent hospital readmissions and increase access to transplantation.

  6. Cerebral venous thrombosis study by magnetic resonance. A not frequent pathology

    International Nuclear Information System (INIS)

    Nagel, J.; Miralles, S.; Singerman, L.; Neuman, J.

    2007-01-01

    The cerebral venous thrombosis constitutes a neurological disorder not frequent, potentially reversible with a early diagnosis. Exist multiple causative factors and its clinical manifestation is diverse, for which the images studies represents the first diagnostic when it is clinically suspected. The intention of the work is to carry out a bibliographical review of the cerebral venous thrombosis and to show the sequences for magnetic nuclear resonance for the diagnosis [es

  7. Sialorrhoea: How to Manage a Frequent Complication of Motor Neuron Disease

    OpenAIRE

    Andrea Pellegrini; Christian Lunetta; Carlo Ferrarese; Lucio Tremolizzo

    2015-01-01

    Sialorrhoea, the unintentional loss of saliva through the mouth, is the frequent complication of neurological disorders affecting strength or coordination of oropharyngeal muscles, such as motor neuron disease/amyotrophic lateral sclerosis (MND/ALS) or Parkinson’s disease. Sialorrhoea might affect up to 42% of ALS patients, with almost half of them having poorly managed symptoms. Sialorrhoea can impair patients’ social life, while dermatological complications, such as skin rashes, may arise d...

  8. [Utilization of antibiotics according to most frequent indications at Hungarian hospitals and results of surveys].

    Science.gov (United States)

    Ternák, G; Almási, I

    1997-05-25

    Antibiotic utilisation of 8 Hungarian hospitals was analyzed examining the case histories of patients who were discharged between January 1 and 31, 1995. Usage of antibiotics in the most frequent indications is reported in this paper. Majority of the prescriptions for the treatment of upper and lower respiratory tract infections were broad spectrum beta lactams. Higher rate of penicillin usage was found only in tonsillitis cases. Besides II. generation cephalosporins (22.7% of 730 prescriptions), beta-lactamase inhibitor + aminopenicillin combinations (13.4%) and III. generation cephalosporins (9.5%) considerable quantity of aminoglycosides (14.9%) and quinolones (9.5%) were found in pneumonia. Relatively high rate of aminoglycosides in the treatment of lower respiratory infections is inconsistent with therapeutic guidelines in force. Co-trimoxazol and quinolones were most frequently prescribed for the treatment of lower urinary tract infections. Traditional urodesinficients were on the first place only at one hospital. Treatment of frequently occurring nosocomial infections was compared with those of community acquired at the same site. There was not significant difference in the utilisation rates of the most of antibiotic groups regarding place of disease acquisition. 44% of the 1373 prescriptions for perioperative profilaxis was indicated for clean operations where benefit of antibiotic administration is questionable. Duration of antibiotic profilaxis was more than 48 hours in 59% of prescriptions. Drugs most frequently used for perioperative profilaxis were II. generation cephalosporins (23.7%), metronidazol (16.7%), aminoglycosides (9.6%) and III. generation cephalosporines (9.6%). The authors compare their results to the literature. They suggest the setting up of "infection control committees" to organise the antibiotic policies in hospitals.

  9. The Trump Administrations March 2017 Defense Budget Proposals: Frequently Asked Questions

    Science.gov (United States)

    2017-04-03

    The Trump Administration’s March 2017 Defense Budget Proposals: Frequently Asked Questions Pat Towell Specialist in U.S. Defense Policy and...Budget Lynn M. Williams Analyst in U.S. Defense Budget Policy April 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44806 The Trump ...8 The Trump Administration’s March 2017 Defense Budget Proposals: FAQs Congressional Research Service 1 Introduction On

  10. Smoked cannabis' psychomotor and neurocognitive effects in occasional and frequent smokers.

    Science.gov (United States)

    Desrosiers, Nathalie A; Ramaekers, Johannes G; Chauchard, Emeline; Gorelick, David A; Huestis, Marilyn A

    2015-05-01

    Δ9-Tetrahydrocannabinol (THC), the primary psychoactive constituent in cannabis, impairs psychomotor performance, cognition and driving ability; thus, driving under the influence of cannabis is a public safety concern. We documented cannabis' psychomotor, neurocognitive, subjective and physiological effects in occasional and frequent smokers to investigate potential differences between these smokers. Fourteen frequent (≥4x/week) and 11 occasional (cannabis smokers entered a secure research unit ∼19 h prior to smoking one 6.8% THC cigarette. Cognitive and psychomotor performance was evaluated with the critical tracking (CTT), divided attention (DAT), n-back (working memory) and Balloon Analog Risk (BART) (risk-taking) tasks at -1.75, 1.5, 3.5, 5.5 and 22.5 h after starting smoking. GLM (General Linear Model) repeated measures ANOVA was utilized to compare scores. Occasional smokers had significantly more difficulty compensating for CTT tracking error compared with frequent smokers 1.5 h after smoking. Divided attention performance declined significantly especially in occasional smokers, with session × group effects for tracking error, hits, false alarms and reaction time. Cannabis smoking did not elicit session × group effects on the n-back or BART. Controlled cannabis smoking impaired psychomotor function, more so in occasional smokers, suggesting some tolerance to psychomotor impairment in frequent users. These data have implications for cannabis-associated impairment in driving under the influence of cannabis cases. Published by Oxford University Press 2015. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  11. Coital frequency and infertility: which male factors predict less frequent coitus among infertile couples?

    Science.gov (United States)

    Perlis, Nathan; Lo, Kirk C; Grober, Ethan D; Spencer, Leia; Jarvi, Keith

    2013-08-01

    To determine the coital frequency among infertile couples and which factors are associated with less frequent coitus. Cross-sectional study. Tertiary-level male infertility clinic. A total of 1,298 infertile men. Administration of computer-based survey, semen analysis, and serum hormone evaluation. Monthly coital frequency. A total of 1,298 patients presented to clinic for infertility consultation and completed the computer-based survey. The median male age was 35 years (interquartile range [IQR] 32-39 years) and the median duration of infertility was 2 years (IQR 1-4 years) before consultation. Median monthly coital frequency was seven (IQR 5-10; range 0-40); 24% of couples were having intercourse ≤ 4 times per month. Overall, 0.6%, 2.7%, 4.8%, 5.8%, and 10.8% of the men reported having intercourse 0, 1, 2, 3, and 4 times per month, respectively. When simultaneously taking into account the influence of age, libido, erectile function, and semen volume on coital frequency, older patients had 1.05 times higher odds (per year of age) of less frequent coitus (odds ratio 1.05, 95% confidence interval 1.03-1.08). In addition, patients with better erectile function had 1.12 times higher odds (per point on Sexual Health Inventory for Men scale) of more frequent coitus (odds ratio 1.12, 95% confidence interval 1.09-1.18). Similar to the general population, most infertile couples report having coitus more than four times per month. Older male age and erectile dysfunction are independent risk factors for less frequent coitus among infertile men, which could have an impact on fertility. Coital frequency should be considered in infertility assessments. Copyright © 2013 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  12. 2016 Workplace and Gender Relations Survey of Active Duty Members: Frequently Asked Questions

    Science.gov (United States)

    2017-05-01

    outstanding research that has had a clear impact on improving policy decisions practice or discourse, either in the public or private sectors .” 6. What...2017 2016 Workplace and Gender Relations Survey of Active Duty Members 433 | OPA Frequently Asked Questions 2016 Workplace and Gender Relations...OPA), has been conducting surveys of gender issues for the active duty military since 1988. RSSC uses scientific state of the art statistical

  13. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  14. Secure Group Formation Protocol for a Medical Sensor Network Prototype

    DEFF Research Database (Denmark)

    Andersen, Jacob

    2009-01-01

    , and experience from user workshops and observations of clinicians at work on a hospital ward show that if the security mechanisms are not well designed, the technology is either rejected altogether, or they are circumvented leaving the system wide open to attacks. Our work targets the problem of designing......Designing security mechanisms such as privacy and access control for medical sensor networks is a challenging task; as such systems may be operated very frequently, at a quick pace, and at times in emergency situations. Understandably, clinicians hold extra unproductive tasks in low regard...... wireless sensors to be both secure and usable by exploring different solutions on a fully functional prototype platform. In this paper, we present an Elliptic Curve Cryptography (ECC) based protocol, which offers fully secure sensor set-up in a few seconds on standard (Telos) hardware. We evaluate...

  15. Does the Number of Pharmacies a Patient Frequents Affect Adherence to Statins?

    Science.gov (United States)

    Christie, Russell; Sketris, Ingrid; Andreou, Pantalis; Holbrook, Anne; Levy, Adrian; Tamim, Hala

    2017-05-06

    We hypothesized that medication adherence is affected by the number of pharmacies a patient frequents. The objective was to estimate the strength of association between the number of pharmacies a patient frequents and adherence to statins. Using administrative data from the Nova Scotia Seniors' Pharmacare program, a retrospective cohort study was conducted among subjects aged 65 years and older first dispensed statin between 1998 and 2008. The Usual Provider of Care (UPC), was defined as the number of dispensation days from the most frequented pharmacy divided by the total number of dispensation days. Estimated adherence of over 80% of the Medication Possession Ratio was defined as adherent. Data were analyzed using hierarchical linear regression. The cohort of 25,641 subjects was 59% female with a mean age of 74 years. During follow-up, subjects filled prescriptions in a median of 2 (mean = 2; standard deviation = 0.88) pharmacies and visited pharmacies a median of 28 (mean = 30) times. During that time, 61% of patients used one pharmacy exclusively. Among subjects using 1 pharmacy, 59% were adherent while 58% using more than one pharmacy were adherent. However, upon adjustment for differences in distributions of age, sex, and other confounders, subjects who used more than one pharmacy had 10% decreased odds of statin adherence (odds ratio: 0.90, 95% confidence interval: 0.86-0.96). These results were robust in sensitivity analyses. Among seniors newly starting statin therapy, using a single community pharmacy was modestly associated with adherence.

  16. The experiences of frequent users of crisis helplines: A qualitative interview study.

    Science.gov (United States)

    Middleton, Aves; Gunn, Jane; Bassilios, Bridget; Pirkis, Jane

    2016-11-01

    To understand why some users call crisis helplines frequently. Nineteen semi-structured telephone interviews were conducted with callers to Lifeline Australia who reported calling 20 times or more in the past month and provided informed consent. Interviews were audio-recorded and transcribed verbatim. Inductive thematic analysis was used to generate common themes. Approval was granted by The University of Melbourne Human Research Ethics Committee. Three overarching themes emerged from the data and included reasons for calling, service response and calling behaviours. Respondents called seeking someone to talk to, help with their mental health issues and assistance with negative life events. When they called, they found short-term benefits in the unrestricted support offered by the helpline. Over time they called about similar issues and described reactive, support-seeking and dependent calling behaviours. Frequent users of crisis helplines call about ongoing issues. They have developed distinctive calling behaviours which appear to occur through an interaction between their reasons for calling and the response they receive from the helpline. The ongoing nature of the issues prompting frequent users to call suggests that a service model that includes a continuity of care component may be more efficient in meeting their needs. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. Discovering frequently recurring movement sequences in team-sport athlete spatiotemporal data.

    Science.gov (United States)

    Sweeting, Alice J; Aughey, Robert J; Cormack, Stuart J; Morgan, Stuart

    2017-12-01

    Athlete external load is typically analysed from predetermined movement thresholds. The combination of movement sequences and differences in these movements between playing positions is also currently unknown. This study developed a method to discover the frequently recurring movement sequences across playing position during matches. The external load of 12 international female netball athletes was collected by a local positioning system during four national-level matches. Velocity, acceleration and angular velocity were calculated from positional (X, Y) data, clustered via one-dimensional k-means and assigned a unique alphabetic label. Combinations of velocity, acceleration and angular velocity movement were compared using the Levenshtein distance and similarities computed by the longest common substring problem. The contribution of each movement sequence, according to playing position and relative to the wider data set, was then calculated via the Minkowski distance. A total of 10 frequently recurring combinations of movement were discovered, regardless of playing position. Only the wing attack, goal attack and goal defence playing positions are closely related. We developed a technique to discover the movement sequences, according to playing position, performed by elite netballers. This methodology can be extended to discover the frequently recurring movements within other team sports and across levels of competition.

  18. A scalable method for identifying frequent subtrees in sets of large phylogenetic trees.

    Science.gov (United States)

    Ramu, Avinash; Kahveci, Tamer; Burleigh, J Gordon

    2012-10-03

    We consider the problem of finding the maximum frequent agreement subtrees (MFASTs) in a collection of phylogenetic trees. Existing methods for this problem often do not scale beyond datasets with around 100 taxa. Our goal is to address this problem for datasets with over a thousand taxa and hundreds of trees. We develop a heuristic solution that aims to find MFASTs in sets of many, large phylogenetic trees. Our method works in multiple phases. In the first phase, it identifies small candidate subtrees from the set of input trees which serve as the seeds of larger subtrees. In the second phase, it combines these small seeds to build larger candidate MFASTs. In the final phase, it performs a post-processing step that ensures that we find a frequent agreement subtree that is not contained in a larger frequent agreement subtree. We demonstrate that this heuristic can easily handle data sets with 1000 taxa, greatly extending the estimation of MFASTs beyond current methods. Although this heuristic does not guarantee to find all MFASTs or the largest MFAST, it found the MFAST in all of our synthetic datasets where we could verify the correctness of the result. It also performed well on large empirical data sets. Its performance is robust to the number and size of the input trees. Overall, this method provides a simple and fast way to identify strongly supported subtrees within large phylogenetic hypotheses.

