WorldWideScience

Sample records for optimized negative-staining protocol

  1. Morphology and structure of lipoproteins revealed by an optimized negative-staining protocol of electron microscopy[S

    Science.gov (United States)

    Zhang, Lei; Song, James; Cavigiolio, Giorgio; Ishida, Brian Y.; Zhang, Shengli; Kane, John P.; Weisgraber, Karl H.; Oda, Michael N.; Rye, Kerry-Anne; Pownall, Henry J.; Ren, Gang

    2011-01-01

    Plasma lipoprotein levels are predictors of risk for coronary artery disease. Lipoprotein structure-function relationships provide important clues that help identify the role of lipoproteins in cardiovascular disease. The compositional and conformational heterogeneity of lipoproteins are major barriers to the identification of their structures, as discovered using traditional approaches. Although electron microscopy (EM) is an alternative approach, conventional negative staining (NS) produces rouleau artifacts. In a previous study of apolipoprotein (apo)E4-containing reconstituted HDL (rHDL) particles, we optimized the NS method in a way that eliminated rouleaux. Here we report that phosphotungstic acid at high buffer salt concentrations plays a key role in rouleau formation. We also validate our protocol for analyzing the major plasma lipoprotein classes HDL, LDL, IDL, and VLDL, as well as homogeneously prepared apoA-I-containing rHDL. High-contrast EM images revealed morphology and detailed structures of lipoproteins, especially apoA-I-containing rHDL, that are amenable to three-dimensional reconstruction by single-particle analysis and electron tomography. PMID:20978167

  2. Epiretinal membrane negative staining and double peeling in a single block with Brilliant Blue G.

    Science.gov (United States)

    Martins, David; Neves, Pedro

    2018-01-01

    To describe a surgical technique for combined peeling of epiretinal and internal limiting membranes. The authors present their procedure of choice for epiretinal membrane surgery: negative staining effect using Brilliant Blue G and single block removal of the epiretinal and internal limiting membranes in a single step. A total of 26 eyes were operated with the described technique. In all cases, the peeling was performed successfully and with no complications. Minimum postoperative follow-up was 12 months. There were no recurrences of epiretinal membranes. The ideal surgical approach for epiretinal membranes should attempt to reduce mechanical trauma, light exposure, and dye toxicity.

  3. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  4. Characterization of ELISA Antibody-Antigen Interaction using Footprinting-Mass Spectrometry and Negative Staining Transmission Electron Microscopy

    Science.gov (United States)

    Lin, Margaret; Krawitz, Denise; Callahan, Matthew D.; Deperalta, Galahad; Wecksler, Aaron T.

    2018-05-01

    We describe epitope mapping data using multiple covalent labeling footprinting-mass spectrometry (MS) techniques coupled with negative stain transmission electron microscopy (TEM) data to analyze the antibody-antigen interactions in a sandwich enzyme-linked immunosorbant assay (ELISA). Our hydroxyl radical footprinting-MS data using fast photochemical oxidation of proteins (FPOP) indicates suppression of labeling across the antigen upon binding either of the monoclonal antibodies (mAbs) utilized in the ELISA. Combining these data with Western blot analysis enabled the identification of the putative epitopes that appeared to span regions containing N-linked glycans. An additional structural mapping technique, carboxyl group footprinting-mass spectrometry using glycine ethyl ester (GEE) labeling, was used to confirm the epitopes. Deglycosylation of the antigen resulted in loss of potency in the ELISA, supporting the FPOP and GEE labeling data by indicating N-linked glycans are necessary for antigen binding. Finally, mapping of the epitopes onto the antigen crystal structure revealed an approximate 90° relative spatial orientation, optimal for a noncompetitive binding ELISA. TEM data shows both linear and diamond antibody-antigen complexes with a similar binding orientation as predicted from the two footprinting-MS techniques. This study is the first of its kind to utilize multiple bottom-up footprinting-MS techniques and TEM visualization to characterize the monoclonal antibody-antigen binding interactions of critical reagents used in a quality control (QC) lot-release ELISA. [Figure not available: see fulltext.

  5. Characterization of ELISA Antibody-Antigen Interaction using Footprinting-Mass Spectrometry and Negative Staining Transmission Electron Microscopy

    Science.gov (United States)

    Lin, Margaret; Krawitz, Denise; Callahan, Matthew D.; Deperalta, Galahad; Wecksler, Aaron T.

    2018-03-01

    We describe epitope mapping data using multiple covalent labeling footprinting-mass spectrometry (MS) techniques coupled with negative stain transmission electron microscopy (TEM) data to analyze the antibody-antigen interactions in a sandwich enzyme-linked immunosorbant assay (ELISA). Our hydroxyl radical footprinting-MS data using fast photochemical oxidation of proteins (FPOP) indicates suppression of labeling across the antigen upon binding either of the monoclonal antibodies (mAbs) utilized in the ELISA. Combining these data with Western blot analysis enabled the identification of the putative epitopes that appeared to span regions containing N-linked glycans. An additional structural mapping technique, carboxyl group footprinting-mass spectrometry using glycine ethyl ester (GEE) labeling, was used to confirm the epitopes. Deglycosylation of the antigen resulted in loss of potency in the ELISA, supporting the FPOP and GEE labeling data by indicating N-linked glycans are necessary for antigen binding. Finally, mapping of the epitopes onto the antigen crystal structure revealed an approximate 90° relative spatial orientation, optimal for a noncompetitive binding ELISA. TEM data shows both linear and diamond antibody-antigen complexes with a similar binding orientation as predicted from the two footprinting-MS techniques. This study is the first of its kind to utilize multiple bottom-up footprinting-MS techniques and TEM visualization to characterize the monoclonal antibody-antigen binding interactions of critical reagents used in a quality control (QC) lot-release ELISA. [Figure not available: see fulltext.

  6. Silicon nitride grids are compatible with correlative negative staining electron microscopy and tip-enhanced Raman spectroscopy for use in the detection of micro-organisms.

    Science.gov (United States)

    Lausch, V; Hermann, P; Laue, M; Bannert, N

    2014-06-01

    Successive application of negative staining transmission electron microscopy (TEM) and tip-enhanced Raman spectroscopy (TERS) is a new correlative approach that could be used to rapidly and specifically detect and identify single pathogens including bioterrorism-relevant viruses in complex samples. Our objective is to evaluate the TERS-compatibility of commonly used electron microscopy (EM) grids (sample supports), chemicals and negative staining techniques and, if required, to devise appropriate alternatives. While phosphortungstic acid (PTA) is suitable as a heavy metal stain, uranyl acetate, paraformaldehyde in HEPES buffer and alcian blue are unsuitable due to their relatively high Raman scattering. Moreover, the low thermal stability of the carbon-coated pioloform film on copper grids (pioloform grids) negates their utilization. The silicon in the cantilever of the silver-coated atomic force microscope tip used to record TERS spectra suggested that Si-based grids might be employed as alternatives. From all evaluated Si-based TEM grids, the silicon nitride (SiN) grid was found to be best suited, with almost no background Raman signals in the relevant spectral range, a low surface roughness and good particle adhesion properties that could be further improved by glow discharge. Charged SiN grids have excellent particle adhesion properties. The use of these grids in combination with PTA for contrast in the TEM is suitable for subsequent analysis by TERS. The study reports fundamental modifications and optimizations of the negative staining EM method that allows a combination with near-field Raman spectroscopy to acquire a spectroscopic signature from nanoscale biological structures. This should facilitate a more precise diagnosis of single viral particles and other micro-organisms previously localized and visualized in the TEM. © 2014 The Society for Applied Microbiology.

  7. The development of optimization protocol in SRS

    International Nuclear Information System (INIS)

    Oh, S. J.; Suh, T. S.; Lee, H. K.; Choe, B. Y.

    2002-01-01

    In an operation of stereotactic radiosurgery(SRS), a high dose must be delivered to a target region while a normal tissue region must be spared. Using dose distribution which fits in a target region satisfies this purpose. This is solved by using data bases through the simple patient model simulating the brain model and the tumor region. The objective of this research is to develop brain model with tumor based on pseudo coordinate and systematic optimization protocol and to construct data base(DB) about beam parameters such as position and number of isocenter and collimator size. The normal tissue region of patient can be spared by DB in a operation of SRS

  8. The development of optimization protocol in SRS

    Energy Technology Data Exchange (ETDEWEB)

    Oh, S. J.; Suh, T. S.; Lee, H. K.; Choe, B. Y. [The Catholic Univ., of Korea, Seoul (Korea, Republic of)

    2002-07-01

    In an operation of stereotactic radiosurgery(SRS), a high dose must be delivered to a target region while a normal tissue region must be spared. Using dose distribution which fits in a target region satisfies this purpose. This is solved by using data bases through the simple patient model simulating the brain model and the tumor region. The objective of this research is to develop brain model with tumor based on pseudo coordinate and systematic optimization protocol and to construct data base(DB) about beam parameters such as position and number of isocenter and collimator size. The normal tissue region of patient can be spared by DB in a operation of SRS.

  9. An historical account of the development and applications of the negative staining technique to the electron microscopy of viruses.

    Science.gov (United States)

    Horne, R W; Wildy, P

    1979-09-01

    A brief historical account of the development and applications of the negative staining techniques to the study of the structure of viruses and their components as observed in the electron microscope is presented. Although the basic method of surrounding or embedding specimens in opaque dyes was used in light microscopy dating from about 1884, the equivalent preparative techniques applied to electron microscopy were comparatively recent. The combination of experiments on a sophisticated bacterial virus and the installation of a high resolution electron microscope in the Cavendish Laboratory, Cambridge, during 1954, subsequently led to the analysis of several important morphological features of animal, plant and bacterial viruses. The implications of the results from these early experiments on viruses and recent developments in negative staining methods for high resolution image analysis of electron micrographs are also discussed.

  10. An optimized DNA extraction protocol for benthic Didymosphenia geminata.

    Science.gov (United States)

    Uyua, Noelia Mariel; Manrique, Julieta Marina; Jones, Leandro Roberto

    2014-09-01

    Didymosphenia geminata mats display few cells in relation to extracellular material and contain polysaccharides and heavy metals that interfere with molecular studies. We describe an optimized DNA extraction protocol that help to overcome these difficulties. Our protocol outperformed five previously described DNA extraction techniques. Copyright © 2014 Elsevier B.V. All rights reserved.

  11. Optimal protocols and optimal transport in stochastic thermodynamics.

    Science.gov (United States)

    Aurell, Erik; Mejía-Monasterio, Carlos; Muratore-Ginanneschi, Paolo

    2011-06-24

    Thermodynamics of small systems has become an important field of statistical physics. Such systems are driven out of equilibrium by a control, and the question is naturally posed how such a control can be optimized. We show that optimization problems in small system thermodynamics are solved by (deterministic) optimal transport, for which very efficient numerical methods have been developed, and of which there are applications in cosmology, fluid mechanics, logistics, and many other fields. We show, in particular, that minimizing expected heat released or work done during a nonequilibrium transition in finite time is solved by the Burgers equation and mass transport by the Burgers velocity field. Our contribution hence considerably extends the range of solvable optimization problems in small system thermodynamics.

  12. Protocol optimization for in vitro mass propagation of two sugarcane ...

    African Journals Online (AJOL)

    SAM

    2014-03-19

    Mar 19, 2014 ... The present study was initiated to optimize in vitro protocol for mass propagation of two commercial sugarcane clones (Co 449 and Co .... mass propagation of sugarcane genotypes grown in. Ethiopia, and due to this the .... transferred cultures showed multiple shooting with an average of 9.10 ± 0.10 shoots ...

  13. Protocol optimization for in vitro shoot multiplication of Jackfruit ...

    African Journals Online (AJOL)

    Jemal

    2017-01-11

    Jan 11, 2017 ... Protocol optimization for in vitro shoot multiplication of ... shoot length and leaf number, whereby 2 mg/L BAP alone was found to be the best with a mean shoot .... Analysis of variance showed that the interaction between.

  14. Optimal protocols for Hamiltonian and Schrödinger dynamics

    International Nuclear Information System (INIS)

    Schmiedl, Tim; Dieterich, Eckhard; Dieterich, Peter-Simon; Seifert, Udo

    2009-01-01

    For systems in an externally controllable time dependent potential, the optimal protocol minimizes the mean work spent in a finite time transition between given initial and final values of a control parameter. For an initially thermalized ensemble, we consider both Hamiltonian evolution for classical systems and Schrödinger evolution for quantum systems. In both cases, we show that for harmonic potentials, the optimal work is given by the adiabatic work even in the limit of short transition times. This result is counter-intuitive because the adiabatic work is substantially smaller than the work for an instantaneous jump. We also perform numerical calculations for the optimal protocol for Hamiltonian dynamics in an anharmonic quartic potential. For a two-level spin system, we give examples where the adiabatic work can be reached in either a finite or an arbitrarily short transition time depending on the allowed parameter space

  15. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  16. Developing optimized CT scan protocols: Phantom measurements of image quality

    International Nuclear Information System (INIS)

    Zarb, Francis; Rainford, Louise; McEntee, Mark F.

    2011-01-01

    Purpose: The increasing frequency of computerized tomography (CT) examinations is well documented, leading to concern about potential radiation risks for patients. However, the consequences of not performing the CT examination and missing injuries and disease are potentially serious, impacting upon correct patient management. The ALARA principle of dose optimization must be employed for all justified CT examinations. Dose indicators displayed on the CT console as either CT dose index (CTDI) and/or dose length product (DLP), are used to indicate dose and can quantify improvements achieved through optimization. Key scan parameters contributing to dose have been identified in previous literature and in previous work by our group. The aim of this study was to optimize the scan parameters of mA; kV and pitch, whilst maintaining image quality and reducing dose. This research was conducted using psychophysical image quality measurements on a CT quality assurance (QA) phantom establishing the impact of dose optimization on image quality parameters. Method: Current CT scan parameters for head (posterior fossa and cerebrum), abdomen and chest examinations were collected from 57% of CT suites available nationally in Malta (n = 4). Current scan protocols were used to image a Catphan 600 CT QA phantom whereby image quality was assessed. Each scan parameter: mA; kV and pitch were systematically reduced until the contrast resolution (CR), spatial resolution (SR) and noise were significantly lowered. The Catphan 600 images, produced by the range of protocols, were evaluated by 2 expert observers assessing CR, SR and noise. The protocol considered as the optimization threshold was just above the setting that resulted in a significant reduction in CR and noise but not affecting SR at the 95% confidence interval. Results: The limit of optimization threshold was determined for each CT suite. Employing optimized parameters, CTDI and DLP were both significantly reduced (p ≤ 0.001) by

  17. RFID protocol design, optimization, and security for the Internet of Things

    CERN Document Server

    Liu, Alex X; Liu, Xiulong; Li, Keqiu

    2017-01-01

    This book covers the topic of RFID protocol design and optimization and the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.

  18. Protocol optimization in chest CT scans of child

    Energy Technology Data Exchange (ETDEWEB)

    Abrao L, L. T.; Amaral de O, F.; Prata M, A. [Biomedical Engineering Center, Centro Federal de Educacao Tecnologica de Minas Gerais, 30421-169, Belo Horizonte, Minas Gerais (Brazil); Bustos F, M., E-mail: luanaabrao@gmail.com [Universidad Federal de Minas Gerais, Department of Nuclear Engineering, Av. Pres. Antonio Carlos 6627, Pampulha, 31270-901 Belo Horizonte, Minas Gerais (Brazil)

    2017-10-15

    The dissemination of Computed Tomography (CT), a radiodiagnostic technique, has significant increase in the patient dose. In the last years, this technique has shown a high growth due to clinical cases of medical emergencies, neoplasm and pediatric traumas. Dose measurement is important to correlate with the deleterious effects of radiation on the organism and radiation future effects is related with stochastic risks due to tissue radiosensitivity, allied to the life expectancy of the child. In this work, a cylindrical phantom, representing an adult chest made of polymethylmethacrylate (PMMA), was used and a new born chest phantom with a shape oblong was developed based on the dimensions of a typical newborn. In a Ge CT scanner, Discovery model, with 64 channels, the central slice of the phantoms were irradiated successively in order to obtain dose measurements using an ionizing pencil camera. Based in the measurements, dose index was calculated (CTDI{sub vol}). The radiological service chest protocol using a voltage of 120 kV was used for scanning 10 cm of the central area of the adult and newborn phantom, in helical mode. An acquisition of images was performed using this radiological service chest protocol to compare with the protocol optimized. In the newborn phantom was also used protocols optimized using a voltage of 120 and 80 kV. The voltage of 80 kV has the lowest dose index for the pediatric object phantom. This work allowed the comparison between absorbed dose variations by the pediatric phantom changing the X-ray tube supply voltage. This dose variation has shown how important is specific protocols for children. (Author)

  19. Protocol optimization in chest CT scans of child

    International Nuclear Information System (INIS)

    Abrao L, L. T.; Amaral de O, F.; Prata M, A.; Bustos F, M.

    2017-10-01

    The dissemination of Computed Tomography (CT), a radiodiagnostic technique, has significant increase in the patient dose. In the last years, this technique has shown a high growth due to clinical cases of medical emergencies, neoplasm and pediatric traumas. Dose measurement is important to correlate with the deleterious effects of radiation on the organism and radiation future effects is related with stochastic risks due to tissue radiosensitivity, allied to the life expectancy of the child. In this work, a cylindrical phantom, representing an adult chest made of polymethylmethacrylate (PMMA), was used and a new born chest phantom with a shape oblong was developed based on the dimensions of a typical newborn. In a Ge CT scanner, Discovery model, with 64 channels, the central slice of the phantoms were irradiated successively in order to obtain dose measurements using an ionizing pencil camera. Based in the measurements, dose index was calculated (CTDI vol ). The radiological service chest protocol using a voltage of 120 kV was used for scanning 10 cm of the central area of the adult and newborn phantom, in helical mode. An acquisition of images was performed using this radiological service chest protocol to compare with the protocol optimized. In the newborn phantom was also used protocols optimized using a voltage of 120 and 80 kV. The voltage of 80 kV has the lowest dose index for the pediatric object phantom. This work allowed the comparison between absorbed dose variations by the pediatric phantom changing the X-ray tube supply voltage. This dose variation has shown how important is specific protocols for children. (Author)

  20. Optimal and secure measurement protocols for quantum sensor networks

    Science.gov (United States)

    Eldredge, Zachary; Foss-Feig, Michael; Gross, Jonathan A.; Rolston, S. L.; Gorshkov, Alexey V.

    2018-04-01

    Studies of quantum metrology have shown that the use of many-body entangled states can lead to an enhancement in sensitivity when compared with unentangled states. In this paper, we quantify the metrological advantage of entanglement in a setting where the measured quantity is a linear function of parameters individually coupled to each qubit. We first generalize the Heisenberg limit to the measurement of nonlocal observables in a quantum network, deriving a bound based on the multiparameter quantum Fisher information. We then propose measurement protocols that can make use of Greenberger-Horne-Zeilinger (GHZ) states or spin-squeezed states and show that in the case of GHZ states the protocol is optimal, i.e., it saturates our bound. We also identify nanoscale magnetic resonance imaging as a promising setting for this technology.

  1. Optimal linear detectors for nonorthogonal amplify-and-forward protocol

    KAUST Repository

    Ahmed, Qasim Zeeshan; Park, Kihong; Alouini, Mohamed-Slim; Aissa, Sonia

    2013-01-01

    In this paper, we propose optimal linear detectors for non-orthogonal amplify-and-forward cooperative protocol when considering a single-relay scenario. Two types of detectors are proposed based on the principles of minimum mean square error (MMSE) and minimum bit error rate (MBER). The MMSE detector minimizes the mean square error, while the MBER minimizes the system bit error rate (BER). Both detectors exhibit excellent BER performance with relatively low complexity as compared to the maximal likelihood (ML) detector. The BER performance of both detectors is superior to the channel inversion, the maximal ratio combining, and the biased ML detectors. © 2013 IEEE.

  2. Optimal linear detectors for nonorthogonal amplify-and-forward protocol

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2013-06-01

    In this paper, we propose optimal linear detectors for non-orthogonal amplify-and-forward cooperative protocol when considering a single-relay scenario. Two types of detectors are proposed based on the principles of minimum mean square error (MMSE) and minimum bit error rate (MBER). The MMSE detector minimizes the mean square error, while the MBER minimizes the system bit error rate (BER). Both detectors exhibit excellent BER performance with relatively low complexity as compared to the maximal likelihood (ML) detector. The BER performance of both detectors is superior to the channel inversion, the maximal ratio combining, and the biased ML detectors. © 2013 IEEE.

  3. Optimization of Protocol CT, PET-CT, whole body

    International Nuclear Information System (INIS)

    Gutierrez, Fredys Santos; Namias, Mauro

    2013-01-01

    The objective of this study was to optimize the acquisition protocols and processing existing of the CT PET/CT scanner for clinical use of Nuclear Diagnostic Center Foundation, a way to minimize the radiation dose while maintaining diagnostic image quality properly. Dosimetric data of PET / CT service were surveyed and obtained the baseline against which we compare and define strategies and modifications to develop online. We selected transaxial up to the pulmonary hilum and liver slices as the anatomical regions of interest that led to the standardization of the study

  4. Dose optimization for multislice computed tomography protocols of the midface

    International Nuclear Information System (INIS)

    Lorenzen, M.; Wedegaertner, U.; Weber, C.; Adam, G.; Lorenzen, J.; Lockemann, U.

    2005-01-01

    Purpose: to optimize multislice computed tomography (MSCT) protocols of the midface for dose reduction and adequate image quality. Materials and methods: MSCT (somatom volume zoom, siemens) of the midface was performed on 3 cadavers within 24 hours of death with successive reduction of the tube current, applying 150, 100, 70 and 30 mAs at 120 kV as well as 40 and 21 mAs at 80 kV. At 120 kV, a pitch of 0.875 and collimation of 4 x 1 mm were used, and at 80 kV, a pitch of 0.7 and collimation of 2 x 0.5 mm. Images were reconstructed in transverse and coronal orientation. Qualitative image analysis was separately performed by two radiologists using a five-point scale (1 = excellent; 5 = poor) applying the following parameters: image quality, demarcation and sharpness of lamellar bone, overall image quality, and image noise (1 = minor; 5 = strong). The effective body dose [mSv] and organ dose [mSv] of the ocular lens (using the dosimetry system ''WINdose'') were calculated, and the interobserver agreement (kappa coefficient) was determined. Results: for the evaluation of the lamellar bone, adequate sharpness, demarcation and image quality was demonstrated at 120 kV/30 mAs, and for the overall image quality and noise, 120 kV/40 mAs was acceptable. With regard to image quality, the effective body dose could be reduced from 1.89 mSv to 0.34 mSv and the organ dose of the ocular lens from 27.2 mSv to 4.8 mSv. Interobserver agreement was moderate (kappa = 0.39). Conclusion: adequate image quality was achieved for MSCT protocols of the midface with 30 mAs at 120 kV, resulting in a dose reduction of 70% in comparison to standard protocols. (orig.)

  5. iTOUGH2 Universal Optimization Using the PEST Protocol

    International Nuclear Information System (INIS)

    Finsterle, S.A.

    2010-01-01

    , the PEST protocol [Doherty, 2007] has been implemented into iTOUGH2. This protocol enables communication between the application (which can be a single 'black-box' executable or a script or batch file that calls multiple codes) and iTOUGH2. The concept requires that for the application model: (1) Input is provided on one or more ASCII text input files; (2) Output is returned to one or more ASCII text output files; (3) The model is run using a system command (executable or script/batch file); and (4) The model runs to completion without any user intervention. For each forward run invoked by iTOUGH2, select parameters cited within the application model input files are then overwritten with values provided by iTOUGH2, and select variables cited within the output files are extracted and returned to iTOUGH2. It should be noted that the core of iTOUGH2, i.e., its optimization routines and related analysis tools, remains unchanged; it is only the communication format between input parameters, the application model, and output variables that are borrowed from PEST. The interface routines have been provided by Doherty [2007]. The iTOUGH2-PEST architecture is shown in Figure 1. This manual contains installation instructions for the iTOUGH2-PEST module, and describes the PEST protocol as well as the input formats needed in iTOUGH2. Examples are provided that demonstrate the use of model-independent optimization and analysis using iTOUGH2.

  6. Dispersion of Nanomaterials in Aqueous Media: Towards Protocol Optimization.

    Science.gov (United States)

    Kaur, Inder; Ellis, Laura-Jayne; Romer, Isabella; Tantra, Ratna; Carriere, Marie; Allard, Soline; Mayne-L'Hermite, Martine; Minelli, Caterina; Unger, Wolfgang; Potthoff, Annegret; Rades, Steffi; Valsami-Jones, Eugenia

    2017-12-25

    The sonication process is commonly used for de-agglomerating and dispersing nanomaterials in aqueous based media, necessary to improve homogeneity and stability of the suspension. In this study, a systematic step-wise approach is carried out to identify optimal sonication conditions in order to achieve a stable dispersion. This approach has been adopted and shown to be suitable for several nanomaterials (cerium oxide, zinc oxide, and carbon nanotubes) dispersed in deionized (DI) water. However, with any change in either the nanomaterial type or dispersing medium, there needs to be optimization of the basic protocol by adjusting various factors such as sonication time, power, and sonicator type as well as temperature rise during the process. The approach records the dispersion process in detail. This is necessary to identify the time points as well as other above-mentioned conditions during the sonication process in which there may be undesirable changes, such as damage to the particle surface thus affecting surface properties. Our goal is to offer a harmonized approach that can control the quality of the final, produced dispersion. Such a guideline is instrumental in ensuring dispersion quality repeatability in the nanoscience community, particularly in the field of nanotoxicology.