  19. THE FREQUENT USE OF TEACHING STRATEGIES/METHODS AMONG TEACHERS ACCORDING TO THE TEACHER CANDIDATES OBSERVATION

    Directory of Open Access Journals (Sweden)

    Mukaddes SAKALLI

    2007-06-01

    Full Text Available The aim of this study is to show the frequent use of teaching stratergies/methods amongteachers which has been observed by teacher candidates currently undergoing their own field/area teaching program.This study undertakes the general research model and the tools used to obtain the necessary data are personalinformation form and a questionaire. “Teachers frequent use of teaching methods/stratergies” to obtain necessarydata a 4 likert scale type of questionaire has been used. The scale developed on behalf of the researcher involves 35teaching methods/stratergies.The data obtained through 71 quetionaires where evaluated from 4 (always and 1(none as points and has been evaluated through the SPSS package program. In addition, the resultsof the data havebeen analysed through the following techniques: percentage (%, average (X and standard deviation (SS.According to the observations made by the teacher candidates the following teaching methods/stratergies wereundertaken by the teachers according to thier teaching field: lecturing, question-answer method were always used,homework, practice in the classroom, problem solving, showing and practicing methods were frequently used,project work, anaylsing example situations, debates, similarity, computer based education, observing privatetutorials, eduational games, cooperative learning, brainstroming, field trips and reflecting/miroring situations,group/team work, experiment, role play, micro-learning technique, statement, speech,meeting, display, drama,conference, formal debates, sempozium, seminar, panel, umbrella technique, forum and opposite panel

  20. Esomeprazole treatment of frequent heartburn: two randomized, double-blind, placebo-controlled trials.

    Science.gov (United States)

    Peura, David A; Traxler, Barry; Kocun, Christopher; Lind, Tore

    2014-07-01

    To determine the efficacy of a 14-day regimen of esomeprazole 20 mg for the treatment of frequent heartburn in subjects who are likely to self-treat with over-the-counter medications without consulting a health care provider. Adults with frequent heartburn ≥ 2 days per week in the past 4 weeks were randomly assigned to 14-day double-blind treatment with esomeprazole 20 mg once daily or placebo in 2 identical multicenter studies (ClinicalTrials.gov identifiers: NCT01370525, NCT01370538). The primary efficacy outcome was percentage of heartburn-free 24-hour days across 14 days. Secondary efficacy outcomes included heartburn resolution, defined as heartburn ≤ 2 days over 14 days, and percentages of subjects reporting ≤ 1 day with heartburn in the first and final weeks of treatment. Subjects recorded data in daily self-assessment diaries. The percentage of heartburn-free 24-hour days over 14 days was significantly higher (P heartburn resolution over 14 days and in the first and final weeks compared with placebo. Within the first 4 days, the proportion of subjects with heartburn-free days was significantly greater with esomeprazole 20 mg versus placebo. Treatment was generally well tolerated, with a safety pattern consistent with the known profile for esomeprazole. A 14-day regimen of esomeprazole 20 mg once daily was effective for treating frequent heartburn in subjects who are likely to self-treat with over-the-counter medications.

  1. Absence of frequent herpesvirus transmission in a nonhuman primate predator-prey system in the wild.

    Science.gov (United States)

    Murthy, Sripriya; Couacy-Hymann, Emmanuel; Metzger, Sonja; Nowak, Kathrin; De Nys, Helene; Boesch, Christophe; Wittig, Roman; Jarvis, Michael A; Leendertz, Fabian H; Ehlers, Bernhard

    2013-10-01

    Emergence of viruses into the human population by transmission from nonhuman primates (NHPs) represents a serious potential threat to human health that is primarily associated with the increased bushmeat trade. Transmission of RNA viruses across primate species appears to be relatively frequent. In contrast, DNA viruses appear to be largely host specific, suggesting low transmission potential. Herein, we use a primate predator-prey system to study the risk of herpesvirus transmission between different primate species in the wild. The system was comprised of western chimpanzees (Pan troglodytes verus) and their primary (western red colobus, Piliocolobus badius badius) and secondary (black-and-white colobus, Colobus polykomos) prey monkey species. NHP species were frequently observed to be coinfected with multiple beta- and gammaherpesviruses (including new cytomegalo- and rhadinoviruses). However, despite frequent exposure of chimpanzees to blood, organs, and bones of their herpesvirus-infected monkey prey, there was no evidence for cross-species herpesvirus transmission. These findings suggest that interspecies transmission of NHP beta- and gammaherpesviruses is, at most, a rare event in the wild.

  2. Mild traumatic brain injury diagnosis frequently remains unrecorded in subjects with craniofacial fractures.

    Science.gov (United States)

    Puljula, Jussi; Cygnel, Hanna; Mäkinen, Elina; Tuomivaara, Veli; Karttunen, Vesa; Karttunen, Ari; Hillbom, Matti

    2012-12-01

    Traumatic brain injuries (TBI) in subjects with craniofacial fractures are usually diagnosed by emergency room physicians. We investigated how often TBI remains unrecorded in these subjects, and whether diagnostic accuracy has improved after the implementation of new TBI guidelines. All subjects with craniofacial fractures admitted to Oulu University Hospital in 1999 and in 2007 were retrospectively identified. New guidelines for improving the diagnostic accuracy of TBI were implemented between 2000 and 2006. Clinical symptoms of TBI were gathered from notes on hospital charts and compared to the recorded diagnoses at discharge. Logistic regression was used to identify independent predictors for TBI to remain unrecorded. Of 194 subjects with craniofacial fracture, 111(57%) had TBI, 40 in 1999 and 71 in 2007. Fifty-one TBIs (46%) remained unrecorded at discharge, 48 being mild and 3 moderate-to-severe. Subjects with unrecorded TBI were significantly less frequently referred to follow-up visits. Failures to record the TBI diagnosis were less frequent (29/71, 41%) in 2007 than in 1999 (22/40, 55%), but the difference was not statistically significant. The most significant independent predictor for this failure was the clinical specialty (other than neurology/neurosurgery) of the examining physician (palcohol intoxication did not hamper the diagnosis of TBI. TBIs remain frequently unrecorded in subjects with craniofacial fractures. Recording of mild TBI slightly but insignificantly improved after the implementation of new guidelines. Copyright © 2012 Elsevier Ltd. All rights reserved.

  3. Geographical Distribution of the Most Frequent Mutations of Familial Mediterranean fever in the World

    Directory of Open Access Journals (Sweden)

    Soraya Hadi

    2016-09-01

    Full Text Available Background and objectives: Familial Mediterranean Fever (FMF is an autosomal recessive disease. Generally, the Mediterranean basin is the region where the first cases of FMF have been identified. The gene responsible for FMF is gene MEFV. Disease occurs due to mutations in the gene MEFV. Our aim was to determine the geographical distribution of the most frequent mutations in Familial Mediterranean Fever Disease in the world. Material and Methods: In this study, databases including Google Scholar, PubMed, Medline, Ovid, IranMedex, Irandoc, SID, Magiran and published papers were searched with no limitation in time. Then, all collected studies without any limitation were assessed to determine relevant studies. At the end, world map of the most frequent mutations of FMF was generated by Geographical Information System (GIS software. Results: Although more than 290 mutations of the MEFV gene have been described, only four mutations (M694V, M694I, V726A, and E148Q were prevalent among patients with FMF. Conclusion: The most frequent mutation associated with FMF mutation is M694V all over the world. E148Q mutation was found to be with mild clinical relevance.

  4. Frequent hemodialysis with NxStage system in pediatric patients receiving maintenance hemodialysis.

    Science.gov (United States)

    Goldstein, Stuart L; Silverstein, Douglas M; Leung, Jocelyn C; Feig, Daniel I; Soletsky, Beth; Knight, Cathy; Warady, Bradley A

    2008-01-01

    Recent evidence from adult hemodialysis (HD) patient studies reveal improved biochemical control and reported health-related quality of life after transition from conventional thrice weekly to daily home maintenance HD treatment. Published pediatric frequent dialysis experiences demonstrate similar improvement but all used conventional HD machines, which employ a treated municipal water supply, thereby frequently exposing patients to proinflammatory components. We report our pediatric experience with six-times-weekly HD using the NxStage system, which uses sterile dialysis fluid to provide dialysis in the home or center setting. Four patients (weight range 38-61.4 kg) completed the 16-week study. Patients exhibited progressive reductions in casual pretreatment systolic and diastolic blood pressures, discontinuation of antihypertensive medications, and decreased blood pressure load by ambulatory blood pressure monitoring. Mean serum phosphorus improved without change in phosphorus binder medication, and all three patients with a normalized protein catabolic rate 1.1 g/kg per day. Patients reported no adverse effects. Variable changes in proinflammatory cytokine levels were observed. We suggest that frequent HD with the NxStage system be considered for children who would benefit from home-based maintenance dialysis.

  5. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  6. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  7. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  8. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  9. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  10. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  11. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  12. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  13. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  14. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  15. Association between frequent use of nonsteroidal anti-inflammatory drugs and breast cancer

    Directory of Open Access Journals (Sweden)

    Rajan Raghu

    2005-12-01

    Full Text Available Abstract Background Eighty percent of all breast cancers and almost 90% of breast cancer deaths occur among post-menopausal women. We used a nested case control design to examine the association between nonsteroidal anti-inflammatory drug (NSAID use and breast cancer occurrence among women over 65 years of age. The cyclooxygenase (COX-2 enzyme is expressed more in breast cancers than in normal breast tissue. COX-2 inhibition may have a role in breast cancer prevention. Methods In the Canadian province of Quebec, physician services are covered through a governmental insurance plan. Medication costs are covered for those ≥ 65 years of age and a publicly funded screening program for breast cancer targets all women 50 years of age or older. We obtained encrypted data from these insurance databases on all women ≥ 65 years of age who filled a prescription for COX-2 inhibitors, non-selective NSAIDs (ns-NSAIDs, aspirin, or acetaminophen between January 1998 and December 2002. Cases were defined as those women who have undergone mammography between April 2001 and June 2002 and had a diagnosis of breast cancer within six months following mammography. Controls included those who have undergone mammography between April 2001 and June 2002 without a diagnosis of any cancer during the six months following mammography. The exposure of interest, frequent NSAID use, was defined as use of ns-NSAIDs and/or COX-2 inhibitors for ≥ 90 days during the year prior to mammography. Frequent use served as a convenient proxy for long term chronic use. Results We identified 1,090 cases and 44,990 controls. Cases were older and more likely to have breast cancer risk factors. Logistic regression models adjusting for potential confounders showed that frequent use of ns-NSAIDs and/or COX-2 inhibitors was associated with a lower risk of breast cancer (OR: 0.75, 95% confidence interval 0.64–0.89. Results were similar for COX-2 inhibitors (0.81, 0.68–0.97 and ns-NSAIDs (0

  16. Frequent Experience of LGBQ Microaggression on Campus Associated With Smoking Among Sexual Minority College Students.