  7. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  8. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  9. Clinical dosimetry in molecular radiotherapy: protocol optimization and clinical implementation

    International Nuclear Information System (INIS)

    Ferrer, Ludovic

    2011-01-01

    Molecular radiotherapy (mrt) consists in destructing tumour targets by radiolabelled vectors. This nuclear medicine specialty is being considered with increasing interest for example via the success achieved in the treatment of non-Hodgkin lymphomas by radioimmunotherapy. One of the keys of mrt optimization relies on the personalising of absorbed doses delivered to the patient: This is required to ascertain that irradiation is focused on tumour cells while keeping surrounding healthy tissue irradiation at an acceptable - non-toxic - level. Radiation dose evaluation in mrt requires in one hand, the spatial and temporal localization of injected radioactive sources by scintigraphic imaging, and on a second hand, the knowledge of the emitted radiation propagating media, given by CT imaging. Global accuracy relies on the accuracy of each of the steps that contribute to clinical dosimetry. There is no reference, standardized dosimetric protocol to date. Due to heterogeneous implementations, evaluation of the accuracy of the absorbed dose is a difficult task. In this thesis, we developed and evaluated different dosimetric approaches that allow us to find a relationship between the absorbed dose to the bone marrow and haematological toxicity. Besides, we built a scientific project, called DosiTest, which aims at evaluating the impact of the various step that contribute to the realization of a dosimetric study, by means of a virtual multicentric comparison based on Monte-Carlo modelling. (author) [fr

  10. Optimizing Urine Processing Protocols for Protein and Metabolite Detection.

    Science.gov (United States)

    Siddiqui, Nazema Y; DuBois, Laura G; St John-Williams, Lisa; Will, Thompson J; Grenier, Carole; Burke, Emily; Fraser, Matthew O; Amundsen, Cindy L; Murphy, Susan K

    In urine, factors such as timing of voids, and duration at room temperature (RT) may affect the quality of recovered protein and metabolite data. Additives may aid with detection, but can add more complexity in sample collection or analysis. We aimed to identify the optimal urine processing protocol for clinically-obtained urine samples that allows for the highest protein and metabolite yields with minimal degradation. Healthy women provided multiple urine samples during the same day. Women collected their first morning (1 st AM) void and another "random void". Random voids were aliquotted with: 1) no additive; 2) boric acid (BA); 3) protease inhibitor (PI); or 4) both BA + PI. Of these aliquots, some were immediately stored at 4°C, and some were left at RT for 4 hours. Proteins and individual metabolites were quantified, normalized to creatinine concentrations, and compared across processing conditions. Sample pools corresponding to each processing condition were analyzed using mass spectrometry to assess protein degradation. Ten Caucasian women between 35-65 years of age provided paired 1 st morning and random voided urine samples. Normalized protein concentrations were slightly higher in 1 st AM compared to random "spot" voids. The addition of BA did not significantly change proteins, while PI significantly improved normalized protein concentrations, regardless of whether samples were immediately cooled or left at RT for 4 hours. In pooled samples, there were minimal differences in protein degradation under the various conditions we tested. In metabolite analyses, there were significant differences in individual amino acids based on the timing of the void. For comparative translational research using urine, information about void timing should be collected and standardized. For urine samples processed in the same day, BA does not appear to be necessary while the addition of PI enhances protein yields, regardless of 4°C or RT storage temperature.

  11. Polymerase chain reaction: basic protocol plus troubleshooting and optimization strategies.

    Science.gov (United States)

    Lorenz, Todd C

    2012-05-22

    In the biological sciences there have been technological advances that catapult the discipline into golden ages of discovery. For example, the field of microbiology was transformed with the advent of Anton van Leeuwenhoek's microscope, which allowed scientists to visualize prokaryotes for the first time. The development of the polymerase chain reaction (PCR) is one of those innovations that changed the course of molecular science with its impact spanning countless subdisciplines in biology. The theoretical process was outlined by Keppe and coworkers in 1971; however, it was another 14 years until the complete PCR procedure was described and experimentally applied by Kary Mullis while at Cetus Corporation in 1985. Automation and refinement of this technique progressed with the introduction of a thermal stable DNA polymerase from the bacterium Thermus aquaticus, consequently the name Taq DNA polymerase. PCR is a powerful amplification technique that can generate an ample supply of a specific segment of DNA (i.e., an amplicon) from only a small amount of starting material (i.e., DNA template or target sequence). While straightforward and generally trouble-free, there are pitfalls that complicate the reaction producing spurious results. When PCR fails it can lead to many non-specific DNA products of varying sizes that appear as a ladder or smear of bands on agarose gels. Sometimes no products form at all. Another potential problem occurs when mutations are unintentionally introduced in the amplicons, resulting in a heterogeneous population of PCR products. PCR failures can become frustrating unless patience and careful troubleshooting are employed to sort out and solve the problem(s). This protocol outlines the basic principles of PCR, provides a methodology that will result in amplification of most target sequences, and presents strategies for optimizing a reaction. By following this PCR guide, students should be able to: • Set up reactions and thermal cycling

  12. Cost-optimization of the IPv4 zeroconf protocol

    NARCIS (Netherlands)

    Bohnenkamp, H.C.; van der Stok, Peter; Hermanns, H.; Vaandrager, Frits

    2003-01-01

    This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfiguration of IP network interfaces. We develop a simple stochastic cost model of the protocol, where reliability is measured

  13. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  14. Security Protocol Verification and Optimization by Epistemic Model Checking

    Science.gov (United States)

    2010-11-05

    Three cryptographers are sitting down to dinner at their favourite restau- rant. Their waiter informs them that arrangements have been made with the...Unfortunately, the protocol cannot be expected to satisfy this: suppose that all agents manage to broadcast their mes- sage and all messages have the

  15. Hardware Abstraction and Protocol Optimization for Coded Sensor Networks

    DEFF Research Database (Denmark)

    Nistor, Maricica; Roetter, Daniel Enrique Lucani; Barros, João

    2015-01-01

    The design of the communication protocols in wireless sensor networks (WSNs) often neglects several key characteristics of the sensor's hardware, while assuming that the number of transmitted bits is the dominating factor behind the system's energy consumption. A closer look at the hardware speci...

  16. Blocking Optimality in Distributed Real-Time Locking Protocols

    Directory of Open Access Journals (Sweden)

    Björn Bernhard Brandenburg

    2014-09-01

    Full Text Available Lower and upper bounds on the maximum priority inversion blocking (pi-blocking that is generally unavoidable in distributed multiprocessor real-time locking protocols (where resources may be accessed only from specific synchronization processors are established. Prior work on suspension-based shared-memory multiprocessor locking protocols (which require resources to be accessible from all processors has established asymptotically tight bounds of Ω(m and Ω(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively, where m denotes the total number of processors and n denotes the number of tasks. In this paper, it is shown that, in the case of distributed semaphore protocols, there exist two different task allocation scenarios that give rise to distinct lower bounds. In the case of co-hosted task allocation, where application tasks may also be assigned to synchronization processors (i.e., processors hosting critical sections, Ω(Φ · n maximum pi-blocking is unavoidable for some tasks under any locking protocol under both suspension-aware and suspension-oblivious schedulability analysis, where Φ denotes the ratio of the maximum response time to the shortest period. In contrast, in the case of disjoint task allocation (i.e., if application tasks may not be assigned to synchronization processors, only Ω(m and Ω(n maximum pi-blocking is fundamentally unavoidable under suspension-oblivious and suspension-aware analysis, respectively, as in the shared-memory case. These bounds are shown to be asymptotically tight with the construction of two new distributed real-time locking protocols that ensure O(m and O(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively.

  17. Optimization of a sample processing protocol for recovery of Bacillus anthracis spores from soil

    Science.gov (United States)

    Silvestri, Erin E.; Feldhake, David; Griffin, Dale; Lisle, John T.; Nichols, Tonya L.; Shah, Sanjiv; Pemberton, A; Schaefer III, Frank W

    2016-01-01

    Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps. Optimization of the protocol included: identifying an ideal extraction diluent, variation in the number of wash steps, variation in the initial centrifugation speed, sonication and shaking mechanisms. The optimized protocol was demonstrated at two laboratories in order to evaluate the recovery of spores from loamy and sandy soils. The new protocol demonstrated an improved limit of detection for loamy and sandy soils over the non-optimized protocol with an approximate matrix limit of detection at 14 spores/g of soil. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol will be robust enough to use at multiple laboratories while achieving comparable recoveries.

  18. Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Ma

    2018-01-01

    Full Text Available The wireless monitoring system is always destroyed by the insufficient energy of the sensors in railway. Hence, how to optimize the communication protocol and extend the system lifetime is crucial to ensure the stability of system. However, the existing studies focused primarily on cluster-based or multihop protocols individually, which are ineffective in coping with the complex communication scenarios in the railway wireless monitoring system (RWMS. This study proposes a hybrid protocol which combines the cluster-based and multihop protocols (CMCP to minimize and balance the energy consumption in different sections of the RWMS. In the first hierarchy, the total energy consumption is minimized by optimizing the cluster quantities in the cluster-based protocol and the number of hops and the corresponding hop distances in the multihop protocol. In the second hierarchy, the energy consumption is balanced through rotating the cluster head (CH in the subnetworks and further optimizing the hops and the corresponding hop distances in the backbone network. On this basis, the system lifetime is maximized with the minimum and balance energy consumption among the sensors. Furthermore, the hybrid particle swarm optimization and genetic algorithm (PSO-GA are adopted to optimize the energy consumption from the two-layer hierarchy. Finally, the effectiveness of the proposed CMCP is verified in the simulation. The performances of the proposed CMCP in system lifetime, residual energy, and the corresponding variance are all superior to the LEACH protocol widely applied in the previous research. The effective protocol proposed in this study can facilitate the application of the wireless monitoring network in the railway system and enhance safety operation of the railway.

  19. Protocol optimization for enhanced production of pigments in Spirulina.

    Science.gov (United States)

    Kumar, Devendra; Kumar, Neeraj; Pabbi, Sunil; Walia, Suresh; Dhar, Dolly Wattal

    2013-01-01

    Spirulina has attracted special attention due to its importance as human foodstuff and natural colours with specific functional properties. These functional properties have been attributed to phycobilins, carotenoids, phenolics and unsaturated fatty acids. Present study was conducted under controlled phytotron conditions to identify the efficient strains of Spirulina in terms of pigment synthesis and to optimize their enhanced production. Methodology for enhanced production was standardized by varying specific environmental parameters (light intensity, temperature, carbon dioxide concentration, pH and NaCl level). Different strains of Spirulina depicted variability and environmental parameters showed distinct influence on pigments. Growth and pigment production was recorded to be most efficient under optimized conditions of light intensity (70 μmol m -2  s -1 ), temperature (30 °C), CO 2 concentration (550 ppm and 750 ppm), pH (10.5) and NaCl level (2 g L -1 ).

  20. Optimization of oligonucleotide arrays and RNA amplification protocols for analysis of transcript structure and alternative splicing.

    Science.gov (United States)

    Castle, John; Garrett-Engele, Phil; Armour, Christopher D; Duenwald, Sven J; Loerch, Patrick M; Meyer, Michael R; Schadt, Eric E; Stoughton, Roland; Parrish, Mark L; Shoemaker, Daniel D; Johnson, Jason M

    2003-01-01

    Microarrays offer a high-resolution means for monitoring pre-mRNA splicing on a genomic scale. We have developed a novel, unbiased amplification protocol that permits labeling of entire transcripts. Also, hybridization conditions, probe characteristics, and analysis algorithms were optimized for detection of exons, exon-intron edges, and exon junctions. These optimized protocols can be used to detect small variations and isoform mixtures, map the tissue specificity of known human alternative isoforms, and provide a robust, scalable platform for high-throughput discovery of alternative splicing.

  1. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    Science.gov (United States)

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  2. Reduction of cancer risk by optimization of Computed Tomography head protocols: far eastern Cuban experience

    International Nuclear Information System (INIS)

    Miller Clemente, R.; Adame Brooks, D.; Lores Guevara, M.; Perez Diaz, M.; Arias Garlobo, M. L.; Ortega Rodriguez, O.; Nepite Haber, R.; Grinnan Hernandez, O.; Guillama Llosas, A.