    Science.gov (United States)

    Ylioja, Thomas; Cochran, Gerald; Woodford, Michael R; Renn, Kristen A

    2018-02-07

    Lesbian, gay, bisexual, or queer/questioning (LGBQ) microaggressions refer to often-unintentional insults, assaults, and invalidations that denigrate sexual minorities. While experiencing hostile discrimination and violence has previously been associated with elevated rates of smoking cigarettes for LGBQ college students, the relationship between LGBQ microaggressions and smoking is unknown. Data from a national anonymous online survey of sexual and gender minority college students were used to examine the relationship between past month cigarette smoking and interpersonal LGBQ microaggressions. Multivariable logistic regression assessed the relationship between smoking and frequent (chronic) experiences of microaggressions, using a hierarchical procedure to control for demographics, predictors of smoking, and academic factors. Past year frequent LGBQ microaggression was reported by 48% of respondents and was more common among students who smoked in past 30 days. Experiencing past year physical violence was reported by 15% and did not differ by smoking status. Past year frequent experience of microaggressions was associated with increased odds of 1.72 (95% CI 1.03-2.87) for past 30-day smoking after adjusting for age, gender, race, socioeconomic indicators, alcohol misuse, physical violence, as well as academic stress and engagement. The results indicate that frequently experiencing LGBQ microaggressions is a risk factor for LGBQ college students smoking cigarettes. The mechanisms underlying this relationship require additional research, as does identifying positive coping strategies and institutional strategies to address LGBQ microaggressions on campuses. Tobacco control efforts should consider the impact of microaggression on the social environment for the prevention and treatment of tobacco use among LGBQ individuals. Microaggressions related to sexual minority identity include subtle forms of discrimination experienced during daily interactions that can create

  17. Frequent Use of Emergency Departments by the Elderly Population When Continuing Care Is Not Well Established.

    Directory of Open Access Journals (Sweden)

    Jacopo M Legramante

    Full Text Available The elderly, who suffer from multiple chronic diseases, represent a substantial proportion of Emergency Department (ED frequent users, thus contributing to ED overcrowding, although they could benefit from other health care facilities, if those were available. The aim of this study was to evaluate and characterize hospital visits of older patients (age 65 or greater to the ED of a university teaching hospital in Rome from the 1st of January to the 31st of December 2014, in order to identify clinical and social characteristics potentially associated with "elderly frequent users".A retrospective study was performed during the calendar year 2014 (1st January 2014 - 31st December 2014 analyzing all ED admissions to the University Hospital of Rome Tor Vergata. Variables collected included age, triage code, arrival data, discharge diagnosis, and visit outcome. We performed a risk analysis using univariate binary logistic regression models.A total number of 38,016 patients accessed the ED, generating 46,820 accesses during the study period, with an average of 1.23 accesses for patient. The elderly population represented a quarter of the total ED population and had an increased risk of frequent use (OR 1.5: CI 1.4-1.7 and hospitalization (OR 3.8: CI 3.7-4. Moreover, they showed a greater diagnostic complexity, as demonstrated by the higher incidence of yellow and red priority codes compared to other ED populations (OR 3.1: CI 2.9-3.2.Older patients presented clinical and social characteristics related to the definition of "elderly frail frequent users". The fact that a larger number of hospitalizations occurred in such patients is indirect evidence of frailty in this specific population, suggesting that hospital admissions may be an inappropriate response to frailty, especially when continued care is not established.Enhancement of continuity of care, establishment of a tracking system for those who are at greater risk of visiting the ED and evaluating

  18. Frequent Use of Emergency Departments by the Elderly Population When Continuing Care Is Not Well Established.

    Science.gov (United States)

    Legramante, Jacopo M; Morciano, Laura; Lucaroni, Francesca; Gilardi, Francesco; Caredda, Emanuele; Pesaresi, Alessia; Coscia, Massimo; Orlando, Stefano; Brandi, Antonella; Giovagnoli, Germano; Di Lecce, Vito N; Visconti, Giuseppe; Palombi, Leonardo

    2016-01-01

    The elderly, who suffer from multiple chronic diseases, represent a substantial proportion of Emergency Department (ED) frequent users, thus contributing to ED overcrowding, although they could benefit from other health care facilities, if those were available. The aim of this study was to evaluate and characterize hospital visits of older patients (age 65 or greater) to the ED of a university teaching hospital in Rome from the 1st of January to the 31st of December 2014, in order to identify clinical and social characteristics potentially associated with "elderly frequent users". A retrospective study was performed during the calendar year 2014 (1st January 2014 - 31st December 2014) analyzing all ED admissions to the University Hospital of Rome Tor Vergata. Variables collected included age, triage code, arrival data, discharge diagnosis, and visit outcome. We performed a risk analysis using univariate binary logistic regression models. A total number of 38,016 patients accessed the ED, generating 46,820 accesses during the study period, with an average of 1.23 accesses for patient. The elderly population represented a quarter of the total ED population and had an increased risk of frequent use (OR 1.5: CI 1.4-1.7) and hospitalization (OR 3.8: CI 3.7-4). Moreover, they showed a greater diagnostic complexity, as demonstrated by the higher incidence of yellow and red priority codes compared to other ED populations (OR 3.1: CI 2.9-3.2). Older patients presented clinical and social characteristics related to the definition of "elderly frail frequent users". The fact that a larger number of hospitalizations occurred in such patients is indirect evidence of frailty in this specific population, suggesting that hospital admissions may be an inappropriate response to frailty, especially when continued care is not established. Enhancement of continuity of care, establishment of a tracking system for those who are at greater risk of visiting the ED and evaluating fragile

  19. Frequent gene conversion events between the X and Y homologous chromosomal regions in primates

    Directory of Open Access Journals (Sweden)

    Hirai Hirohisa

    2010-07-01

    Full Text Available Abstract Background Mammalian sex-chromosomes originated from a pair of autosomes. A step-wise cessation of recombination is necessary for the proper maintenance of sex-determination and, consequently, generates a four strata structure on the X chromosome. Each stratum shows a specific per-site nucleotide sequence difference (p-distance between the X and Y chromosomes, depending on the time of recombination arrest. Stratum 4 covers the distal half of the human X chromosome short arm and the p-distance of the stratum is ~10%, on average. However, a 100-kb region, which includes KALX and VCX, in the middle of stratum 4 shows a significantly lower p-distance (1-5%, suggesting frequent sequence exchanges or gene conversions between the X and Y chromosomes in humans. To examine the evolutionary mechanism for this low p-distance region, sequences of a corresponding region including KALX/Y from seven species of non-human primates were analyzed. Results Phylogenetic analysis of this low p-distance region in humans and non-human primate species revealed that gene conversion like events have taken place at least ten times after the divergence of New World monkeys and Catarrhini (i.e., Old World monkeys and hominoids. A KALY-converted KALX allele in white-handed gibbons also suggests a possible recent gene conversion between the X and Y chromosomes. In these primate sequences, the proximal boundary of this low p-distance region is located in a LINE element shared between the X and Y chromosomes, suggesting the involvement of this element in frequent gene conversions. Together with a palindrome on the Y chromosome, a segmental palindrome structure on the X chromosome at the distal boundary near VCX, in humans and chimpanzees, may mediate frequent sequence exchanges between X and Y chromosomes. Conclusion Gene conversion events between the X and Y homologous regions have been suggested, mainly in humans. Here, we found frequent gene conversions in the

  20. An novel frequent probability pattern mining algorithm based on circuit simulation method in uncertain biological networks

    Science.gov (United States)

    2014-01-01

    Background Motif mining has always been a hot research topic in bioinformatics. Most of current research on biological networks focuses on exact motif mining. However, due to the inevitable experimental error and noisy data, biological network data represented as the probability model could better reflect the authenticity and biological significance, therefore, it is more biological meaningful to discover probability motif in uncertain biological networks. One of the key steps in probability motif mining is frequent pattern discovery which is usually based on the possible world model having a relatively high computational complexity. Methods In this paper, we present a novel method for detecting frequent probability patterns based on circuit simulation in the uncertain biological networks. First, the partition based efficient search is applied to the non-tree like subgraph mining where the probability of occurrence in random networks is small. Then, an algorithm of probability isomorphic based on circuit simulation is proposed. The probability isomorphic combines the analysis of circuit topology structure with related physical properties of voltage in order to evaluate the probability isomorphism between probability subgraphs. The circuit simulation based probability isomorphic can avoid using traditional possible world model. Finally, based on the algorithm of probability subgraph isomorphism, two-step hierarchical clustering method is used to cluster subgraphs, and discover frequent probability patterns from the clusters. Results The experiment results on data sets of the Protein-Protein Interaction (PPI) networks and the transcriptional regulatory networks of E. coli and S. cerevisiae show that the proposed method can efficiently discover the frequent probability subgraphs. The discovered subgraphs in our study contain all probability motifs reported in the experiments published in other related papers. Conclusions The algorithm of probability graph isomorphism

  1. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  2. Cluster chain based energy efficient routing protocol for moblie WSN

    Directory of Open Access Journals (Sweden)

    WU Ziyu

    2016-04-01

    Full Text Available With the ubiquitous smart devices acting as mobile sensor nodes in the wireless sensor networks(WSNs to sense and transmit physical information,routing protocols should be designed to accommodate the mobility issues,in addition to conventional considerations on energy efficiency.However,due to frequent topology change,traditional routing schemes cannot perform well.Moreover,existence of mobile nodes poses new challenges on energy dissipation and packet loss.In this paper,a novel routing scheme called cluster chain based routing protocol(CCBRP is proposed,which employs a combination of cluster and chain structure to accomplish data collection and transmission and thereafter selects qualified cluster heads as chain leaders to transmit data to the sink.Furthermore,node mobility is handled based on periodical membership update of mobile nodes.Simulation results demonstrate that CCBRP has a good performance in terms of network lifetime and packet delivery,also strikes a better balance between successful packet reception and energy consumption.

  3. Development of a Competent and Trouble Free DNA Isolation Protocol for Downstream Genetic Analyses in Glycine Species

    Directory of Open Access Journals (Sweden)

    Muhammad Amjad Nawaz

    2016-08-01

    Full Text Available Extraction of deoxyribose nucleic acid (DNA from plants is preliminary step in molecular biology. Fast and cost effective genomic DNA isolation from Glycine species for downstream application is a major bottleneck. Here we report a high throughput and trouble free method for genomic DNA extraction from leaf and seeds of Glycine species with high quality and quantity. Protocol reports the optimization by employing different concentrations of CTAB and PVP in extraction buffer. Efficiency of optimized protocol was compared with frequently used DNA extraction methods. Wide adoptability and utility of this protocol was confirmed by DNA extraction from leaves as well as seeds of G. max, G. soja, G. tomentella and G. latifolia. Extracted DNA was successfully subjected to PCR amplification of five microsatellite markers and four putative glycosyltransferase genes. DNA extraction protocol is reproducible, trouble free, rapid and can be adopted for plant molecular biology applications.

  4. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  5. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  6. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  7. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  8. The cumulative effect of multiple critical care protocols on length of stay in a geriatric trauma population.

    Science.gov (United States)

    Frederickson, Tiffany A; Renner, Catherine Hackett; Swegle, James R; Sahr, Sheryl M

    2013-01-01

    The elderly individuals are the most rapidly growing cohort within the US population, and a corresponding increase is being seen in elderly trauma patients. Elderly patients are more likely to have a hospital length of stay (LOS) in excess of 10 days. They account for 60% of total ICU days. Length of stay is frequently used as a proxy measure for improvement in injury outcomes, changes in quality of care, and hospital outcomes. Patient care protocols are typically created from evidence-based guidelines that serve to reduce variation in care from patient to patient. Patient care protocols have been found to positively impact patient care with reduced duration of mechanical ventilation, shorter LOS in the ICU and shorter overall hospitalization time, reduced mortality, and reduced health care costs. The following study was designed to assess the impact of the implementation of 4 patient care protocols within an elderly trauma population. We hypothesized that the implementation of these protocols would have a beneficial impact on patient care that could be measured by a decrease in hospital LOS. An archival, retrospective pretest/posttest study was performed on elderly trauma patients. The new protocols helped guide practical changes in care that resulted in a 32% decrease in LOS for our elderly trauma patients which exceeds the 25% decrease found in other studies. Additionally, the "Other" category for each variable was less frequently used in the post-protocol phase than in the pre-protocol phase, suggesting a spillover effect on the level of detail recorded in the patient chart. With less variation in practices in the post-protocol phase, Injury Severity score, and admission systolic blood pressure emerged as significant predictors of LOS.

  9. Designing services for frequent attenders to the emergency department: a characterisation of this population to inform service design.

    Science.gov (United States)

    Jacob, Rebecca; Wong, Mai Luen; Hayhurst, Catherine; Watson, Peter; Morrison, Cecily

    2016-08-01

    Frequent attendance to the emergency department (ED) is a growing public health concern. Designing services for frequent attenders poses challenges, given the heterogeneous nature of this group. This was a two-part observational study identifying frequent attenders from ED records. The first stage studied trends and developed personas with emphasis on differentiating moderate frequent attenders (attending between 5 and 20 times per year) and extreme frequent attenders (attending more than 20 times). Stage 2 included a case note review of 100 consecutive frequent attenders. Results showed an increase in frequent attendance from 2.59% to 4.12% over 8 years. Moderate frequent attenders accounted for 97%. Of the 100 frequent attenders studied, 45% had medically unexplained symptoms (MUS), associated with younger age (p0.05). In conclusion, the ED is a useful hub for identifying frequent attenders with MUS, particularly among moderate frequent attenders; service design for this group should consider a 'whole-systems approach' with integration between primary and secondary care, including specialist liaison psychiatry services where appropriate. © 2016 Royal College of Physicians.

  10. Frequent sgRNA-barcode recombination in single-cell perturbation assays.

    Directory of Open Access Journals (Sweden)

    Shiqi Xie

    Full Text Available Simultaneously detecting CRISPR-based perturbations and induced transcriptional changes in the same cell is a powerful approach to unraveling genome function. Several lentiviral approaches have been developed, some of which rely on the detection of distally located genetic barcodes as an indirect proxy of sgRNA identity. Since barcodes are often several kilobases from their corresponding sgRNAs, viral recombination-mediated swapping of barcodes and sgRNAs is feasible. Using a self-circularization-based sgRNA-barcode library preparation protocol, we estimate the recombination rate to be ~50% and we trace this phenomenon to the pooled viral packaging step. Recombination is random, and decreases the signal-to-noise ratio of the assay. Our results suggest that alternative approaches can increase the throughput and sensitivity of single-cell perturbation assays.

  11. Less healthy breakfast cereals are promoted more frequently in large supermarket chains in Canada

    Directory of Open Access Journals (Sweden)

    Monique Potvin Kent

    2017-11-01

    Full Text Available Abstract Background The majority of food expenditures are made in supermarkets and this environment influences our purchasing and food intake. Breakfast cereals are frequently marketed as healthy food choices. The objective of this study was to examine the frequency of in–store promotions for cold breakfast cereals in Canadian supermarkets and to determine whether healthier or less healthy breakfast cereals are promoted more frequently. Methods Data was collected once per week over a four-week period from a convenience sample of the five largest Canadian supermarkets in the Ottawa/Gatineau area. Data collection included the number of shelf facings, promotional displays, and the cost of cereals/100 g. The UK Nutrient Profiling Model was used to determine the healthfulness of each breakfast cereal. Results 29.8% (n = 67 of the 225 unique cereals were classified as healthier and 70.2% (n = 158 were classified as less healthy. Less healthy cereals were displayed at eye level, in the profitable middle shelves, 2.9 times more frequently than healthier cereals. There were 5.3 times more breakfast cereal shelf facings, 4.2 more end cap displays, 1.7 more mid-aisle displays and 3.3 more special pricing signage for less healthy cereals compared to healthier cereals. Less healthy cereals had a significantly higher average total number of shelf facings compared to healthier cereals (t = −4.28 (280.8, p < .001. Conclusions Breakfast cereal manufacturers need to consider reformulation of their breakfast cereals to improve their healthfulness and supermarkets need to increase the marketing of healthy breakfast cereals within their stores.

  12. Transgelin gene is frequently downregulated by promoter DNA hypermethylation in breast cancer.

    Science.gov (United States)

    Sayar, Nilufer; Karahan, Gurbet; Konu, Ozlen; Bozkurt, Betul; Bozdogan, Onder; Yulug, Isik G

    2015-01-01

    CpG hypermethylation in gene promoters is a frequent mechanism of tumor suppressor gene silencing in various types of cancers. It usually occurs at early steps of cancer progression and can be detected easily, giving rise to development of promising biomarkers for both detection and progression of cancer, including breast cancer. 5-aza-2'-deoxycytidine (AZA) is a DNA demethylating and anti-cancer agent resulting in induction of genes suppressed via DNA hypermethylation. Using microarray expression profiling of AZA- or DMSO-treated breast cancer and non-tumorigenic breast (NTB) cells, we identified for the first time TAGLN gene as a target of DNA hypermethylation in breast cancer. TAGLN expression was significantly and frequently downregulated via promoter DNA hypermethylation in breast cancer cells compared to NTB cells, and also in 13/21 (61.9 %) of breast tumors compared to matched normal tissues. Analyses of public microarray methylation data showed that TAGLN was also hypermethylated in 63.02 % of tumors compared to normal tissues; relapse-free survival of patients was worse with higher TAGLN methylation; and methylation levels could discriminate between tumors and healthy tissues with 83.14 % sensitivity and 100 % specificity. Additionally, qRT-PCR and immunohistochemistry experiments showed that TAGLN expression was significantly downregulated in two more independent sets of breast tumors compared to normal tissues and was lower in tumors with poor prognosis. Colony formation was increased in TAGLN silenced NTB cells, while decreased in overexpressing BC cells. TAGLN gene is frequently downregulated by DNA hypermethylation, and TAGLN promoter methylation profiles could serve as a future diagnostic biomarker, with possible clinical impact regarding the prognosis in breast cancer.

  13. Agitation After Subarachnoid Hemorrhage: A Frequent Omen of Hospital Complications Associated with Worse Outcomes.

    Science.gov (United States)

    Reznik, Michael E; Schmidt, J Michael; Mahta, Ali; Agarwal, Sachin; Roh, David J; Park, Soojin; Frey, Hans Peter; Claassen, Jan

    2017-06-01

    Agitated delirium is frequent following acute brain injury, but data are limited in patients with subarachnoid hemorrhage (SAH). We examined incidence, risk factors, and consequences of agitation in these patients in a single-center retrospective study. We identified all patients treated with antipsychotics or dexmedetomidine from a prospective observational cohort of patients with spontaneous SAH. Agitation was confirmed by chart review. Outcomes were assessed at 12 months using the modified Rankin Scale (mRS), Telephone Interview for Cognitive Status (TICS), and Lawton IADL (Instrumental Activities of Daily Living) scores. Independent predictors were identified using logistic regression. From 309 SAH patients admitted between January 2011 and December 2015, 52 (17 %) developed agitation, frequently in the first 72 h (50 %) and in patients with Hunt-Hess grades 3-4 (12 % of grades 1-2, 28 % of grades 3-4, 8 % of grade 5). There was also a significant association between agitation and a history of cocaine use or prior psychiatric diagnosis. Agitated patients were more likely to develop multiple hospital complications; and in half of these patients, complications were diagnosed within 24 h of agitation onset. Agitation was associated with IADL impairment at 12 months (Lawton >8; p = 0.03, OR 2.7, 95 % CI, 1.1-6.8) in non-comatose patients (Hunt-Hess 1-4), but not with functional outcome (mRS >3), cognitive impairment (TICS ≤30), or ICU/hospital length of stay after controlling for other predictors. Agitation occurs frequently after SAH, especially in non-comatose patients with higher clinical grades. It is associated with the development of multiple hospital complications and may have an independent impact on long-term outcomes.

  14. Case Management Reduces Length of Stay, Charges, and Testing in Emergency Department Frequent Users

    Directory of Open Access Journals (Sweden)

    Jameel Sughair

    2018-02-01

    Full Text Available Introduction: Case management is an effective, short-term means to reduce emergency department (ED visits in frequent users of the ED. This study sought to determine the effectiveness of case management on frequent ED users, in terms of reducing ED and hospital length of stay (LOS, accrued costs, and utilization of diagnostic tests. Methods: The study consisted of a retrospective chart review of ED and inpatient visits in our hospital’s ED case management program, comparing patient visits made in the one year prior to enrollment in the program, to the visits made in the one year after enrollment in the program. We examined the LOS, use of diagnostic testing, and monetary charges incurred by these patients one year prior and one year after enrollment into case management. Results: The study consisted of 158 patients in case management. Comparing the one year prior to enrollment to the one year after enrollment, ED visits decreased by 49%, inpatient admissions decreased by 39%, the use of computed tomography imaging decreased 41%, the use of ultrasound imaging decreased 52%, and the use of radiographs decreased 38%. LOS in the ED and for inpatient admissions decreased by 39%, reducing total LOS for these patients by 178 days. ED and hospital charges incurred by these patients decreased by 5.8 million dollars, a 41% reduction. All differences were statistically significant. Conclusion: Case management for frequent users of the ED is an effective method to reduce patient visits, the use of diagnostic testing, length of stay, and cost within our institution.

  15. Most Frequently Reported Prescription Medications and Supplements in Couples Planning Pregnancy: The LIFE Study.

    Science.gov (United States)

    Palmsten, Kristin; Flores, Katrina F; Chambers, Christina D; Weiss, Lauren A; Sundaram, Rajeshwari; Buck Louis, Germaine M

    2018-01-01

    To identify frequently reported prescription medications and supplements among couples planning pregnancy because there is a lack of descriptive information on these agents in women and men who are trying to conceive. Five hundred one couples enrolled in the Longitudinal Study of Infertility and the Environment, which took place between 2005 and 2009. Participants reported prescription medications as well as prescription and over-the-counter supplements used through interviews at study enrollment and through daily dairies during the 12-month follow-up. We identified prescription medications and supplements prospectively reported by ≥1% of women and men at baseline and from daily journal information grouped into 3-month preconception follow-up intervals while couples tried for pregnancy. The 5 most reported prescription medications among women were levothyroxine (5.8%), cetirizine (2.6%), fluticasone (2.4%), escitalopram (1.8%), and fluoxetine (1.8%) and for men were lisinopril (2.0%), mometasone (2.0%), fexofenadine (1.8%), atorvastatin (1.6%), and montelukast (1.6%). The most reported supplements were multivitamins (63.3%, 43.5%) and fish oil (13.2%, 9.4%) for women and men, respectively, and prenatal vitamins (22.0%) for women. For women during the first 3 months of follow-up, prenatal vitamins (6.0%) and antibiotics (1.2%-2.6%) were among the most frequently started medications. During the next 3 months, clomiphene (4.5%) was the most frequently initiated medication. Couples trying for pregnancy reported a variety of prescription medications and supplements, and they differed by gender. Preconception guidance should address medication and supplement use to avoid potential exposures associated with adverse reproductive and perinatal outcomes.

  16. Daily corticosteroids reduce infection-associated relapses in frequently relapsing nephrotic syndrome: a randomized controlled trial.

    Science.gov (United States)

    Gulati, Ashima; Sinha, Aditi; Sreenivas, Vishnubhatla; Math, Aparna; Hari, Pankaj; Bagga, Arvind

    2011-01-01

    Relapses of nephrotic syndrome often follow minor infections, commonly of the upper respiratory tract. Daily administration of maintenance prednisolone during intercurrent infections was examined to determine whether the treatment reduces relapse rates in children with frequently relapsing nephrotic syndrome. In a randomized controlled trial (nonblind, parallel group, tertiary-care hospital), 100 patients with idiopathic, frequently relapsing nephrotic syndrome eligible for therapy with prolonged low-dose, alternate-day prednisolone with or without levamisole were randomized to either receive their usual dose of alternate-day prednisolone daily for 7 days during intercurrent infections (intervention group) or continue alternate-day prednisolone (controls). Primary outcome was assessed by comparing the rates of infection-associated relapses at 12-month follow-up. Secondary outcomes were the frequency of infections and the cumulative amount of prednisolone received in both groups. Patients in the intervention group showed significantly lower infection-associated (rate difference, 0.7 episodes/patient per year; 95% confidence intervals [CI] 0.3, 1.1) and lower total relapse rates (0.9 episodes/patient per year, 95% CI 0.4, 1.4) without increase in steroid toxicity. Poisson regression, adjusted for occurrence of infections, showed that daily administration of prednisolone during infections independently resulted in 59% reduction in frequency of relapses (rate ratio, 0.41; 95% CI 0.3, 0.6). For every six patients receiving this intervention, one showed a reduction of relapse frequency to less than three per year. Daily administration of maintenance doses of prednisolone, during intercurrent infections, significantly reduces relapse rates and the proportion of children with frequently relapsing nephrotic syndrome.

  17. Less healthy breakfast cereals are promoted more frequently in large supermarket chains in Canada.

    Science.gov (United States)

    Potvin Kent, Monique; Rudnicki, Erika; Usher, Crystal

    2017-11-13

    The majority of food expenditures are made in supermarkets and this environment influences our purchasing and food intake. Breakfast cereals are frequently marketed as healthy food choices. The objective of this study was to examine the frequency of in-store promotions for cold breakfast cereals in Canadian supermarkets and to determine whether healthier or less healthy breakfast cereals are promoted more frequently. Data was collected once per week over a four-week period from a convenience sample of the five largest Canadian supermarkets in the Ottawa/Gatineau area. Data collection included the number of shelf facings, promotional displays, and the cost of cereals/100 g. The UK Nutrient Profiling Model was used to determine the healthfulness of each breakfast cereal. 29.8% (n = 67) of the 225 unique cereals were classified as healthier and 70.2% (n = 158) were classified as less healthy. Less healthy cereals were displayed at eye level, in the profitable middle shelves, 2.9 times more frequently than healthier cereals. There were 5.3 times more breakfast cereal shelf facings, 4.2 more end cap displays, 1.7 more mid-aisle displays and 3.3 more special pricing signage for less healthy cereals compared to healthier cereals. Less healthy cereals had a significantly higher average total number of shelf facings compared to healthier cereals (t = -4.28 (280.8), p supermarkets need to increase the marketing of healthy breakfast cereals within their stores.

  18. APC promoter is frequently methylated in pancreatic juice of patients with pancreatic carcinomas or periampullary tumors.

    Science.gov (United States)

    Ginesta, Mireia M; Diaz-Riascos, Zamira Vanessa; Busquets, Juli; Pelaez, Núria; Serrano, Teresa; Peinado, Miquel Àngel; Jorba, Rosa; García-Borobia, Francisco Javier; Capella, Gabriel; Fabregat, Joan

    2016-09-01

    Early detection of pancreatic and periampullary neoplasms is critical to improve their clinical outcome. The present authors previously demonstrated that DNA hypermethylation of adenomatous polyposis coli (APC), histamine receptor H2 (HRH2), cadherin 13 (CDH13), secreted protein acidic and cysteine rich (SPARC) and engrailed-1 (EN-1) promoters is frequently detected in pancreatic tumor cells. The aim of the present study was to assess their prevalence in pancreatic juice of carcinomas of the pancreas and periampullary area. A total of 135 pancreatic juices obtained from 85 pancreatic cancer (PC), 26 ampullary carcinoma (AC), 10 intraductal papillary mucinous neoplasm (IPMN) and 14 chronic pancreatitis (CP) patients were analyzed. The methylation status of the APC, HRH2, CDH13, SPARC and EN-1 promoters was analyzed using methylation specific-melting curve analysis (MS-MCA). Kirsten rat sarcoma viral oncogene homolog (KRAS) mutations were also tested with allele-specific quantitative polymerase chain reaction amplification. Out of the 5 promoters analyzed, APC (71%) and HRH2 (65%) were the most frequently methylated in PC juice. APC methylation was also detected at a high frequency in AC (76%) and IPMN (80%), but only occasionally observed in CP (7%). APC methylation had a high sensitivity (71-80%) for all types of cancer analyzed. The panel (where a sample scored as positive when ≥2 markers were methylated) did not outperform APC as a single marker. Finally, KRAS detection in pancreatic juice offered a lower sensitivity (50%) and specificity (71%) for detection of any cancer. APC hypermethylation in pancreatic juice, as assessed by MS-MCA, is a frequent event of potential clinical usefulness in the diagnosis of pancreatic and periampullary neoplasms.