    2015-01-01

    The cancer risk estimation constitutes one way for the evaluation of the public health, regarding computed tomography (CT) exposures. Starting from the hypothesis that the optimization of CT protocols would reduce significantly the added cancer risk, the purpose of this research was the application of optimization strategies regarding head CT protocols, in order to reduce the factors affecting the risk of induced cancer. The applied systemic approach included technological and human components, represented by quantitative physical factors. the volumetric kerma indexes, compared with respect to standard, optimized and reference values, were evaluated with multiple means comparison method. The added cancer risk resulted from the application of the methodology for biological effects evaluation, at low doses with low Linear Energy Transfer. Human observers in all scenarios evaluated the image quality. the reduced dose was significantly lower than for standard head protocols and reference levels, where: (1) for pediatric patients, by using an Automatic Exposure Control system, a reduction of 31% compared with standard protocol and ages range of 10-14, and (2) adults, using a Bilateral Filter for images obtained at low doses of 62% from those of standard head protocol. The risk reduction was higher than 25%. The systemic approach used allows the effective identification of factors involved on cancer risk related with exposures to CT. The combination of dose modulation and image restoration with Bilateral Filter, provide a significantly reduction of cancer risk, with acceptable diagnostic image quality. (Author)

  3. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in

  4. Is gait variability reliable in older adults and Parkinson's disease? Towards an optimal testing protocol.

    Science.gov (United States)

    Galna, Brook; Lord, Sue; Rochester, Lynn

    2013-04-01

    Despite the widespread use of gait variability in research and clinical studies, testing protocols designed to optimise its reliability have not been established. This study evaluates the impact of testing protocol and pathology on the reliability of gait variability. To (i) estimate the reliability of gait variability during continuous and intermittent walking protocols in older adults and people with Parkinson's disease (PD), (ii) determine optimal number of steps for acceptable levels of reliability of gait variability and (iii) provide sample size estimates for use in clinical trials. Gait variability was measured twice, one week apart, in 27 older adults and 25 PD participants. Participants walked at their preferred pace during: (i) a continuous 2 min walk and (ii) 3 intermittent walks over a 12 m walkway. Gait variability was calculated as the within-person standard deviation for step velocity, length and width, and step, stance and swing duration. Reliability of gait variability ranged from poor to excellent (intra class correlations .041-.860; relative limits of agreement 34-89%). Gait variability was more reliable during continuous walks. Control and PD participants demonstrated similar reliability. Increasing the number of steps improved reliability, with most improvement seen across the first 30 steps. In this study, we identified testing protocols that improve the reliability of measuring gait variability. We recommend using a continuous walking protocol and to collect no fewer than 30 steps. Early PD does not appear to impact negatively on the reliability of gait variability. Copyright © 2012 Elsevier B.V. All rights reserved.

  5. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    Science.gov (United States)

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  6. Single-cell qPCR on dispersed primary pituitary cells -an optimized protocol

    Directory of Open Access Journals (Sweden)

    Haug Trude M

    2010-11-01

    Full Text Available Abstract Background The incidence of false positives is a potential problem in single-cell PCR experiments. This paper describes an optimized protocol for single-cell qPCR measurements in primary pituitary cell cultures following patch-clamp recordings. Two different cell harvesting methods were assessed using both the GH4 prolactin producing cell line from rat, and primary cell culture from fish pituitaries. Results Harvesting whole cells followed by cell lysis and qPCR performed satisfactory on the GH4 cell line. However, harvesting of whole cells from primary pituitary cultures regularly produced false positives, probably due to RNA leakage from cells ruptured during the dispersion of the pituitary cells. To reduce RNA contamination affecting the results, we optimized the conditions by harvesting only the cytosol through a patch pipette, subsequent to electrophysiological experiments. Two important factors proved crucial for reliable harvesting. First, silanizing the patch pipette glass prevented foreign extracellular RNA from attaching to charged residues on the glass surface. Second, substituting the commonly used perforating antibiotic amphotericin B with β-escin allowed efficient cytosol harvest without loosing the giga seal. Importantly, the two harvesting protocols revealed no difference in RNA isolation efficiency. Conclusion Depending on the cell type and preparation, validation of the harvesting technique is extremely important as contaminations may give false positives. Here we present an optimized protocol allowing secure harvesting of RNA from single cells in primary pituitary cell culture following perforated whole cell patch clamp experiments.

  7. Quality and dose optimized CT trauma protocol. Recommendation from a university level-I trauma center

    Energy Technology Data Exchange (ETDEWEB)

    Kahn, Johannes; Boening, Georg; Rotzinger, Roman; Freyhardt, Patrick; Streitparth, Florian [Charite School of Medicine and Univ. Hospital Berlin (Germany). Dept. of Radiology; Kaul, David [Charite School of Medicine and Univ. Hospital Berlin (Germany). Dept. of Radiation Oncology; Schwabe, Philipp [Charite School of Medicine and Univ. Hospital Berlin (Germany). Dept. of Trauma Surgery; Maurer, Martin H. [Inselspital Bern (Switzerland). Dept. of Diagnostic, Interventional and Pediatric Radiology; Renz, Diane Miriam [Univ. Hospital Jena (Germany). Inst. of Diagnostic and Interventional Radiology

    2017-09-15

    As a supra-regional level-I trauma center, we evaluated computed tomography (CT) acquisitions of polytraumatized patients for quality and dose optimization purposes. Adapted statistical iterative reconstruction [(AS)IR] levels, tube voltage reduction as well as a split-bolus contrast agent (CA) protocol were applied. Materials and Methods 61 patients were split into 3 different groups that differed with respect to tube voltage (120 - 140 kVp) and level of applied ASIR reconstruction (ASIR 20 - 50%). The CT protocol included a native acquisition of the head followed by a single contrast-enhanced acquisition of the whole body (64-MSCT). CA (350 mg/ml iodine) was administered as a split bolus injection of 100 ml (2 ml/s), 20 ml NaCl (1 ml/s), 60 ml (4 ml/s), 40 ml NaCl (4 ml/s) with a scan delay of 85s to detect injuries of both the arterial system and parenchymal organs in a single acquisition. Both the quantitative (SNR/CNR) and qualitative (5-point Likert scale) image quality was evaluated in parenchymal organs that are often injured in trauma patients. Radiation exposure was assessed. The use of IR combined with a reduction of tube voltage resulted in good qualitative and quantitative image quality and a significant reduction in radiation exposure of more than 40% (DLP 1087 vs. 647 mGy x cm). Image quality could be improved due to a dedicated protocol that included different levels of IR adapted to different slice thicknesses, kernels and the examined area for the evaluation of head, lung, body and bone injury patterns. In synopsis of our results, we recommend the implementation of a polytrauma protocol with a tube voltage of 120 kVp and the following IR levels: cCT 5mm: ASIR 20; cCT 0.625 mm: ASIR 40; lung 2.5 mm: ASIR 30, body 5 mm: ASIR 40; body 1.25 mm: ASIR 50; body 0.625 mm: ASIR 0. A dedicated adaptation of the CT trauma protocol (level of reduction of tube voltage and of IR) according to the examined body region (head, lung, body, bone) combined with a

  8. Quality and dose optimized CT trauma protocol. Recommendation from a university level-I trauma center

    International Nuclear Information System (INIS)

    Kahn, Johannes; Boening, Georg; Rotzinger, Roman; Freyhardt, Patrick; Streitparth, Florian; Kaul, David; Schwabe, Philipp; Maurer, Martin H.; Renz, Diane Miriam

    2017-01-01

    As a supra-regional level-I trauma center, we evaluated computed tomography (CT) acquisitions of polytraumatized patients for quality and dose optimization purposes. Adapted statistical iterative reconstruction [(AS)IR] levels, tube voltage reduction as well as a split-bolus contrast agent (CA) protocol were applied. Materials and Methods 61 patients were split into 3 different groups that differed with respect to tube voltage (120 - 140 kVp) and level of applied ASIR reconstruction (ASIR 20 - 50%). The CT protocol included a native acquisition of the head followed by a single contrast-enhanced acquisition of the whole body (64-MSCT). CA (350 mg/ml iodine) was administered as a split bolus injection of 100 ml (2 ml/s), 20 ml NaCl (1 ml/s), 60 ml (4 ml/s), 40 ml NaCl (4 ml/s) with a scan delay of 85s to detect injuries of both the arterial system and parenchymal organs in a single acquisition. Both the quantitative (SNR/CNR) and qualitative (5-point Likert scale) image quality was evaluated in parenchymal organs that are often injured in trauma patients. Radiation exposure was assessed. The use of IR combined with a reduction of tube voltage resulted in good qualitative and quantitative image quality and a significant reduction in radiation exposure of more than 40% (DLP 1087 vs. 647 mGy x cm). Image quality could be improved due to a dedicated protocol that included different levels of IR adapted to different slice thicknesses, kernels and the examined area for the evaluation of head, lung, body and bone injury patterns. In synopsis of our results, we recommend the implementation of a polytrauma protocol with a tube voltage of 120 kVp and the following IR levels: cCT 5mm: ASIR 20; cCT 0.625 mm: ASIR 40; lung 2.5 mm: ASIR 30, body 5 mm: ASIR 40; body 1.25 mm: ASIR 50; body 0.625 mm: ASIR 0. A dedicated adaptation of the CT trauma protocol (level of reduction of tube voltage and of IR) according to the examined body region (head, lung, body, bone) combined with a

  9. Development of an optimized random amplified polymorphic DNA protocol for fingerprinting of Klebsiella pneumoniae.

    Science.gov (United States)

    Ashayeri-Panah, M; Eftekhar, F; Feizabadi, M M

    2012-04-01

    To develop an optimized random amplified polymorphic DNA (RAPD) protocol for fingerprinting clinical isolates of Klebsiella pneumoniae. Employing factorial design of experiments, repeatable amplification patterns were obtained for 54 nosocomial isolates using 1 μmol 1(-1) primer, 4 mmol 1(-1) MgCl(2), 0·4 mmol 1(-1) dNTPs, 2·5 U Taq DNA polymerase and 90 ng DNA template in a total volume of 25 μl. The optimum thermocycling program was: initial denaturation at 94°C for 4 min followed by 50 cycles of 1 min at 94°C, 2 min at 34°C, 2 min at 72°C and a final extension at 72°C for 10 min. The optimized RAPD protocol was highly discriminatory (Simpson's diversity index, 0·982), and all isolates were typable with repeatable patterns (Pearson's similarity coefficient ≈ 100%). Seven main clusters were obtained on a similarity level of 70% and 32 distinct clusters on a similarity level of 85%, reflecting the heterogeneity of the isolates. Systematic optimization of RAPD generated reliable DNA fingerprints for nosocomial isolates of K. pneumoniae. This is the first report on RAPD optimization based on factorial design of experiments for discrimination of K. pneumoniae. © 2012 The Authors. Letters in Applied Microbiology © 2012 The Society for Applied Microbiology.

  10. Optimization of an Efficient and Sustainable Sonogashira Cross-Coupling Protocol

    KAUST Repository

    Walter, Philipp E.

    2012-12-01

    Cross coupling reactions are a well-established tool in modern organic synthesis and play a crucial role in the synthesis of a high number of organic compounds. Their importance is highlighted by the Nobel Prize in chemistry to Suzuki, Heck and Negishi in 2010. The increasing importance of sustainability requirements in chemical production has furthermore promoted the development of cross-coupling protocols that comply with the principles of “Green Chemistry”1. The Sonogashira reaction is today the most versatile and powerful way to generate aryl alkynes, a moiety recurring in many pharmaceutical and natural products. Despite many improvements to the original reaction, reports on generally applicable protocols that work under sustainable conditions are scarce. Our group recently reported an efficient protocol for a copperfree Sonogashira cross-coupling at low temperature, in aqueous medium and with no addition of organic solvents or additives2. The goal of this work was to further investigate the effects of different reaction parameters on the catalytic activity in order to optimize the protocol. Limitations of the protocol were tested in respect to reaction temperature, heating method, atmosphere, base type and amount, catalyst loading, reaction time and work up procedure. The reaction worked successfully under air and results were not affected by the presence of oxygen in the water phase. Among a variety of bases tested, triethylamine was confirmed to give the best results and its required excess could be reduced from nine to four equivalents. Catalyst loading could also be reduced by up to 90%: Good to near quantitative yields for a broad range of substrates were achieved using a catalyst concentration of 0.25mol% and 5 eq of Et3N at 50°C while more reactive substrates could be coupled with a catalyst concentration as low as 0.025mol%. Filtration experiments showed the possibility of a simplified work up procedure and a protocol completely free of organic

  11. Penicillin allergy: optimizing diagnostic protocols, public health implications, and future research needs.

    Science.gov (United States)

    Macy, Eric

    2015-08-01

    Unverified penicillin allergy is being increasingly recognized as a public health concern. The ideal protocol for verifying true clinically significant IgE-mediated penicillin allergy needs to use only commercially available materials, be well tolerated and easy to perform in both the inpatient and outpatient settings, and minimize false-positive determinations. This review concentrates on articles published in 2013 and 2014 that present new data relating to the diagnosis and management of penicillin allergy. Penicillin allergy can be safely evaluated at this time, in patients with an appropriate clinical history of penicillin allergy, using only penicilloyl-poly-lysine and native penicillin G as skin test reagents, if an oral challenge with amoxicillin 250 mg, followed by 1 h of observation, is given to all skin test negative individuals. Millions of individuals falsely labeled with penicillin allergy need to be evaluated to safely allow them to use penicillin-class antibiotics and avoid morbidity associated with penicillin avoidance. Further research is needed to determine optimal protocol(s). There will still be a 1-2% rate of adverse reactions reported with all future therapeutic penicillin-class antibiotic use, even with optimal methods used to determine acute penicillin tolerance. Only a small minority of these new reactions will be IgE-mediated.