  19. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  20. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  1. Precession mechanism of spin relaxation at frequent electron-electron collisions

    CERN Document Server

    Glazov, M M

    2002-01-01

    It is shown that the spin relaxation mechanism in the two-dimensional electron gas, is controlled not only through the electron pulse relaxation processes, determining the mobility, but through the electron-electron collisions as well. It is decided to use the kinetic equation, describing the electron spin mixing in the k-space, for determining the spin relaxation time tau sub s at frequent electron-electron collisions. The tau sub s time is calculated for the nondegenerated electron gas both with an account and with no account of the exchange interaction

  2. Supporting Frequent Updates in R-Trees: A Bottom-Up Approach

    DEFF Research Database (Denmark)

    Lee, Mong Li; Hsu, Wynne; Jensen, Christian Søndergaard

    2003-01-01

    Advances in hardware-related technologies promise to enable new data management applications that monitor continuous processes. In these applications, enormous amounts of state samples are obtained via sensors and are streamed to a database. Further, updates are very frequent and may exhibit...... and aims to improve update performance. It has different levels of reorganization—ranging from global to local—during updates, avoiding expensive top-down updates. A compact main-memory summary structure that allows direct access to the R-tree index nodes is used together with efficient bottom...

  3. Management of hyperthyroidism due to Graves' disease: frequently asked questions and answers (if any).

    Science.gov (United States)

    Bartalena, L; Chiovato, L; Vitti, P

    2016-10-01

    Graves' disease is the most common cause of hyperthyroidism in iodine-replete areas. Although progress has been made in our understanding of the pathogenesis of the disease, no treatment targeting pathogenic mechanisms of the disease is presently available. Therapies for Graves' hyperthyroidism are largely imperfect because they are bound to either a high rate of relapsing hyperthyroidism (antithyroid drugs) or lifelong hypothyroidism (radioiodine treatment or thyroidectomy). Aim of the present article is to offer a practical guidance to the reader by providing evidence-based answers to frequently asked questions in clinical practice.

  4. Influence of frequent magnetic field on chlorophyll content in leaves of sugar beet plants

    International Nuclear Information System (INIS)

    Rochalska, M.

    2005-01-01

    Chlorophyll content in plant leaves is correlated with the yield and nitrogen content in plants. Non-destructive investigations of chlorophyll content in leaves of 3 varieties of sugar beet grown from seeds revealed that a low frequent magnetic field, acting independently or in combination with other methods of seed improvement, increased chlorophyll content in leaves of the investigated plants. The treatment with the magnetic field increased nitrogen content in the examined plants. The effect was not connected with environmental conditions during vegetation seasons. (author)

  5. Impact of frequent evaluations in English in Modern Operating Systems lessons

    Directory of Open Access Journals (Sweden)

    Dasiel Alberto Pérez Suárez

    2014-06-01

    Full Text Available This paper describes the impact that frequent evaluations in English in Modern Operating Systems classes have over the students at the University of Informatics Sciences. The research allo wed showing that, despite of the initially rejection of the students, they gradually assimilated the importance of English in their future profession. This had a positive impact on English language study in order to solve academic problems by raising the academic performance and the self - confidence level , to face the English language for professional purposes required in a career as Informatics Sciences Engineering.

  6. Frequent mutations of chromatin remodeling genes in transitional cell carcinoma of the bladder

    DEFF Research Database (Denmark)

    Gui, Yaoting; Guo, Guangwu; Huang, Yi

    2011-01-01

    frequently in tumors of low stages and grades, highlighting its potential role in the classification and diagnosis of bladder cancer. Our results provide an overview of the genetic basis of TCC and suggest that aberration of chromatin regulation might be a hallmark of bladder cancer.......Transitional cell carcinoma (TCC) is the most common type of bladder cancer. Here we sequenced the exomes of nine individuals with TCC and screened all the somatically mutated genes in a prevalence set of 88 additional individuals with TCC with different tumor stages and grades. In our study, we...

  7. Effect of a reorganized after-hours family practice service on frequent attenders

    DEFF Research Database (Denmark)

    Vedsted, Peter; Olesen, Frede

    1999-01-01

    of this reorganization on the use of services by frequent attenders (FAs). METHODS: From 1990 to 1994, methods of contact and annual costs per attender were analyzed in an ecological time-trend study based on aggregated administrative data collected from the database of the Public Health Insurance, Aarhus County......, Denmark (600,000 inhabitants). The study only included attenders ages 18 and over. FAs were defined as the group that, within each calendar year (12 months), had 4 or more contacts with the after-hours family practice service. RESULTS: FAs made up 9.5% of the attenders and accounted for more than 40...

  8. BAGE Hypomethylation Is an Early Event in Colon Transformation and Is Frequent in Histologically Advanced Adenomas

    Energy Technology Data Exchange (ETDEWEB)

    Lana, Erica [INSERM U827, Montpellier (France); Brun, Marie-Elisabeth [Institut de Génétique Humaine, CNRS UPR 1142, Montpellier (France); Rivals, Isabelle [Equipe de Statistique Appliquée, ESPCI ParisTech, Paris (France); Selves, Janick; Kirzin, Sylvain [CHU Purpan and INSERM U563, Toulouse (France); Lutsyk, Andriy P. [O.O. Bogomoletz National Medical University, Kyiv (Ukraine); Gordiyuk, Vasily V. [Department of Functional Genomics, Institute of Molecular Biology and Genetics NASU, Kyiv (Ukraine); Bibeau, Frédéric [CRLC, Montpellier (France); Rynditch, Alla [Department of Functional Genomics, Institute of Molecular Biology and Genetics NASU, Kyiv (Ukraine); De Sario, Albertina, E-mail: albertina.de-sario@inserm.fr [INSERM U827, Montpellier (France)

    2009-11-18

    We showed earlier that BAGE (B melanoma antigen) loci are hypermethylated in normal tissues and hypomethylated in 98% of human cancers. More recently, we provided evidence that hypomethylation of BAGE loci represents an informative marker for colon cancer detection. In this study, we show that hypomethylation of BAGE loci was an early event that occurred in 43% of colorectal adenomas. Interestingly, hypomethylation of BAGE loci was frequent (50%) in tubulo-villous and villous adenomas, these adenomas having a high probability of being transformed into colorectal cancers.

  9. BAGE Hypomethylation Is an Early Event in Colon Transformation and Is Frequent in Histologically Advanced Adenomas

    Directory of Open Access Journals (Sweden)

    Alla Rynditch

    2009-11-01

    Full Text Available We showed earlier that BAGE (B melanoma antigen loci are hypermethylated in normal tissues and hypomethylated in 98% of human cancers. More recently, we provided evidence that hypomethylation of BAGE loci represents an informative marker for colon cancer detection. In this study, we show that hypomethylation of BAGE loci was an early event that occurred in 43% of colorectal adenomas. Interestingly, hypomethylation of BAGE loci was frequent (50% in tubulo-villous and villous adenomas, these adenomas having a high probability of being transformed into colorectal cancers.

  10. Conserving and Restoring Old Growth in Frequent-fire Forests: Cycles of Disruption and Recovery

    Directory of Open Access Journals (Sweden)

    Dave Egan

    2007-12-01

    Full Text Available I provide a synthesis of the papers in the Special Issue, The Conservation and Restoration of Old Growth in Frequent-fire Forests of the American West. These papers - the product of an Old Growth Writing Workshop, held at Northern Arizona University in Flagstaff, Arizona on 18-19 April 2006 - represent the ideas of 25 workshop participants who argue for a new attitude toward managing old growth in the frequent-fire forests of the American West. Unlike the lush, old-growth rainforests of the Pacific Northwest, the dry, frequent-fire forests of the western United States evolved with surface fires that disturbed the system with such regularity that young trees were almost always killed. When saplings did survive, they grew beyond the harm of frequent surface fires and, ultimately, attained the characteristics that define old growth in these systems. This system worked well, producing old-growth trees in abundance, until the onset of Euro-American settlement in the mid- to late-19th century. The arrival of these settlers put in motion an interplay of unprecedented social, political, economic, and ecological forces (e.g., removal of Native Americans and their fire-based land management systems, overgrazing of the understory, aggressive logging, establishment of federal land management agencies, implementation of a federal fire suppression policy. These activities have culminated in 1 overly dense forested ecosystems that are now on the verge of collapse because of catastrophic fires (i.e., crown fire at the landscape level; the Rodeo-Chediski Fire and insect outbreaks, 2 the emergence of conservation-minded environmental legislation and policy, and 3 greater levels of interaction between citizens, federal agencies, and fire-prone landscapes. Recognizing the tenuous ecological situation of these forests, restoration ecologists, foresters, and others have developed ways to return historic ecological processes and lower tree densities to these forests

  11. Genitourinary tuberculosis - a rare presentation of a still frequent infection in renal transplant recipients

    Directory of Open Access Journals (Sweden)

    Natacha Jardim Rodrigues

    Full Text Available Abstract Mycobacterium tuberculosis infection in renal transplant recipients is associated with significant morbidity and mortality. Genitourinary tuberculosis is a less frequent presentation and a high level of suspicion is needed to avoid treatment delay. Management is challenging due to the interaction of calcineurin inhibitors with antituberculous medications and the known side effects of these drugs, with higher prevalence in this population. The authors present a case of a renal transplant recipient with urinary and constitutional symptoms whom is diagnosed with tuberculosis after a prostatic biopsy in an already disseminated stage and develops hepatotoxicity to antituberculous therapy.

  12. USE OF IMMUNOMODULATORS IN ACUTE RESPIRATORY INFECTION TREATMENT IN FREQUENTLY ILL CHILDREN

    Directory of Open Access Journals (Sweden)

    M.I. Ivardava

    2011-01-01

    Full Text Available Respiratory infections, relapses of ear, nose, throat infections, acute and chronic bronchial infections — these are the most common infantile infections. Regardless the wide range of medications, treatment of recurrent ENT and respiratory infections is not always effective especially in the group of frequently ill children. This article contains analysis of the necessity of immunomodulation therapy of recurrent respiratory infections as a part of complex prophylaxis and treatment of infants.Key words: children, acute respiratory infection, polyoxidonium, treatment.(Voprosy sovremennoi pediatrii — Current Pediatrics. 2011; 10 (3: 103–107

  13. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  14. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  15. Pulmonary CT angiography protocol adapted to the hemodynamic effects of pregnancy.

    LENUS (Irish Health Repository)

    Ridge, Carole A

    2012-02-01

    OBJECTIVE: The purpose of this study was to compare the image quality of a standard pulmonary CT angiography (CTA) protocol with a pulmonary CTA protocol optimized for use in pregnant patients with suspected pulmonary embolism (PE). MATERIALS AND METHODS: Forty-five consecutive pregnant patients with suspected PE were retrospectively included in the study: 25 patients (group A) underwent standard-protocol pulmonary CTA and 20 patients (group B) were imaged using a protocol modified for pregnancy. The modified protocol used a shallow inspiration breath-hold and a high concentration, high rate of injection, and high volume of contrast material. Objective image quality and subjective image quality were evaluated by measuring pulmonary arterial enhancement, determining whether there was transient interruption of the contrast bolus by unopacified blood from the inferior vena cava (IVC), and assessing diagnostic adequacy. RESULTS: Objective and subjective image quality were significantly better for group B-that is, for the group who underwent the CTA protocol optimized for pregnancy. Mean pulmonary arterial enhancement and the percentage of studies characterized as adequate for diagnosis were higher in group B than in group A: 321 +\\/- 148 HU (SD) versus 178 +\\/- 67 HU (p = 0.0001) and 90% versus 64% (p = 0.05), respectively. Transient interruption of contrast material by unopacified blood from the IVC was observed more frequently in group A (39%) than in group B (10%) (p = 0.05). CONCLUSION: A pulmonary CTA protocol optimized for pregnancy significantly improved image quality by increasing pulmonary arterial opacification, improving diagnostic adequacy, and decreasing transient interruption of the contrast bolus by unopacified blood from the IVC.