  12. Optimized energy-delay sub-network routing protocol development and implementation for wireless sensor networks

    International Nuclear Information System (INIS)

    Fonda, James W; Zawodniok, Maciej; Jagannathan, S; Watkins, Steve E

    2008-01-01

    The development and the implementation issues of a reactive optimized energy-delay sub-network routing (OEDSR) protocol for wireless sensor networks (WSN) are introduced and its performance is contrasted with the popular ad hoc on-demand distance vector (AODV) routing protocol. Analytical results illustrate the performance of the proposed OEDSR protocol, while experimental results utilizing a hardware testbed under various scenarios demonstrate improvements in energy efficiency of the OEDSR protocol. A hardware platform constructed at the University of Missouri-Rolla (UMR), now the Missouri University of Science and Technology (MST), based on the Generation 4 Smart Sensor Node (G4-SSN) prototyping platform is also described. Performance improvements are shown in terms of end-to-end (E2E) delay, throughput, route-set-up time and drop rates and energy usage is given for three topologies, including a mobile topology. Additionally, results from the hardware testbed provide valuable lessons for network deployments. Under testing OEDSR provides a factor of ten improvement in the energy used in the routing session and extends network lifetime compared to AODV. Depletion experiments show that the time until the first node failure is extended by a factor of three with the network depleting and network lifetime is extended by 6.7%

  13. Optimized workflow and imaging protocols for whole-body oncologic PET/MRI.

    Science.gov (United States)

    Ishii, Shirou; Hara, Takamitsu; Nanbu, Takeyuki; Suenaga, Hiroki; Sugawara, Shigeyasu; Kuroiwa, Daichi; Sekino, Hirofumi; Miyajima, Masayuki; Kubo, Hitoshi; Oriuchi, Noboru; Ito, Hiroshi

    2016-11-01

    Although PET/MRI has the advantages of a simultaneous acquisition of PET and MRI, high soft-tissue contrast of the MRI images, and reduction of radiation exposure, its low profitability and long acquisition time are significant problems in clinical settings. Thus, MRI protocols that meet oncological purposes need to be used in order to reduce examination time while securing detectability. Currently, half-Fourier acquisition single-shot turbo spin echo and 3D-T1 volumetric interpolated breath-hold examination may be the most commonly used sequences for whole-body imaging due to their shorter acquisition time and higher diagnostic accuracy. Although there have been several reports that adding diffusion weighted image (DWI) to PET/MRI protocol has had no effect on tumor detection to date, in cases of liver, kidney, bladder, and prostate cancer, the use of DWI may be beneficial in detecting lesions. Another possible option is to scan each region with different MRI sequences instead of scanning the whole body using one sequence continuously. We herein report a workflow and imaging protocols for whole-body oncologic PET/MRI using an integrated system in the clinical routine, designed for the detection, for example by cancer screening, of metastatic lesions, in order to help future users optimize their workflow and imaging protocols.

  14. Optimal protocol for maximum work extraction in a feedback process with a time-varying potential

    Science.gov (United States)

    Kwon, Chulan

    2017-12-01

    The nonequilibrium nature of information thermodynamics is characterized by the inequality or non-negativity of the total entropy change of the system, memory, and reservoir. Mutual information change plays a crucial role in the inequality, in particular if work is extracted and the paradox of Maxwell's demon is raised. We consider the Brownian information engine where the protocol set of the harmonic potential is initially chosen by the measurement and varies in time. We confirm the inequality of the total entropy change by calculating, in detail, the entropic terms including the mutual information change. We rigorously find the optimal values of the time-dependent protocol for maximum extraction of work both for the finite-time and the quasi-static process.

  15. Quality and Dose Optimized CT Trauma Protocol - Recommendation from a University Level-I Trauma Center.

    Science.gov (United States)

    Kahn, Johannes; Kaul, David; Böning, Georg; Rotzinger, Roman; Freyhardt, Patrick; Schwabe, Philipp; Maurer, Martin H; Renz, Diane Miriam; Streitparth, Florian

    2017-09-01

    Purpose  As a supra-regional level-I trauma center, we evaluated computed tomography (CT) acquisitions of polytraumatized patients for quality and dose optimization purposes. Adapted statistical iterative reconstruction [(AS)IR] levels, tube voltage reduction as well as a split-bolus contrast agent (CA) protocol were applied. Materials and Methods  61 patients were split into 3 different groups that differed with respect to tube voltage (120 - 140 kVp) and level of applied ASIR reconstruction (ASIR 20 - 50 %). The CT protocol included a native acquisition of the head followed by a single contrast-enhanced acquisition of the whole body (64-MSCT). CA (350 mg/ml iodine) was administered as a split bolus injection of 100 ml (2 ml/s), 20 ml NaCl (1 ml/s), 60 ml (4 ml/s), 40 ml NaCl (4 ml/s) with a scan delay of 85 s to detect injuries of both the arterial system and parenchymal organs in a single acquisition. Both the quantitative (SNR/CNR) and qualitative (5-point Likert scale) image quality was evaluated in parenchymal organs that are often injured in trauma patients. Radiation exposure was assessed. Results  The use of IR combined with a reduction of tube voltage resulted in good qualitative and quantitative image quality and a significant reduction in radiation exposure of more than 40 % (DLP 1087 vs. 647 mGyxcm). Image quality could be improved due to a dedicated protocol that included different levels of IR adapted to different slice thicknesses, kernels and the examined area for the evaluation of head, lung, body and bone injury patterns. In synopsis of our results, we recommend the implementation of a polytrauma protocol with a tube voltage of 120 kVp and the following IR levels: cCT 5mm: ASIR 20; cCT 0.625 mm: ASIR 40; lung 2.5 mm: ASIR 30, body 5 mm: ASIR 40; body 1.25 mm: ASIR 50; body 0.625 mm: ASIR 0. Conclusion  A dedicated adaptation of the CT trauma protocol (level of reduction of tube voltage and of IR

  16. An optimized protocol for isolating primary epithelial cell chromatin for ChIP.

    Directory of Open Access Journals (Sweden)

    James A Browne

    Full Text Available A critical part of generating robust chromatin immunoprecipitation (ChIP data is the optimization of chromatin purification and size selection. This is particularly important when ChIP is combined with next-generation sequencing (ChIP-seq to identify targets of DNA-binding proteins, genome-wide. Current protocols refined by the ENCODE consortium generally use a two-step cell lysis procedure that is applicable to a wide variety of cell types. However, the isolation and size selection of chromatin from primary human epithelial cells may often be particularly challenging. These cells tend to form sheets of formaldehyde cross-linked material in which cells are resistant to membrane lysis, nuclei are not released and subsequent sonication produces extensive high molecular weight contamination. Here we describe an optimized protocol to prepare high quality ChIP-grade chromatin from primary human bronchial epithelial cells. The ENCODE protocol was used as a starting point to which we added the following key steps to separate the sheets of formaldehyde-fixed cells prior to lysis. (1 Incubation of the formaldehyde-fixed adherent cells in Trypsin-EDTA (0.25% room temperature for no longer than 5 min. (2 Equilibration of the fixed cells in detergent-free lysis buffers prior to each lysis step. (3 The addition of 0.5% Triton X-100 to the complete cell membrane lysis buffer. (4 Passing the cell suspension (in complete cell membrane lysis buffer through a 25-gauge needle followed by continuous agitation on ice for 35 min. Each step of the modified protocol was documented by light microscopy using the Methyl Green-Pyronin dual dye, which stains cytoplasm red (Pyronin and the nuclei grey-blue (Methyl green. This modified method is reproducibly effective at producing high quality sheared chromatin for ChIP and is equally applicable to other epithelial cell types.

  17. Solving iTOUGH2 simulation and optimization problems using the PEST protocol

    Energy Technology Data Exchange (ETDEWEB)

    Finsterle, S.A.; Zhang, Y.

    2011-02-01

    The PEST protocol has been implemented into the iTOUGH2 code, allowing the user to link any simulation program (with ASCII-based inputs and outputs) to iTOUGH2's sensitivity analysis, inverse modeling, and uncertainty quantification capabilities. These application models can be pre- or post-processors of the TOUGH2 non-isothermal multiphase flow and transport simulator, or programs that are unrelated to the TOUGH suite of codes. PEST-style template and instruction files are used, respectively, to pass input parameters updated by the iTOUGH2 optimization routines to the model, and to retrieve the model-calculated values that correspond to observable variables. We summarize the iTOUGH2 capabilities and demonstrate the flexibility added by the PEST protocol for the solution of a variety of simulation-optimization problems. In particular, the combination of loosely coupled and tightly integrated simulation and optimization routines provides both the flexibility and control needed to solve challenging inversion problems for the analysis of multiphase subsurface flow and transport systems.

  18. Outcomes of Optimized over Standard Protocol of Rabbit Antithymocyte Globulin for Severe Aplastic Anemia: A Single-Center Experience

    Science.gov (United States)

    Ge, Meili; Shao, Yingqi; Huang, Jinbo; Huang, Zhendong; Zhang, Jing; Nie, Neng; Zheng, Yizhou

    2013-01-01

    Background Previous reports showed that outcome of rabbit antithymocyte globulin (rATG) was not satisfactory as the first-line therapy for severe aplastic anemia (SAA). We explored a modifying schedule of administration of rATG. Design and Methods Outcomes of a cohort of 175 SAA patients, including 51 patients administered with standard protocol (3.55 mg/kg/d for 5 days) and 124 cases with optimized protocol (1.97 mg/kg/d for 9 days) of rATG plus cyclosporine (CSA), were analyzed retrospectively. Results Of all 175 patients, response rates at 3 and 6 months were 36.6% and 56.0%, respectively. 51 cases received standard protocol had poor responses at 3 (25.5%) and 6 months (41.2%). However, 124 patients received optimized protocol had better responses at 3 (41.1%, P = 0.14) and 6 (62.1%, P = 0.01). Higher incidences of infection (57.1% versus 37.9%, P = 0.02) and early mortality (17.9% versus 0.8%, P<0.001) occurred in patients received standard protocol compared with optimized protocol. The 5-year overall survival in favor of the optimized over standard rATG protocol (76.0% versus. 50.3%, P<0.001) was observed. By multivariate analysis, optimized protocol (RR = 2.21, P = 0.04), response at 3 months (RR = 10.31, P = 0.03) and shorter interval (<23 days) between diagnosis and initial dose of rATG (RR = 5.35, P = 0.002) were independent favorable predictors of overall survival. Conclusions Optimized instead of standard rATG protocol in combination with CSA remained efficacious as a first-line immunosuppressive regimen for SAA. PMID:23554855

  19. Discrete Particle Swarm Optimization Routing Protocol for Wireless Sensor Networks with Multiple Mobile Sinks.

    Science.gov (United States)

    Yang, Jin; Liu, Fagui; Cao, Jianneng; Wang, Liangming

    2016-07-14

    Mobile sinks can achieve load-balancing and energy-consumption balancing across the wireless sensor networks (WSNs). However, the frequent change of the paths between source nodes and the sinks caused by sink mobility introduces significant overhead in terms of energy and packet delays. To enhance network performance of WSNs with mobile sinks (MWSNs), we present an efficient routing strategy, which is formulated as an optimization problem and employs the particle swarm optimization algorithm (PSO) to build the optimal routing paths. However, the conventional PSO is insufficient to solve discrete routing optimization problems. Therefore, a novel greedy discrete particle swarm optimization with memory (GMDPSO) is put forward to address this problem. In the GMDPSO, particle's position and velocity of traditional PSO are redefined under discrete MWSNs scenario. Particle updating rule is also reconsidered based on the subnetwork topology of MWSNs. Besides, by improving the greedy forwarding routing, a greedy search strategy is designed to drive particles to find a better position quickly. Furthermore, searching history is memorized to accelerate convergence. Simulation results demonstrate that our new protocol significantly improves the robustness and adapts to rapid topological changes with multiple mobile sinks, while efficiently reducing the communication overhead and the energy consumption.

  20. Optimized protocols for cardiac magnetic resonance imaging in patients with thoracic metallic implants.

    Science.gov (United States)

    Olivieri, Laura J; Cross, Russell R; O'Brien, Kendall E; Ratnayaka, Kanishka; Hansen, Michael S

    2015-09-01

    Cardiac magnetic resonance (MR) imaging is a valuable tool in congenital heart disease; however patients frequently have metal devices in the chest from the treatment of their disease that complicate imaging. Methods are needed to improve imaging around metal implants near the heart. Basic sequence parameter manipulations have the potential to minimize artifact while limiting effects on image resolution and quality. Our objective was to design cine and static cardiac imaging sequences to minimize metal artifact while maintaining image quality. Using systematic variation of standard imaging parameters on a fluid-filled phantom containing commonly used metal cardiac devices, we developed optimized sequences for steady-state free precession (SSFP), gradient recalled echo (GRE) cine imaging, and turbo spin-echo (TSE) black-blood imaging. We imaged 17 consecutive patients undergoing routine cardiac MR with 25 metal implants of various origins using both standard and optimized imaging protocols for a given slice position. We rated images for quality and metal artifact size by measuring metal artifact in two orthogonal planes within the image. All metal artifacts were reduced with optimized imaging. The average metal artifact reduction for the optimized SSFP cine was 1.5+/-1.8 mm, and for the optimized GRE cine the reduction was 4.6+/-4.5 mm (P metal artifact reduction for the optimized TSE images was 1.6+/-1.7 mm (P metal artifact are easily created by modifying basic sequence parameters, and images are superior to standard imaging sequences in both quality and artifact size. Specifically, for optimized cine imaging a GRE sequence should be used with settings that favor short echo time, i.e. flow compensation off, weak asymmetrical echo and a relatively high receiver bandwidth. For static black-blood imaging, a TSE sequence should be used with fat saturation turned off and high receiver bandwidth.

  1. Soft chelating irrigation protocol optimizes bonding quality of Resilon/Epiphany root fillings.

    Science.gov (United States)

    De-Deus, Gustavo; Namen, Fátima; Galan, João; Zehnder, Matthias

    2008-06-01

    This study was designed to test the impact of either a strong (MTAD) or a soft (1-hydroxyethylidene-1, 1-bisphosphonate [HEPB]) chelating solution on the bond strength of Resilon/Epiphany root fillings. Both 17% EDTA and the omission of a chelator in the irrigation protocol were used as reference treatments. Forty extracted human upper lateral incisors were prepared using different irrigation protocols (n = 10): G1: NaOCl, G2: NaOCl + 17% EDTA, G3: NaOCl + BioPure MTAD (Dentsply/Tulsa, Tulsa, OK), and G4: NaOCl + 18% HEPB. The teeth were obturated and then prepared for micropush-out assessment using root slices of 1 mm thickness. Loading was performed on a universal testing machine at a speed of 0.5 mm/min. One-way analysis of variance and Tukey multiple comparisons were used to compare the results among the experimental groups. EDTA- and MTAD-treated samples revealed intermediate bond strength (0.3-3.6 MPa). The lowest bond strengths were achieved in NaOCl-treated samples (0.3-1.2 MPa, p < 0.05). The highest bond strength was reached in the HEBP-treated samples (3.1-6.1 MPa, p < 0.05). Under the present in vitro conditions, the soft chelating irrigation protocol (18% HEBP) optimized the bonding quality of Resilon/Epiphany (Resilon Research LLC, Madison, CT) root fillings.

  2. Optimization of Saanen sperm genes amplification: evaluation of standardized protocols in genetically uncharacterized rural goats reared under a subtropical environment.

    Science.gov (United States)

    Barbour, Elie K; Saade, Maya F; Sleiman, Fawwak T; Hamadeh, Shady K; Mouneimne, Youssef; Kassaifi, Zeina; Kayali, Ghazi; Harakeh, Steve; Jaber, Lina S; Shaib, Houssam A

    2012-10-01

    The purpose of this research is to optimize quantitatively the amplification of specific sperm genes in reference genomically characterized Saanen goat and to evaluate the standardized protocols applicability on sperms of uncharacterized genome of rural goats reared under subtropical environment for inclusion in future selection programs. The optimization of the protocols in Saanen sperms included three production genes (growth hormone (GH) exons 2, 3, and 4, αS1-casein (CSN1S1), and α-lactalbumin) and two health genes (MHC class II DRB and prion (PrP)). The optimization was based on varying the primers concentrations and the inclusion of a PCR cosolvent (Triton X). The impact of the studied variables on statistically significant increase in the yield of amplicons was noticed in four out of five (80%) optimized protocols, namely in those related to GH, CSN1S1, α-lactalbumin, and PrP genes (P 0.05). The applicability of the optimized protocols of Saanen sperm genes on amplification of uncharacterized rural goat sperms revealed a 100% success in tested individuals for amplification of GH, CSN1S1, α-lactalbumin, and MHC class II DRB genes and a 75% success for the PrP gene. The significant success in applicability of the Saanen quantitatively optimized protocols to other uncharacterized genome of rural goats allows for their inclusion in future selection, targeting the sustainability of this farming system in a subtropical environment and the improvement of the farmers livelihood.

  3. Multihopping Multilevel Clustering Heterogeneity-Sensitive Optimized Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-01-01

    Full Text Available Effective utilization of energy resources in Wireless Sensor Networks (WSNs has become challenging under uncertain distributed cluster-formation and single-hop intercluster communication capabilities. So, sensor nodes are forced to operate at expensive full rate transmission power level continuously during whole network operation. These challenging network environments experience unwanted phenomena of drastic energy consumption and packet drop. In this paper, we propose an adaptive immune Multihopping Multilevel Clustering (MHMLC protocol that executes a Hybrid Clustering Algorithm (HCA to perform optimal centralized selection of Cluster-Heads (CHs within radius of centrally located Base Station (BS and distributed CHs selection in the rest of network area. HCA of MHMLC also produces optimal intermediate CHs for intercluster multihop communications that develop heterogeneity-aware economical links. This hybrid cluster-formation facilitates the sensors to function at short range transmission power level that enhances link quality and avoids packet drop. The simulation environments produce fair comparison among proposed MHMLC and existing state-of-the-art routing protocols. Experimental results give significant evidence of better performance of the proposed model in terms of network lifetime, stability period, and data delivery ratio.

  4. TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective

    International Nuclear Information System (INIS)

    MacDougall, R.

    2016-01-01

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  5. Whatever works: a systematic user-centered training protocol to optimize brain-computer interfacing individually.

    Directory of Open Access Journals (Sweden)

    Elisabeth V C Friedrich

    Full Text Available This study implemented a systematic user-centered training protocol for a 4-class brain-computer interface (BCI. The goal was to optimize the BCI individually in order to achieve high performance within few sessions for all users. Eight able-bodied volunteers, who were initially naïve to the use of a BCI, participated in 10 sessions over a period of about 5 weeks. In an initial screening session, users were asked to perform the following seven mental tasks while multi-channel EEG was recorded: mental rotation, word association, auditory imagery, mental subtraction, spatial navigation, motor imagery of the left hand and motor imagery of both feet. Out of these seven mental tasks, the best 4-class combination as well as most reactive frequency band (between 8-30 Hz was selected individually for online control. Classification was based on common spatial patterns and Fisher's linear discriminant analysis. The number and time of classifier updates varied individually. Selection speed was increased by reducing trial length. To minimize differences in brain activity between sessions with and without feedback, sham feedback was provided in the screening and calibration runs in which usually no real-time feedback is shown. Selected task combinations and frequency ranges differed between users. The tasks that were included in the 4-class combination most often were (1 motor imagery of the left hand (2, one brain-teaser task (word association or mental subtraction (3, mental rotation task and (4 one more dynamic imagery task (auditory imagery, spatial navigation, imagery of the feet. Participants achieved mean performances over sessions of 44-84% and peak performances in single-sessions of 58-93% in this user-centered 4-class BCI protocol. This protocol is highly adjustable to individual users and thus could increase the percentage of users who can gain and maintain BCI control. A high priority for future work is to examine this protocol with severely

  6. TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective

    Energy Technology Data Exchange (ETDEWEB)

    MacDougall, R. [Boston Children’s Hospital (United States)

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  7. Optimized protocols for cardiac magnetic resonance imaging in patients with thoracic metallic implants

    Energy Technology Data Exchange (ETDEWEB)

    Olivieri, Laura J.; Ratnayaka, Kanishka [Children' s National Health System, Division of Cardiology, Washington, DC (United States); National Institutes of Health, National Heart, Lung and Blood Institute, Bethesda, MD (United States); Cross, Russell R.; O' Brien, Kendall E. [Children' s National Health System, Division of Cardiology, Washington, DC (United States); Hansen, Michael S. [National Institutes of Health, National Heart, Lung and Blood Institute, Bethesda, MD (United States)

    2015-09-15

    Cardiac magnetic resonance (MR) imaging is a valuable tool in congenital heart disease; however patients frequently have metal devices in the chest from the treatment of their disease that complicate imaging. Methods are needed to improve imaging around metal implants near the heart. Basic sequence parameter manipulations have the potential to minimize artifact while limiting effects on image resolution and quality. Our objective was to design cine and static cardiac imaging sequences to minimize metal artifact while maintaining image quality. Using systematic variation of standard imaging parameters on a fluid-filled phantom containing commonly used metal cardiac devices, we developed optimized sequences for steady-state free precession (SSFP), gradient recalled echo (GRE) cine imaging, and turbo spin-echo (TSE) black-blood imaging. We imaged 17 consecutive patients undergoing routine cardiac MR with 25 metal implants of various origins using both standard and optimized imaging protocols for a given slice position. We rated images for quality and metal artifact size by measuring metal artifact in two orthogonal planes within the image. All metal artifacts were reduced with optimized imaging. The average metal artifact reduction for the optimized SSFP cine was 1.5+/-1.8 mm, and for the optimized GRE cine the reduction was 4.6+/-4.5 mm (P < 0.05). Quality ratings favored the optimized GRE cine. Similarly, the average metal artifact reduction for the optimized TSE images was 1.6+/-1.7 mm (P < 0.05), and quality ratings favored the optimized TSE imaging. Imaging sequences tailored to minimize metal artifact are easily created by modifying basic sequence parameters, and images are superior to standard imaging sequences in both quality and artifact size. Specifically, for optimized cine imaging a GRE sequence should be used with settings that favor short echo time, i.e. flow compensation off, weak asymmetrical echo and a relatively high receiver bandwidth. For static

  8. Optimizing a Treadmill Ramp Protocol to Evaluate Aerobic Capacity of Hemiparetic Poststroke Patients.

    Science.gov (United States)

    Bernardes, Wendell L; Montenegro, Rafael A; Monteiro, Walace D; de Almeida Freire, Raul; Massaferri, Renato; Farinatti, Paulo

    2018-03-01

    Bernardes, WL, Montenegro, RA, Monteiro, WD, de Almeida Freire, R, Massaferri, R, and Farinatti, P. Optimizing a treadmill ramp protocol to evaluate aerobic capacity of hemiparetic poststroke patients. J Strength Cond Res 32(3): 876-884, 2018-A correct assessment of cardiopulmonary capacity is important for aerobic training within motor rehabilitation of poststroke hemiparetic patients (PSHPs). However, specific cardiopulmonary exercise testing (CPET) for these patients are scarce. We proposed adaptations in a protocol originally developed for PSHPs by Ovando et al. (CPET1). We hypothesized that our adapted protocol (CPET2) would improve the original test, by preventing early fatigue and increasing patients' peak performance. Eleven PSHPs (52 ± 14 years, 10 men) performed both protocols. CPET2 integrated changes in final speed (100-120% vs. 140% maximal speed in 10-m walking test), treadmill inclination (final inclination of 5 vs. 10%), and estimated test duration (10 vs. 8 minutes) to smooth the rate of workload increment of CPET1. Peak oxygen uptake (V[Combining Dot Above]O2peak) (20.3 ± 6.1 vs. 18.6 ± 5.0 ml·kg·min; p = 0.04), V[Combining Dot Above]O2 at gas exchange transition (V[Combining Dot Above]O2-GET) (11.5 ± 2.9 vs. 9.8 ± 2.0 ml·kg·min; p = 0.04), and time to exhaustion (10 ± 3 vs. 6 ± 2 minutes; p higher in CPET2 than in CPET1. Slopes and intercepts of regressions describing relationships between V[Combining Dot Above]O2 vs. workload, heart rate vs. workload, and V[Combining Dot Above]O2 vs. heart rate were similar between CPETs. However, standard errors of estimates obtained for regressions between heart rate vs. workload (3.0 ± 1.3 vs. 3.8 ± 1.0 b·min; p = 0.004) and V[Combining Dot Above]O2 vs. heart rate (6.0 ± 2.1 vs. 4.8 ± 2.4 ml·kg·min; p = 0.05) were lower in CPET2 than in CPET1. In conclusion, the present adaptations in Ovando's CPET protocol increased exercise tolerance of PSHPs, eliciting higher V[Combining Dot Above]O2peak

  9. Optimal protocol for teleconsultation with a cellular phone for dentoalveolar trauma: an in-vitro study

    International Nuclear Information System (INIS)

    Park, Won Se; Lee, Hae Na; Jeong, Jin Sun; Kwon, Jung Hoon; Lee, Grace H; Kim, Kee Dong

    2012-01-01

    Dental trauma is frequently unpredictable. The initial assessment and urgent treatment are essential for dentists to save the patient's teeth. Mobile-phone-assisted teleconsultation and telediagnosis for dental trauma could be an aid when a dentist is not available. In the present in-vitro study, we evaluated the success rate and time to transfer images under various conditions. We analyzed the image quality of cameras built into mobile phones based on their resolution, autofocus, white-balance, and anti-movement functions. The image quality of most built-in cameras was acceptable to perform the initial assessment, with the autofocus function being essential to obtain high-quality images. The transmission failure rate increased markedly when the image size exceeded 500 kB and the additional text messaging did not improve the success rate or the transmission time. Our optimal protocol could be useful for emergency programs running on the mobile phones.