  16. Comparison of two neonatal indomethacin protocols: efficacy and outcome for patent ductus arteriosus closure.

    Science.gov (United States)

    Rosito, G; Sum, K; Chorne, N

    2010-10-01

    Indomethacin, a non-selective inhibitor of prostaglandin synthesis, is the gold standard treatment for patent ductus arteriosus (PDA). Indomethacin has been shown to permanently close the ductus and when given prophylactically, it reduces the incidence of PDA (1, 2). This study compares PDA closure and surgical ligation rates between patients using two different indomethacin administration protocols. This is a retrospective comparison analysis of 72 neonates, who received one of two indomethacin administration protocols. Our previous protocol suggested an initial dose of 0·2 mg/kg followed by two 0·1 mg/kg, with doses infused over 4 h and a 24-h dosing interval. A new potentially more useful protocol using the same mg/kg dose regimen but with doses infused over 30 min and a 12-h dosing interval, was evaluated. Each neonate was allowed three courses of treatment before surgical ligation was performed for persistent PDA. There were no statistically significant differences between the two protocol groups when comparing percentages of neonates with gestational age≤28 weeks, birth weight≤1000 g, male gender or receiving indomethacin for the indication of PDA prophylaxis vs. treatment. There was a trend towards a higher PDA closure rate and subsequently a lower PDA ligation rate in the new protocol when compared with the previous protocol. In this small population of premature neonates, there was a trend, but no significant difference, towards increasing PDA closure and lower surgical ligation rates in neonates given indomethacin with more frequent dosing and shorter infusion time. A well-powered randomized controlled trial is now needed. Copyright © 2010 The Authors. JCPT © 2010 Blackwell Publishing Ltd.

  17. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  18. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  19. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  1. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  2. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  3. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  4. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  5. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  6. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  7. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  8. Effects of Mediterranean diet in patients with recurring colds and frequent complications.

    Science.gov (United States)

    Calatayud, F M; Calatayud, B; Gallego, J G; González-Martín, C; Alguacil, L F

    In recent years, traditional diets enriched with fresh plant-based foods have been gradually abandoned, increasing the consumption of animal foods and highly processed food. The aim of this study was to assess the effects of a nutritional intervention with a Traditional Mediterranean Diet in patients with recurring colds (RC) and frequent inflammatory complications (IC). Prospective before-after comparison study of 63 girls and 65 boys aged 1-5 years were included over a year in the nutritional programme "Learning to eat from the Mediterranean". We studied clinical and therapeutic variables and various anthropometric parameters. All the studied indicators (number of catarrhal episodes CB, degree of intensity, emergency and hospital admissions) showed a positive and statistically significant evolution, evidenced from the first weeks of starting treatment, until the end of the year, after which 53.9% of patients had no CB, 25% had only one, and 16.4% had two episodes, compared to the 4.64 episodes on average in the previous year. Antibiotic use decreased by 87.4%, from 3.85±1.27 times/patient/year to 0.49±0.79 (pMediterranean Diet, increased from 7.8 to 10.9 points. The adoption of a Traditional Mediterranean Diet could be a major contribution to the improvement of patients with recurring colds and frequent inflammatory complications. Copyright © 2016 SEICAP. Published by Elsevier España, S.L.U. All rights reserved.

  9. Frequent attenders without organic disease in a gastroenterology clinic. Patient characteristics and health care use.

    Science.gov (United States)

    Bass, C; Bond, A; Gill, D; Sharpe, M

    1999-01-01

    We used a hospital computer to identify 50 patients (35 women, 15 men) satisfying research criteria for "frequent attenders" at a gastroenterology outpatient clinic (four or more visits to a general hospital clinic in the previous 12 months). Their mean duration of symptoms was 5 years, and 80% reported fatigue as a significant complaint. Thirteen (37%) of the women were also consulting a gynecologist, and in nine of these their status was normal. Seven (21%) of the 35 women who were interviewed had a history of childhood sexual abuse, and these patients reported significantly more lifetime somatic symptoms (9.7, SD = 3.8) than those without such a history (5.4, SD = 3.5, p = 12 visits over the previous 12 months), and the patients reported a mean number of 5.7 (SD = 2.1) specialist appointments in the previous year. There may be a case for using the hospital computer to identify frequent attenders proactively at an earlier stage of their hospital visits so that appropriate management can be instituted. If such patients can be identified in this way, their assessment and management might be more appropriately supervised in designated clinics by more experienced gastroenterology staff.

  10. Frequent beneficial mutations during single-colony serial transfer of Streptococcus pneumoniae.

    Directory of Open Access Journals (Sweden)

    Kathleen E Stevens

    2011-08-01

    Full Text Available The appearance of new mutations within a population provides the raw material for evolution. The consistent decline in fitness observed in classical mutation accumulation studies has provided support for the long-held view that deleterious mutations are more common than beneficial mutations. Here we present results of a study using a mutation accumulation design with the bacterium Streptococcus pneumoniae in which the fitness of the derived populations increased. This rise in fitness was associated specifically with adaptation to survival during brief stationary phase periods between single-colony population bottlenecks. To understand better the population dynamics behind this unanticipated adaptation, we developed a maximum likelihood model describing the processes of mutation and stationary-phase selection in the context of frequent population bottlenecks. Using this model, we estimate that the rate of beneficial mutations may be as high as 4.8×10(-4 events per genome for each time interval corresponding to the pneumococcal generation time. This rate is several orders of magnitude higher than earlier estimates of beneficial mutation rates in bacteria but supports recent results obtained through the propagation of small populations of Escherichia coli. Our findings indicate that beneficial mutations may be relatively frequent in bacteria and suggest that in S. pneumoniae, which develops natural competence for transformation, a steady supply of such mutations may be available for sampling by recombination.

  11. Possibilities of Correction and Prophylaxis of Intestinal Microbiocenosis Disorders in Frequently Ill Children

    Directory of Open Access Journals (Sweden)

    A. N. Surkov

    2013-01-01

    Full Text Available Frequently and protractedly ill children constitute a special for pediatricians group of patients. Acute respiratory infections with severe and frequently relapsing course badly affect children’s health and contribute to the decrease of the functional activity of the immune system. Risk factors of the high prevalence of acute respiratory infections are changes in the immune responses at the background of unfavorable ante- and perinatal conditions, numerous contacts with potential causative agents at the beginning of attendance of infant schools, widespread intra- and inter-family contacts as well as susceptibility to Th2 immune response (allergy and prolonged course of inflammatory process. Etiotropic treatment of acute respiratory infections often includes antibacterial drugs, which, however, have negative effects on intestinal microflora, such as dyspeptic syndrome and antibiotic-induced diarrhea. Intestinal dysbiosis affects homeostasis, leads to significant changes in functional activity of various organs and systems. That is why correction and prophylaxis of intestinal dysbacteriosis is very important in pediatric practice. In this article the main data on epidemiology, pathogenesis, forms, clinical manifestation, diagnostics and treatment of antibiotic-induced diarrhea in children.

  12. Aromaphytobalneotherapy in Treatment and Prophylaxis of Frequent Respiratory Infections in Children with Chronic and Disabling Diseases

    Directory of Open Access Journals (Sweden)

    O. M. Konova

    2016-01-01

    Full Text Available In children with chronic pathologies, co-occurring frequent respiratory infections of a prolonged course obstructs and reduce the effectiveness of rehabilitation measures, and adversely affect the adaptation reserves. Hydrotherapeutic factors are widely used for the prevention of colds in children from the first days of life. Addition to the water of medicinal and phytoaromatic preparations increases their efficiency. For patients with chronic pathology, when prescribing balneotherapeutic factors for treatment and prophylaxis of respiratory infections, it is important to take into account the potential risk of adverse effects on the symptoms of the underlying disease. Researches in patients with orthopedic, chronic gastroenterological diseases, spastic forms of cerebral palsy, with co-occurring frequent respiratory infections of a prolonged course in history revealed that addition of medicinal baths based on phytoaromatic preparation, containing eucalyptus oil, to the rehabilitation complex is an effective method of preventing and stopping initial symptoms of respiratory infections. It also contributes to the adaptation reserves of the organism, without adversely affecting the course of the underlying disease.

  13. Latent resilience in ponderosa pine forest: effects of resumed frequent fire.

    Science.gov (United States)

    Larson, Andrew J; Belote, R Travis; Cansler, C Alina; Parks, Sean A; Dietz, Matthew S

    2013-09-01

    Ecological systems often exhibit resilient states that are maintained through negative feedbacks. In ponderosa pine forests, fire historically represented the negative feedback mechanism that maintained ecosystem resilience; fire exclusion reduced that resilience, predisposing the transition to an alternative ecosystem state upon reintroduction of fire. We evaluated the effects of reintroduced frequent wildfire in unlogged, fire-excluded, ponderosa pine forest in the Bob Marshall Wilderness, Montana, USA. Initial reintroduction of fire in 2003 reduced tree density and consumed surface fuels, but also stimulated establishment of a dense cohort of lodgepole pine, maintaining a trajectory toward an alternative state. Resumption of a frequent fire regime by a second fire in 2011 restored a low-density forest dominated by large-diameter ponderosa pine by eliminating many regenerating lodgepole pines and by continuing to remove surface fuels and small-diameter lodgepole pine and Douglas-fir that established during the fire suppression era. Our data demonstrate that some unlogged, fire-excluded, ponderosa pine forests possess latent resilience to reintroduced fire. A passive model of simply allowing lightning-ignited fires to burn appears to be a viable approach to restoration of such forests.

  14. Long-term continuous N-carbamylglutamate treatment in frequently decompensated propionic acidemia: a case report.

    Science.gov (United States)

    Tummolo, Albina; Melpignano, Livio; Carella, Antonella; Di Mauro, Anna Maria; Piccinno, Elvira; Vendemiale, Marcella; Ortolani, Federica; Fedele, Stefania; Masciopinto, Maristella; Papadia, Francesco

    2018-04-22

    Propionic acidemia is a rare autosomal recessive inherited metabolic disorder that can inhibit the synthesis of N-acetylglutamate, the obligatory activator in urea synthesis, leading to hyperammonemia. N-carbamylglutamate ameliorates hyperammonemia in decompensated propionic acidemia. The effects of long-term continuous N-acetylglutamate administration in such patients are unknown. We report our clinical experience with continuous administration of N-acetylglutamate for 6 years in a patient with propionic acidemia frequently presenting with hyperammonemia. A male Caucasian patient with frequently decompensated propionic acidemia and hyperammonemia was admitted 78 times for acute attacks during the first 9 years of his life. Continuous daily treatment with oral N-carbamylglutamate 100 mg/kg (50 mg/kg after 6 months) was initiated. During 6 years of treatment, he had a significant decrease in his mean plasma ammonia levels (75.7 μmol/L vs. 140.3 μmol/L before N-carbamylglutamate therapy, p N-acetylglutamate administration outside the emergency setting. If this observation is confirmed, future studies should aim to optimize the dosage and explore effects of the dosage requirements on other drugs and on protein tolerance.

  15. Lower life satisfaction related to materialism in children frequently exposed to advertising.

    Science.gov (United States)

    Opree, Suzanna J; Buijzen, Moniek; Valkenburg, Patti M

    2012-09-01

    Research among adults suggests that materialism and life satisfaction negatively influence each other, causing a downward spiral. So far, cross-sectional research among children has indicated that materialistic children are less happy, but causality remains uncertain. This study adds to the literature by investigating the longitudinal relation between materialism and life satisfaction. We also investigated whether their relation depended on children's level of exposure to advertising. A sample of 466 children (aged 8-11; 55% girls) participated in a 2-wave online survey with a 1-year interval. We asked children questions about material possessions, life satisfaction, and advertising. We used structural equation modeling to study the relationship between these variables. For the children in our sample, no effect of materialism on life satisfaction was observed. However, life satisfaction did have a negative effect on materialism. Exposure to advertising facilitated this effect: We only found an effect of life satisfaction on materialism for children who were frequently exposed to advertising. Among 8- to 11-year-old children, life satisfaction leads to decreased materialism and not the other way around. However, this effect only holds for children who are frequently exposed to television advertising. It is plausible that the material values portrayed in advertising teach children that material possessions are a way to cope with decreased life satisfaction. It is important to reduce this effect, because findings among adults suggest that materialistic children may become less happy later in life. Various intervention strategies are discussed.

  16. Large Scale Frequent Pattern Mining using MPI One-Sided Model

    Energy Technology Data Exchange (ETDEWEB)

    Vishnu, Abhinav; Agarwal, Khushbu

    2015-09-08

    In this paper, we propose a work-stealing runtime --- Library for Work Stealing LibWS --- using MPI one-sided model for designing scalable FP-Growth --- {\\em de facto} frequent pattern mining algorithm --- on large scale systems. LibWS provides locality efficient and highly scalable work-stealing techniques for load balancing on a variety of data distributions. We also propose a novel communication algorithm for FP-growth data exchange phase, which reduces the communication complexity from state-of-the-art O(p) to O(f + p/f) for p processes and f frequent attributed-ids. FP-Growth is implemented using LibWS and evaluated on several work distributions and support counts. An experimental evaluation of the FP-Growth on LibWS using 4096 processes on an InfiniBand Cluster demonstrates excellent efficiency for several work distributions (87\\% efficiency for Power-law and 91% for Poisson). The proposed distributed FP-Tree merging algorithm provides 38x communication speedup on 4096 cores.

  17. Test-retest of computerized health status questionnaires frequently used in the monitoring of knee osteoarthritis

    DEFF Research Database (Denmark)

    Gudbergsen, Henrik; Bartels, Else M.; Krusager, Peter

    2011-01-01

    ABSTRACT: BACKGROUND: To compare data based on touch screen to data based on traditional paper versions of questionnaires frequently used to examine patient reported outcomes in knee osteoarthritis patients and to examine the impact of patient characteristics on this comparison METHODS: Participa......ABSTRACT: BACKGROUND: To compare data based on touch screen to data based on traditional paper versions of questionnaires frequently used to examine patient reported outcomes in knee osteoarthritis patients and to examine the impact of patient characteristics on this comparison METHODS...... subgroups, completing either the paper or touch screen version first. Mean, mean differences (95% CI), median, median differences and Intraclass Correlation Coefficients (ICCs) were calculated for all questionnaires. RESULTS: ICCs between data based on computerized and paper versions ranged from 0.86 to 0.......99. Analysis revealed a statistically significant difference between versions of the ADL Taxonomy, but not for the remaining questionnaires. Age, computer experience or education-level had no significant impact on the results. The computerized questionnaires were reported to be easier to use. CONCLUSION...

  18. Whole exome analysis identifies frequent CNGA1 mutations in Japanese population with autosomal recessive retinitis pigmentosa.

    Directory of Open Access Journals (Sweden)

    Satoshi Katagiri

    Full Text Available OBJECTIVE: The purpose of this study was to investigate frequent disease-causing gene mutations in autosomal recessive retinitis pigmentosa (arRP in the Japanese population. METHODS: In total, 99 Japanese patients with non-syndromic and unrelated arRP or sporadic RP (spRP were recruited in this study and ophthalmic examinations were conducted for the diagnosis of RP. Among these patients, whole exome sequencing analysis of 30 RP patients and direct sequencing screening of all CNGA1 exons of the other 69 RP patients were performed. RESULTS: Whole exome sequencing of 30 arRP/spRP patients identified disease-causing gene mutations of CNGA1 (four patients, EYS (three patients and SAG (one patient in eight patients and potential disease-causing gene variants of USH2A (two patients, EYS (one patient, TULP1 (one patient and C2orf71 (one patient in five patients. Screening of an additional 69 arRP/spRP patients for the CNGA1 gene mutation revealed one patient with a homozygous mutation. CONCLUSIONS: This is the first identification of CNGA1 mutations in arRP Japanese patients. The frequency of CNGA1 gene mutation was 5.1% (5/99 patients. CNGA1 mutations are one of the most frequent arRP-causing mutations in Japanese patients.

  19. Self-reported and observed risky driving behaviors among frequent and infrequent cell phone users.

    Science.gov (United States)

    Zhao, Nan; Reimer, Bryan; Mehler, Bruce; D'Ambrosio, Lisa A; Coughlin, Joseph F

    2013-12-01

    The apparently higher crash risk among individuals who use cell phones while driving may be due both to the direct interference of cell phone use with the driving task and tendencies to engage in risky driving behaviors independent of cell phone use. Measurements of actual highway driving performance, self-reported aberrant driving behaviors as measured by the Manchester Driver Behavior Questionnaire (DBQ), and attitudes toward speeding, passing behaviors and relative concern about being involved in a crash were assessed. Individuals who reported frequently using cell phones while driving were found to drive faster, change lanes more frequently, spend more time in the left lane, and engage in more instances of hard braking and high acceleration events. They also scored higher in self-reported driving violations on the DBQ and reported more positive attitudes toward speeding and passing than drivers who did not report using a cell phone regularly while driving. These results indicate that a greater reported frequency of cell phone use while driving is associated with a broader pattern of behaviors that are likely to increase the overall risk of crash involvement. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. Mucinous Cystic Neoplasms Lined by Abundant Mucinous Epithelium Frequently Involve KRAS Mutations and Malignant Progression.

    Science.gov (United States)

    Shibata, Hideki; Ohike, Nobuyuki; Norose, Tomoko; Isobe, Tomohide; Suzuki, Reika; Imai, Hideyuki; Shiokawa, Akira; Aoki, Takeshi; Murakami, Masahiko; Mizukami, Hiroki; Tanaka, Jun-Ichi; Takimoto, Masafumi

    2017-12-01

    Pancreatic and hepatic mucinous cyst neoplasms (MCNs) have a malignant potential, but indolent MCNs are not uncommon. The pathological and genetic characteristics of resected MCNs (n=15) categorized by the amount of mucin of the lining epithelium were investigated. MCNs were divided into two groups: (i) a rich (r)-MCN group (n=6), in which more than half of the epithelium was lined by abundant mucinous epithelium; and (ii) a poor (p)-MCN group (n=9), which consisted of the remaining cases. Three patients in the r-MCN group showed invasive carcinoma or high-grade dysplasia, whereas all patients in the p-MCN group showed low-grade dysplasia. Mutations of Kirsten rat sarcoma viral oncogene homolog (KRAS) were more frequent in the r-MCN group (83%) (p-MCN; 11%, p<0.05). Mucinous MCNs more frequently have KRAS mutations and higher risk of malignant progression. Copyright© 2017, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.

  1. Dementia and depression: two frequent disorders of the aged in primary health care in Greece.

    Science.gov (United States)

    Argyriadou, S; Melissopoulou, H; Krania, E; Karagiannidou, A; Vlachonicolis, I; Lionis, C

    2001-02-01

    Dementia and depression are very common disorders among elderly people and their presence decreases the well-being of the aged. The purpose of this study was to assess the magnitude of dementia and depression among elderly people living in different settings in the catchment area of the Chrisoupolis health centre (HCCh) in northern Greece. A total of 536 patients aged 65 years and over, including 48 subjects living in an old people's home, 75 subjects who were taking part in the activities of the open centre for the elderly and 413 subjects randomly selected from those visiting the HCCh, were interviewed by the primary health care team of the HCCh. Medical and family history data were recorded, while cognitive and mood disorders were assessed by using the Mini Mental State Examination and Geriatric Depression Screening Scale. At the time of the examination, 37.6% of the men and 41.6% of the women showed various degrees of cognitive impairment, while 29.9% of the women and 19.6% of the men showed mild to moderate depression. Diabetes mellitus and hypertension frequently were found to co-exist with depression and dementia. The results reaffirm that there is a high prevalence of the studied mental disorders in older patients in the out-patient setting in Greece. A set of recommendations to Greek GPs has now been formulated, with specific emphasis on the use of different screening tools and the appropriate treatment of the most frequently co-existing chronic diseases.

  2. Ocular sporotrichosis: A frequently misdiagnosed cause of granulomatous conjunctivitis in epidemic areas.

    Science.gov (United States)

    Yamagata, João Paulo M; Rudolph, Fabiana B; Nobre, Maria Clara L; Nascimento, Leninha V; Sampaio, Felipe Maurício S; Arinelli, Andrea; Freitas, Dayvison F

    2017-12-01

    Sporotrichosis is a subcutaneous mycosis caused by Sporothrix sp., a dimorphic fungus. Although the cutaneous form is the most frequent form, the ocular presentation has been increasingly diagnosed in epidemic areas. We describe three cases of ocular sporotrichosis with the involvement of the ocular adnexa due to autoinoculation without trauma with successful antifungal treatment. Patient 1: A 68-year-old woman presented with granulomatous conjunctivitis of the right eye with an ulcerated nodule on the right temporal region for 5 months. Patient 2: A 46-year-old woman with conjunctival hyperemia of the left eye with associated periorbital edema and erythema for the past 4 months was referred to the Dermatology Department due to an ulcerated nodule on the left malar region. Patient 3: A 14-year-old boy presented to the emergency department with inferior palpebral edema with a 5-day evolution. Specimens were obtained from the lesions of the three patients, and the cultures were positive for Sporothrix sp. The three cases were diagnosed as ocular sporotrichosis and were successfully treated with itraconazole (200-400 mg/d). Two of the three patients developed sequelae such as conjunctival fibrosis and symblepharon. We emphasize the importance of the ophthalmologist being familiar with the diagnosis and management of this rare and frequently misdiagnosed form of sporotrichosis.

  3. Why eat at fast-food restaurants: reported reasons among frequent consumers.

    Science.gov (United States)

    Rydell, Sarah A; Harnack, Lisa J; Oakes, J Michael; Story, Mary; Jeffery, Robert W; French, Simone A

    2008-12-01

    A convenience sample of adolescents and adults who regularly eat at fast-food restaurants were recruited to participate in an experimental trial to examine the effect of nutrition labeling on meal choices. As part of this study, participants were asked to indicate how strongly they agreed or disagreed with 11 statements to assess reasons for eating at fast-food restaurants. Logistic regression was conducted to examine whether responses differed by demographic factors. The most frequently reported reasons for eating at fast-food restaurants were: fast food is quick (92%), restaurants are easy to get to (80%), and food tastes good (69%). The least frequently reported reasons were: eating fast food is a way of socializing with family and friends (33%), restaurants have nutritious foods to offer (21%), and restaurants are fun and entertaining (12%). Some differences were found with respect to the demographic factors examined. It appears that in order to reduce fast-food consumption, food and nutrition professionals need to identify alternative quick and convenient food sources. As motivation for eating at fast-food restaurants appears to differ somewhat by age, sex, education, employment status, and household size, tailored interventions could be considered.

  4. Incorrect condom use and frequent breakage among female sex workers and their clients.

    Science.gov (United States)

    Mukenge-Tshibaka, Léonard; Alary, Michel; Geraldo, Nassirou; Lowndes, Catherine M

    2005-05-01

    Our objective was to assess if female sex workers (FSWs) and their potential male clients in Cotonou, Benin, know how to use male condoms correctly. From April to June 2000, 314 FSWs and 208 men were interviewed, and asked to demonstrate on a wooden penis how they usually use male condoms. In all, 27.6% of both women and men tore the condom envelope on the notch; 89.3% of the women versus 75.4% of the men easily found the correct side; 17.3% of the women versus 28.3% of the men held the top of the condom to avoid air entering; 91.4% of the women versus 75.6% of the men correctly unrolled the condom. Taking all the four criteria together, only approximately 11% of participants performed a correct condom use demonstration. FSWs frequently reported condom breakage, which was significantly associated with incorrect condom demonstration (P = 0.04). Correct condom use is suboptimal in these heavy consumers of male condoms in Benin. Condom breakage is frequent and is associated with incorrect use.

  5. Possible roles for frequent salivary antiepileptic drug monitoring in the management of epilepsy.

    Science.gov (United States)

    Herkes, G K; Eadie, M J

    1990-07-01

    Salivary levels of phenytoin, phenobarbitone, carbamazepine and carbamazepine-epoxide correlate with the simultaneous plasma water levels of these substances, after correcting for the effects of pH differences between saliva and plasma in the case of phenobarbitone. Saliva is easy and painless to collect, and salivary levels of the drugs are conveniently measured. Frequent (often daily) monitoring of pre-dose morning anticonvulsant drug concentrations in saliva over periods of weeks or months in 3 groups of epileptic subjects showed that (i) in some but not all poorly controlled epileptic patients seizures tended to occur on days when salivary anticonvulsant levels were lower than on non-seizure days, (ii) in such subjects it was possible to estimate an anticipated optimal drug concentration and dose to minimize seizure activity from the plot of seizure frequency against drug concentrations, (iii) in women with 'catamenial' epilepsy, salivary anticonvulsant levels were lower on perimenstrual days than at mid-cycle in half of the subjects studied, and (iv) in pregnant epileptic women the time course of the change in drug levels relative to dose could be followed more closely throughout pregnancy and the post-natal period than was practicable when using blood level measurements. Frequent measurement of salivary anticonvulsant concentrations appears a promising and inexpensive adjunct to the investigation and management of certain problem areas in epilepsy.

  6. [Teenage pregnancy and frequent use of alcohol and drugs in the home environment].

    Science.gov (United States)

    Caputo, Valéria Garcia; Bordin, Isabel Altenfelder

    2008-06-01

    To assess individual and family factors associated to teenage pregnancy, including frequent use of alcohol and illicit drugs by family members. Case-control study conducted with a sample of 408 sexually active female adolescents (aged 13-17 years) in school from the city of Marília (Southeastern Brazil) in 2003-2004. Cases consisted of 100 primigravid teenagers assisted in prenatal care programs in health units. Controls were 308 nulligravid students from state public schools. Standardized instruments identified demographic and educational factors, contraceptive behavior, mental health problems, and family characteristics. Statistical analysis included chi-square tests and logistic regression models. Low paternal education (p=0.01), lack of information on sexuality and fertilization (p=0.001) and the use of illicit drugs by a resident family member (p=0.006) were independent risk factors. Family income per capita and asking the partner to use a condom were confounders. The frequent use of illicit drugs by a resident family member is a factor strongly associated to teenage pregnancy, regardless of other risk factors. The expectation of going to college constitutes a protective factor, mainly in the presence of low maternal education.

  7. Frequent Statement and Dereference Elimination for Imperative and Object-Oriented Distributed Programs

    Science.gov (United States)

    El-Zawawy, Mohamed A.