  10. Optimal protocol for teleconsultation with a cellular phone for dentoalveolar trauma: an in-vitro study

    Energy Technology Data Exchange (ETDEWEB)

    Park, Won Se; Lee, Hae Na; Jeong, Jin Sun; Kwon, Jung Hoon; Lee, Grace H; Kim, Kee Dong [College of Dentistry, Yonsei University, Seoul (Korea, Republic of)

    2012-06-15

    Dental trauma is frequently unpredictable. The initial assessment and urgent treatment are essential for dentists to save the patient's teeth. Mobile-phone-assisted teleconsultation and telediagnosis for dental trauma could be an aid when a dentist is not available. In the present in-vitro study, we evaluated the success rate and time to transfer images under various conditions. We analyzed the image quality of cameras built into mobile phones based on their resolution, autofocus, white-balance, and anti-movement functions. The image quality of most built-in cameras was acceptable to perform the initial assessment, with the autofocus function being essential to obtain high-quality images. The transmission failure rate increased markedly when the image size exceeded 500 kB and the additional text messaging did not improve the success rate or the transmission time. Our optimal protocol could be useful for emergency programs running on the mobile phones.

  11. Optimizing the multimodal approach to pancreatic cyst fluid diagnosis: developing a volume-based triage protocol.

    Science.gov (United States)

    Chai, Siaw Ming; Herba, Karl; Kumarasinghe, M Priyanthi; de Boer, W Bastiaan; Amanuel, Benhur; Grieu-Iacopetta, Fabienne; Lim, Ee Mun; Segarajasingam, Dev; Yusoff, Ian; Choo, Chris; Frost, Felicity

    2013-02-01

    The objective of this study was to develop a triage algorithm to optimize diagnostic yield from cytology, carcinoembryonic antigen (CEA), and v-Ki-ras2 Kirsten rat sarcoma viral oncogene homolog (KRAS) testing on different components of a single pancreatic cyst fluid specimen. The authors also sought to determine whether cell block supernatant was suitable for CEA and KRAS testing. Fifty-four pancreatic cysts were triaged according to a volume-dependent protocol to generate fluid (neat and supernatant) and cell block specimens for cytology, comparative CEA, and KRAS testing. Follow-up histology, diagnostic cytology, or a combined clinicopathologic interpretation was recorded as the final diagnosis. There were 26 mucinous cystic lesions and 28 nonmucinous cystic lesions with volumes ranging from 0.3 mL to 55 mL. Testing different components of the specimens (cell block, neat, and/or supernatant) enabled all laboratory investigations to be performed on 50 of 54 cyst fluids (92.6%). Interpretive concordance was observed in 17 of 17 cases (100%) and in 35 of 40 cases (87.5%) that had multiple components tested for CEA and KRAS mutations, respectively. An elevated CEA level (>192 ng/mL) was the most sensitive test for the detection of a mucinous cystic lesion (62.5%) versus KRAS mutation (56%) and "positive" cytology (61.5%). KRAS mutations were identified in 2 of 25 mucinous cystic lesions (8%) in which cytology and CEA levels were not contributory. A volume-based protocol using different components of the specimen was able to optimize diagnostic yield in pancreatic cyst fluids. KRAS mutation testing increased diagnostic yield when combined with cytology and CEA analysis. The current results demonstrated that supernatant is comparable to neat fluid and cell block material for CEA and KRAS testing. Copyright © 2012 American Cancer Society.

  12. Investigation of optimal scanning protocol for X-ray computed tomography polymer gel dosimetry

    Energy Technology Data Exchange (ETDEWEB)

    Sellakumar, P. [Bangalore Institute of Oncology, 44-45/2, II Cross, RRMR Extension, Bangalore 560 027 (India)], E-mail: psellakumar@rediffmail.com; James Jebaseelan Samuel, E. [School of Science and Humanities, VIT University, Vellore 632 014 (India); Supe, Sanjay S. [Department of Radiation Physics, Kidwai Memorial Institute of Oncology, Hosur Road, Bangalore 560 027 (India)

    2007-11-15

    X-ray computed tomography is one of the potential tool used to evaluate the polymer gel dosimeters in three dimensions. The purpose of this study is to investigate the factors which affect the image noise for X-ray CT polymer gel dosimetry. A cylindrical water filled phantom was imaged with single slice Siemens Somatom Emotion CT scanner. The imaging parameters like tube voltage, tube current, slice scan time, slice thickness and reconstruction algorithm were varied independently to study the dependence of noise on each other. Reductions of noise with number of images to be averaged and spatial uniformity of the image were also investigated. Normoxic polymer gel PAGAT was manufactured and irradiated using Siemens Primus linear accelerator. The radiation induced change in CT number was evaluated using X-ray CT scanner. From this study it is clear that image noise is reduced with increase in tube voltage, tube current, slice scan time, slice thickness and also reduced with increasing the number of images averaged. However to reduce the tube load and total scan time, it was concluded that tube voltage of 130 kV, tube current of 200 mA, scan time of 1.5 s, slice thickness of 3 mm for high dose gradient and 5 mm for low dose gradient were optimal scanning protocols for this scanner. Optimum number of images to be averaged was concluded to be 25 for X-ray CT polymer gel dosimetry. Choice of reconstruction algorithm was also critical. From the study it is also clear that CT number increase with imaging tube voltage and shows the energy dependency of polymer gel dosimeter. Hence for evaluation of polymer gel dosimeters with X-ray CT scanner needs the optimization of scanning protocols to reduce the image noise.

  13. Optimization of a protocol for cryopreservation of mouse spermatozoa using cryotubes.

    Science.gov (United States)

    Hasegawa, Ayumi; Yonezawa, Kazuya; Ohta, Akihiko; Mochida, Keiji; Ogura, Atsuo

    2012-01-01

    The rapid increase in the number of genetically modified mouse strains has produced a high demand for their frozen spermatozoa from laboratories and mouse banking facilities. Historically, plastic straws have been used preferentially as containers for frozen mammalian spermatozoa because spermatozoa frozen in plastic straws have a high survival rate after thawing. However, plastic straws are more fragile and are used less often than the cryotubes used for conventional cell freezing. In this study, we sought to develop a new protocol for sperm freezing using cryotubes as the container to increase the accessibility of mouse sperm cryopreservation. Epididymal spermatozoa were collected from mature ICR or C57BL/6J (B6) males and were suspended in 18% raffinose and 3% skim milk solution. We then optimized the following conditions using the sperm survival rate as an index: 1) distance of cryotubes from the surface of the liquid nitrogen at freezing, 2) volume of the sperm suspension in the cryotube and 3) temperature of warming sperm during thawing. The best result was obtained when cryotubes containing 10 µl of sperm suspension were immersed 1 cm below the surface of the liquid nitrogen and then thawed at 50 C. The fertilization rates using spermatozoa frozen and thawed using this method were 63.1% in ICR mice and 28.2% in B6 mice. The latter rate was increased to 62.3% by adding reduced glutathione to the fertilization medium. After embryo transfer, 68% and 62% of the fertilized oocytes developed into normal offspring in the ICR and B6 strains, respectively. These results show that cryotubes can be used for cryopreservation of mouse spermatozoa under optimized conditions. This protocol is easy and reproducible, and it may be used in laboratories that do not specialize in sperm cryopreservation.

  14. Optimized contrast volume for dynamic CT angiography in renal transplant patients using a multiphase CT protocol

    International Nuclear Information System (INIS)

    Helck, A.; Bamberg, F.; Sommer, W.H.; Wessely, M.; Becker, C.; Clevert, D.A.; Notohamiprodjo, M.; Reiser, M.; Nikolaou, K.

    2011-01-01

    Objectives: To study the feasibility of an optimized multiphase renal-CT-angiography (MP-CTA) protocol in patients with history of renal transplantation compared with Doppler-ultrasound (DUS). Methods: 36 Patients underwent both DUS and time-resolved, MP-CTA (12 phases), with a mean contrast-volume of 34.4 ± 5.1 ml. Quality of MP-CTA was assessed quantitatively (vascular attenuation) and qualitatively (grades 1–4, 1 = best). For the assessment of clinical value of MP-CTA, cases were grouped into normal, macrovascular (arterial/venous) and microvascular complications (parenchymal perfusion defect). DUS served as the standard of reference. Results: Using the best of 12 phases in each patient, optimal attenuation was 353 ± 111 HU, 337 ± 98 HU and 164 ± 51 HU in the iliac arteries, renal arteries, and renal veins, respectively. Mean image quality was 1.1 ± 0.3 (n = 36) and 2.1 ± 0.6 (n = 30) for the transplant renal arteries and veins, respectively. Six renal veins were non-diagnostic in MP-CTA. In 36 patients, MP-CTA showed 13 vascular complications and 10 parenchymal perfusion defects. DUS was not assessable in eight patients. Overall, MP-CTA showed 15 cases with pathology (42%) not identifiable with DUS. The mean effective radiation dose of the MP-CTA protocol was 13.5 ± 5.2 mSv. Conclusion: MP-CTA can be sufficiently performed with reduced contrast volume at reasonable radiation dose in renal transplant patients, providing substantially higher diagnostic yield than DUS.

  15. Establishment and optimization of NMR-based cell metabonomics study protocols for neonatal Sprague-Dawley rat cardiomyocytes.

    Science.gov (United States)

    Zhang, Ming; Sun, Bo; Zhang, Qi; Gao, Rong; Liu, Qiao; Dong, Fangting; Fang, Haiqin; Peng, Shuangqing; Li, Famei; Yan, Xianzhong

    2017-01-15

    A quenching, harvesting, and extraction protocol was optimized for cardiomyocytes NMR metabonomics analysis in this study. Trypsin treatment and direct scraping cells in acetonitrile were compared for sample harvesting. The results showed trypsin treatment cause normalized concentration increasing of phosphocholine and metabolites leakage, since the trypsin-induced membrane broken and long term harvesting procedures. Then the intracellular metabolite extraction efficiency of methanol and acetonitrile were compared. As a result, washing twice with phosphate buffer, direct scraping cells and extracting with acetonitrile were chosen to prepare cardiomyocytes extracts samples for metabonomics studies. This optimized protocol is rapid, effective, and exhibits greater metabolite retention. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. Optimization of a protocol for myocardial perfusion scintigraphy by using an anthropomorphic phantom*

    Science.gov (United States)

    Ramos, Susie Medeiros Oliveira; Glavam, Adriana Pereira; Kubo, Tadeu Takao Almodovar; de Sá, Lidia Vasconcellos

    2014-01-01

    Objective To develop a study aiming at optimizing myocardial perfusion imaging. Materials and Methods Imaging of an anthropomorphic thorax phantom with a GE SPECT Ventri gamma camera, with varied activities and acquisition times, in order to evaluate the influence of these parameters on the quality of the reconstructed medical images. The 99mTc-sestamibi radiotracer was utilized, and then the images were clinically evaluated on the basis of data such as summed stress score, and on the technical image quality and perfusion. The software ImageJ was utilized in the data quantification. Results The results demonstrated that for the standard acquisition time utilized in the procedure (15 seconds per angle), the injected activity could be reduced by 33.34%. Additionally, even if the standard scan time is reduced by 53.34% (7 seconds per angle), the standard injected activity could still be reduced by 16.67%, without impairing the image quality and the diagnostic reliability. Conclusion The described method and respective results provide a basis for the development of a clinical trial of patients in an optimized protocol. PMID:25741088

  17. Optimizing the Information Presentation on Mining Potential by using Web Services Technology with Restful Protocol

    Science.gov (United States)

    Abdillah, T.; Dai, R.; Setiawan, E.