    2014-01-01

    This paper introduces new approaches for the analysis of frequent statement and dereference elimination for imperative and object-oriented distributed programs running on parallel machines equipped with hierarchical memories. The paper uses languages whose address spaces are globally partitioned. Distributed programs allow defining data layout and threads writing to and reading from other thread memories. Three type systems (for imperative distributed programs) are the tools of the proposed techniques. The first type system defines for every program point a set of calculated (ready) statements and memory accesses. The second type system uses an enriched version of types of the first type system and determines which of the ready statements and memory accesses are used later in the program. The third type system uses the information gather so far to eliminate unnecessary statement computations and memory accesses (the analysis of frequent statement and dereference elimination). Extensions to these type systems are also presented to cover object-oriented distributed programs. Two advantages of our work over related work are the following. The hierarchical style of concurrent parallel computers is similar to the memory model used in this paper. In our approach, each analysis result is assigned a type derivation (serves as a correctness proof). PMID:24892098

  8. Frequent Shifts in Aspergillus flavus Populations Associated with Maize Production in Sonora, Mexico.

    Science.gov (United States)

    Ortega-Beltran, A; Cotty, P J

    2018-03-01

    Aspergillus flavus frequently contaminates maize, a critical staple for billions of people, with aflatoxins. Diversity among A. flavus L morphotype populations associated with maize in Sonora, Mexico was assessed and, in total, 869 isolates from 83 fields were placed into 136 vegetative compatibility groups (VCGs) using nitrate-nonutilizing mutants. VCG diversity indices did not differ in four agroecosystems (AES) but diversity significantly differed among years. Frequencies of certain VCGs changed manyfold over single years in both multiple fields and multiple AES. Certain VCGs were highly frequent (>1%) in 2006 but frequencies declined repeatedly in each of the two subsequent years. Other VCGs that had low frequencies in 2006 increased in 2007 and subsequently declined. None of the VCGs were consistently associated with any AES. Fourteen VCGs were considered dominant in at least a single year. However, frequencies often varied significantly among years. Only 9% of VCGs were detected all 3 years whereas 66% were detected in only 1 year. Results suggest that the most realistic measurements of both genetic diversity and the frequency of A. flavus VCGs are obtained by sampling multiple locations in multiple years. Single-season sampling in many locations should not be substituted for sampling over multiple years.

  9. Frequent gain and loss of introns in fungal cytochrome b genes.

    Directory of Open Access Journals (Sweden)

    Liang-Fen Yin

    Full Text Available In this study, all available cytochrome b (Cyt b genes from the GOBASE database were compiled and the evolutionary dynamics of the Cyt b gene introns was assessed. Cyt b gene introns were frequently present in the fungal kingdom and some lower plants, but generally absent or rare in Chromista, Protozoa, and Animalia. Fungal Cyt b introns were found at 35 positions in Cyt b genes and the number of introns varied at individual positions from a single representative to 32 different introns at position 131, showing a wide and patchy distribution. Many homologous introns were present at the same position in distantly related species but absent in closely related species, suggesting that introns of the Cyt b genes were frequently lost. On the other hand, highly similar intron sequences were observed in some distantly related species rather than in closely related species, suggesting that these introns were gained independently, likely through lateral transfers. The intron loss-and-gain events could be mediated by transpositions that might have occurred between nuclear and mitochondria. Southern hybridization analysis confirmed that some introns contained repetitive sequences and might be transposable elements. An intron gain in Botryotinia fuckeliana prevented the development of QoI fungicide resistance, suggesting that intron loss-and-gain events were not necessarily beneficial to their host organisms.

  10. Carotid near-occlusion frequently has high peak systolic velocity on Doppler ultrasound

    Energy Technology Data Exchange (ETDEWEB)

    Khangure, Simon R.; Machnowska, Matylda; Fox, Allan J.; Hojjat, Seyed-Parsa; Aviv, Richard I. [Sunnybrook Health Sciences Centre, Department of Medical Imaging, Neuroradiology Division, Toronto, ON (Canada); University of Toronto, Department of Medical Imaging, Division of Neuroimaging, Toronto (Canada); Benhabib, Hadas [Sunnybrook Health Sciences Centre, Department of Medical Imaging, Neuroradiology Division, Toronto, ON (Canada); Groenlund, Christer [Umeaa University, Department of Radiation Sciences, Biomedical Engineering, Umeaa (Sweden); Herod, Wendy [Department of Surgery, Sunnybrook Health Sciences Centre, Toronto (Canada); Maggisano, Robert [Department of Surgery, Sunnybrook Health Sciences Centre, Toronto (Canada); University of Toronto, Division of Vascular Surgery, Department of Surgery, Toronto (Canada); Sjoeberg, Anders [Umeaa University, Department of Radiation Sciences, Biomedical Engineering, Umeaa (Sweden); Umeaa University, Department of Pharmacology and Clinical Neuroscience, Umeaa (Sweden); Wester, Per [Umeaa University, Department of Public Health and Clinical Medicine, Umeaa (Sweden); Karolinska Institutet Danderyds Hospital, Department of Clinical Sciences, Stockholm (Sweden); Hopyan, Julia [University of Toronto, Division of Neurology, Department of Medicine, Toronto (Canada); Johansson, Elias [Umeaa University, Department of Pharmacology and Clinical Neuroscience, Umeaa (Sweden); Umeaa University, Department of Public Health and Clinical Medicine, Umeaa (Sweden)

    2018-01-15

    Carotid near-occlusion is a tight atherosclerotic stenosis of the internal carotid artery (ICA) resulting in decrease in diameter of the vessel lumen distal to the stenosis. Near-occlusions can be classified as with or without full collapse, and may have high peak systolic velocity (PSV) across the stenosis, mimicking conventional > 50% carotid artery stenosis. We aimed to determine how frequently near-occlusions have high PSV in the stenosis and determine how accurately carotid Doppler ultrasound can distinguish high-velocity near-occlusion from conventional stenosis. Included patients had near-occlusion or conventional stenosis with carotid ultrasound and CT angiogram (CTA) performed within 30 days of each other. CTA examinations were analyzed by two blinded expert readers. Velocities in the internal and common carotid arteries were recorded. Mean velocity, pulsatility index, and ratios were calculated, giving 12 Doppler parameters for analysis. Of 136 patients, 82 had conventional stenosis and 54 had near-occlusion on CTA. Of near-occlusions, 40 (74%) had high PSV (≥ 125 cm/s) across the stenosis. Ten Doppler parameters significantly differed between conventional stenosis and high-velocity near-occlusion groups. However, no parameter was highly sensitive and specific to separate the groups. Near-occlusions frequently have high PSV across the stenosis, particularly those without full collapse. Carotid Doppler ultrasound does not seem able to distinguish conventional stenosis from high-velocity near-occlusion. These findings question the use of ultrasound alone for preoperative imaging evaluation. (orig.)

  11. Tumor suppressor genes are frequently methylated in lymph node metastases of breast cancers

    Directory of Open Access Journals (Sweden)

    Xu Jia

    2010-07-01

    Full Text Available Abstract Introduction Metastasis represents a major adverse step in the progression of breast carcinoma. Lymph node invasion is the most relevant prognostic factor; however little is known on the molecular events associated with lymph node metastasis process. This study is to investigate the status and role of methylation in lymph node metastatic tumors. Materials and methods Bisulfite pyrosequencing is used to screen 6 putative tumor suppressor genes (HIN-1, RASSF1A, RIL, CDH13, RARβ2 and E-cadherin in 38 pairs of primary breast tumors and lymph node metastases. Results We found that HIN-1, CDH13, RIL, RASSF1A and RARβ2 were frequently methylated both in primary and metastatic tissues (range: 55.3%~89.5%. E-cadherin was not frequently methylated in either setting (range: 18.4%~23.7%. The methylation status of HIN-1, CDH13, RIL, and RARβ2 in lymph nodes metastasis were correlated with that in primary tumors. The Pearson correlation values ranged from 0.624 to 0.472 (p values HIN-1 methylation and hormone status in metastatic lymph nodes. Hypermethylation of HIN-1 in metastasis lymph nodes was significantly associated with expression of ER (odds ratio, 1.070; P = 0.024 and with PR (odds ratio, 1.046; P = 0.026. Conclusions This study suggests that hypermethylation of tumor suppressor genes is extended from primary to metastatic tumors during tumor progression.

  12. A Case of Frequent Arousal Following Nocturnal Dyspnea Caused by Gastroesophageal Reflux Disease

    Directory of Open Access Journals (Sweden)

    Dae Wui Yoon

    2013-06-01

    Full Text Available Gastroesophageal reflux disease (GERD is a common disorder that is associated with many esophageal syndromes and complications. Most cases of reflux event occur during the day, but reflux during sleep can cause not only esophageal problems, but also sleep problems, such as arousal and poor sleep quality. We report the case of a 17-year-old man who had been referred to us with frequent arousal following sudden dyspnea. On polysomnography, no respiratory disturbances and periodic limb movements were found during the sleep study, but frequent events of arousal were reported (arousal index: 12.3/h. On a 24-hr esophageal pH monitoring test, his DeMeester score was 176.43 and the total reflux time was 1120.9 min (76.9%, indicating the presence of significant acid reflux. After treatment with a proton-pump inhibitor, the arousals following nocturnal dyspnea and fatigue in the morning disappeared in the patient. GERD should be considered as a cause of spontaneous arousal or awakening not accompanying respiratory disturbances.

  13. Fractures and Osteomalacia in a Patient Treated With Frequent Home Hemodialysis.

    Science.gov (United States)

    Hanudel, Mark R; Froch, Larry; Gales, Barbara; Jüppner, Harald; Salusky, Isidro B

    2017-09-01

    Bone deformities and fractures are common consequences of renal osteodystrophy in the dialysis population. Persistent hypophosphatemia may be observed with more frequent home hemodialysis regimens, but the specific effects on the skeleton are unknown. We present a patient with end-stage renal disease treated with frequent home hemodialysis who developed severe bone pain and multiple fractures, including a hip fracture and a tibia-fibula fracture complicated by nonunion, rendering her nonambulatory and wheelchair bound for more than a year. A bone biopsy revealed severe osteomalacia, likely secondary to chronic hypophosphatemia and hypocalcemia. Treatment changes included the addition of phosphate to the dialysate, a higher dialysate calcium concentration, and increased calcitriol dose. Several months later, the patient no longer required a wheelchair and was able to ambulate without pain. Repeat bone biopsy revealed marked improvements in bone mineralization and turnover parameters. Also, with increased dialysate phosphate and calcium concentrations, as well as increased calcitriol, circulating fibroblast growth factor 23 levels increased. Copyright © 2017 National Kidney Foundation, Inc. Published by Elsevier Inc. All rights reserved.

  14. Oral Astragalus (Huang qi) for preventing frequent episodes of acute respiratory tract infection in children.

    Science.gov (United States)

    Su, Guobin; Chen, Xiankun; Liu, Zhuangzhu; Yang, Lihong; Zhang, La; Stålsby Lundborg, Cecilia; Wen, Zehuai; Guo, Xinfeng; Qin, Xindong; Liang, Jueyao; Liu, Xusheng

    2016-12-01

    Acute respiratory tract infections (ARTIs) are common in children and can involve both upper and lower airways. Many children experience frequent ARTI episodes or recurrent respiratory tract infections (RRTIs) in early life, which creates challenges for paediatricians, primary care physicians, parents and carers of children.In China, Astragalus (Huang qi), alone or in combination with other herbs, is used by Traditional Chinese Medicine (TCM) practitioners in the form of a water extract, to reduce the risk of ARTIs; it is believed to stimulate the immune system. Better understanding of the therapeutic mechanisms of Astragalus may provide insights into ARTI prevention, and consequently reduced antibiotic use. To assess the effectiveness and safety of oral Astragalus for preventing frequent episodes of acute respiratory tract infections (ARTIs) in children in community settings. We searched the Cochrane Central Register of Controlled Trials (CENTRAL, Issue 12, 2015), MEDLINE (Ovid) (1946 to 31 December 2015), Embase (Elsevier) (1974 to 31 December 2015), AMED (Ovid) (1985 to 31 December 2015), Chinese National Knowledge Infrastructure (CNKI) (1979 to 31 December 2015) and Chinese Scientific Journals full text database (CQVIP) (1989 to 31 December 2015), China Biology Medicine disc (CBM 1976 to 31 December 2015) and Wanfang Data Knowledge Service Platform (WanFang) (1998 to 31 December 2015). We included randomised controlled trials (RCTs) comparing oral Astragalus as a sole Chinese herbal preparation with placebo to prevent frequent episodes of ARTIs in children. We used standard Cochrane methodological procedures for this review. We assessed search results to identify relevant studies. We planned to extract data using standardised forms. Disagreements were to be resolved through discussion. Risk of bias was to be assessed using the Cochrane 'Risk of bias' tool. We planned to use mean difference (MD) or standardised mean difference (SMD) for continuous data and risk

  15. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... Review Article: Taking an idea to a research protocol ... step is to identify the knowledge gap within the intended field of research by examining the background ... be found by writing a critical narrative review of the literature.

  16. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  17. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  18. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  19. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  20. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.