    2018-02-01

    This study aims to develop the application of Web Services technology with RestFul Protocol to optimize the information presentation on mining potential. This study used User Interface Design approach for the information accuracy and relevance as well as the Web Service for the reliability in presenting the information. The results show that: the information accuracy and relevance regarding mining potential can be seen from the achievement of User Interface implementation in the application that is based on the following rules: The consideration of the appropriate colours and objects, the easiness of using the navigation, and users’ interaction with the applications that employs symbols and languages understood by the users; the information accuracy and relevance related to mining potential can be observed by the information presented by using charts and Tool Tip Text to help the users understand the provided chart/figure; the reliability of the information presentation is evident by the results of Web Services testing in Figure 4.5.6. This study finds out that User Interface Design and Web Services approaches (for the access of different Platform apps) are able to optimize the presentation. The results of this study can be used as a reference for software developers and Provincial Government of Gorontalo.

  18. Optimization of a protocol for myocardial perfusion scintigraphy by using an anthropomorphic phantom

    Energy Technology Data Exchange (ETDEWEB)

    Ramos, Susie Medeiros Oliveira; Sa, Lidia Vasconcellos de, E-mail: susie@ird.gov.br [Instituto de Radioprotecao e Dosimetria (IRD/CNEN-RJ), Rio de Janeiro, RJ (Brazil); Glavam, Adriana Pereira; Kubo, Tadeu Takao Almodovar [Clinica de Diagnostico Por Imagem (CDPI/DASA), Rio de Janeiro, RJ (Brazil)

    2014-07-15

    Objective: to develop a study aiming at optimizing myocardial perfusion imaging. Materials and Methods: imaging of an anthropomorphic thorax phantom with a GE SPECT Ventri gamma camera, with varied activities and acquisition times, in order to evaluate the influence of these parameters on the quality of the reconstructed medical images. The {sup 99m}Tc-sestamibi radiotracer was utilized, and then the images were clinically evaluated on the basis of data such as summed stress score, and on the technical image quality and perfusion. The software ImageJ was utilized in the data quantification. Results: the results demonstrated that for the standard acquisition time utilized in the procedure (15 seconds per angle), the injected activity could be reduced by 33.34%. Additionally, even if the standard scan time is reduced by 53.34% (7 seconds per angle), the standard injected activity could still be reduced by 16.67%, without impairing the image quality and the diagnostic reliability. Conclusion: the described method and respective results provide a basis for the development of a clinical trial of patients in an optimized protocol. (author)

  19. Rationale for and approach to preoperative opioid weaning: a preoperative optimization protocol

    Directory of Open Access Journals (Sweden)

    Heath McAnally

    2017-11-01

    Full Text Available Abstract The practice of chronic opioid prescription for chronic non-cancer pain has come under considerable scrutiny within the past several years as mounting evidence reveals a generally unfavorable risk to benefit ratio and the nation reels from the grim mortality statistics associated with the opioid epidemic. Patients struggling with chronic pain tend to use opioids and also seek out operative intervention for their complaints, which combination may be leading to increased postoperative “acute-on-chronic” pain and fueling worsened chronic pain and opioid dependence. Besides worsened postoperative pain, a growing body of literature, reviewed herein, indicates that preoperative opioid use is associated with significantly worsened surgical outcomes, and severely increased financial drain on an already severely overburdened healthcare budget. Conversely, there is evidence that preoperative opioid reduction may result in substantial improvements in outcome. In the era of accountable care, efforts such as the Enhanced Recovery After Surgery (ERAS protocol have been introduced in an attempt to standardize and facilitate evidence-based perioperative interventions to optimize surgical outcomes. We propose that addressing preoperative opioid reduction as part of a targeted optimization approach for chronic pain patients seeking surgery is not only logical but mandatory given the stakes involved. Simple opioid reduction/abstinence however is not likely to occur in the absence of provision of viable and palatable alternatives to managing pain, which will require a strong focus upon reducing pain catastrophization and bolstering self-efficacy and resilience. In response to a call from our surgical community toward that end, we have developed a simple and easy-to-implement outpatient preoperative optimization program focusing on gentle opioid weaning/elimination as well as a few other high-yield areas of intervention, requiring a minimum of resources.

  20. Dynamic whole body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-01-01

    Static whole body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single bed-coverage limiting the axial field-of-view to ~15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole body PET acquisition protocol of ~45min total length is presented, composed of (i) an initial 6-min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (6 passes x 7 bed positions, each scanned for 45sec). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares (OLS) Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of 10 different clinically

  1. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application.

    Science.gov (United States)

    Karakatsanis, Nicolas A; Lodge, Martin A; Tahari, Abdel K; Zhou, Y; Wahl, Richard L; Rahmim, Arman

    2013-10-21

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ~15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ~45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  2. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    International Nuclear Information System (INIS)

    Karakatsanis, Nicolas A; Lodge, Martin A; Tahari, Abdel K; Zhou, Y; Wahl, Richard L; Rahmim, Arman

    2013-01-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ∼15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ∼45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate K i and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different

  3. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-10-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ˜15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ˜45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  4. Ab initio thermochemistry using optimal-balance models with isodesmic corrections: The ATOMIC protocol

    Science.gov (United States)

    Bakowies, Dirk

    2009-04-01

    A theoretical composite approach, termed ATOMIC for Ab initio Thermochemistry using Optimal-balance Models with Isodesmic Corrections, is introduced for the calculation of molecular atomization energies and enthalpies of formation. Care is taken to achieve optimal balance in accuracy and cost between the various components contributing to high-level estimates of the fully correlated energy at the infinite-basis-set limit. To this end, the energy at the coupled-cluster level of theory including single, double, and quasiperturbational triple excitations is decomposed into Hartree-Fock, low-order correlation (MP2, CCSD), and connected-triples contributions and into valence-shell and core contributions. Statistical analyses for 73 representative neutral closed-shell molecules containing hydrogen and at least three first-row atoms (CNOF) are used to devise basis-set and extrapolation requirements for each of the eight components to maintain a given level of accuracy. Pople's concept of bond-separation reactions is implemented in an ab initio framework, providing for a complete set of high-level precomputed isodesmic corrections which can be used for any molecule for which a valence structure can be drawn. Use of these corrections is shown to lower basis-set requirements dramatically for each of the eight components of the composite model. A hierarchy of three levels is suggested for isodesmically corrected composite models which reproduce atomization energies at the reference level of theory to within 0.1 kcal/mol (A), 0.3 kcal/mol (B), and 1 kcal/mol (C). Large-scale statistical analysis shows that corrections beyond the CCSD(T) reference level of theory, including coupled-cluster theory with fully relaxed connected triple and quadruple excitations, first-order relativistic and diagonal Born-Oppenheimer corrections can normally be dealt with using a greatly simplified model that assumes thermoneutral bond-separation reactions and that reduces the estimate of these

  5. Optimization of Rb-82 PET acquisition and reconstruction protocols for myocardial perfusion defect detection

    Science.gov (United States)

    Tang, Jing; Rahmim, Arman; Lautamäki, Riikka; Lodge, Martin A.; Bengel, Frank M.; Tsui, Benjamin M. W.

    2009-05-01

    The purpose of this study is to optimize the dynamic Rb-82 cardiac PET acquisition and reconstruction protocols for maximum myocardial perfusion defect detection using realistic simulation data and task-based evaluation. Time activity curves (TACs) of different organs under both rest and stress conditions were extracted from dynamic Rb-82 PET images of five normal patients. Combined SimSET-GATE Monte Carlo simulation was used to generate nearly noise-free cardiac PET data from a time series of 3D NCAT phantoms with organ activities modeling different pre-scan delay times (PDTs) and total acquisition times (TATs). Poisson noise was added to the nearly noise-free projections and the OS-EM algorithm was applied to generate noisy reconstructed images. The channelized Hotelling observer (CHO) with 32× 32 spatial templates corresponding to four octave-wide frequency channels was used to evaluate the images. The area under the ROC curve (AUC) was calculated from the CHO rating data as an index for image quality in terms of myocardial perfusion defect detection. The 0.5 cycle cm-1 Butterworth post-filtering on OS-EM (with 21 subsets) reconstructed images generates the highest AUC values while those from iteration numbers 1 to 4 do not show different AUC values. The optimized PDTs for both rest and stress conditions are found to be close to the cross points of the left ventricular chamber and myocardium TACs, which may promote an individualized PDT for patient data processing and image reconstruction. Shortening the TATs for <~3 min from the clinically employed acquisition time does not affect the myocardial perfusion defect detection significantly for both rest and stress studies.

  6. ADAPTIVE CLUSTER BASED ROUTING PROTOCOL WITH ANT COLONY OPTIMIZATION FOR MOBILE AD-HOC NETWORK IN DISASTER AREA

    Directory of Open Access Journals (Sweden)

    Enrico Budianto

    2012-07-01

    Full Text Available In post-disaster rehabilitation efforts, the availability of telecommunication facilities takes important role. However, the process to improve telecommunication facilities in disaster area is risky if it is done by humans. Therefore, a network method that can work efficiently, effectively, and capable to reach the widest possible area is needed. This research introduces a cluster-based routing protocol named Adaptive Cluster Based Routing Protocol (ACBRP equipped by Ant Colony Optimization method, and its implementation in a simulator developed by author. After data analysis and statistical tests, it can be concluded that routing protocol ACBRP performs better than AODV and DSR routing protocol. Pada upaya rehabilitasi pascabencana, ketersediaan fasilitas telekomunikasi memiliki peranan yang sangat penting. Namun, proses untuk memperbaiki fasilitas telekomunikasi di daerah bencana memiliki resiko jika dilakukan oleh manusia. Oleh karena itu, metode jaringan yang dapat bekerja secara efisien, efektif, dan mampu mencapai area seluas mungkin diperlukan. Penelitian ini memperkenalkan sebuah protokol routing berbasis klaster bernama Adaptive Cluster Based Routing Protocol (ACBRP, yang dilengkapi dengan metode Ant Colony Optimization, dan diimplementasikan pada simulator yang dikembangkan penulis. Setelah data dianalisis dan dilakukan uji statistik, disimpulkan bahwa protokol routing ACBRP beroperasi lebih baik daripada protokol routing AODV maupun DSR.

  7. A Multipath Routing Protocol Based on Clustering and Ant Colony Optimization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jing Yang

    2010-05-01

    Full Text Available For monitoring burst events in a kind of reactive wireless sensor networks (WSNs, a multipath routing protocol (MRP based on dynamic clustering and ant colony optimization (ACO is proposed.. Such an approach can maximize the network lifetime and reduce the energy consumption. An important attribute of WSNs is their limited power supply, and therefore some metrics (such as energy consumption of communication among nodes, residual energy, path length were considered as very important criteria while designing routing in the MRP. Firstly, a cluster head (CH is selected among nodes located in the event area according to some parameters, such as residual energy. Secondly, an improved ACO algorithm is applied in the search for multiple paths between the CH and sink node. Finally, the CH dynamically chooses a route to transmit data with a probability that depends on many path metrics, such as energy consumption. The simulation results show that MRP can prolong the network lifetime, as well as balance of energy consumption among nodes and reduce the average energy consumption effectively.

  8. Promoting teamwork and surgical optimization: combining TeamSTEPPS with a specialty team protocol.

    Science.gov (United States)

    Tibbs, Sheila Marie; Moss, Jacqueline

    2014-11-01

    This quality improvement project was a 300-day descriptive preintervention and postintervention comparison consisting of a convenience sample of 18 gynecology surgical team members. We administered the Team Strategies & Tools to Enhance Performance and Patient Safety (TeamSTEPPS®) Teamwork Perception Questionnaire to measure the perception of teamwork. In addition, we collected data regarding rates of compliance (ie, huddle, time out) and measurable surgical procedure times. Results showed a statistically significant increase in the number of team members present for each procedure, 2.34 μ before compared with 2.61 μ after (P = .038), and in the final time-out (FTO) compliance as a result of a clarification of the definition of FTO, 1.05 μ before compared with 1.18 μ after (P = .004). Additionally, there was improvement in staff members' perception of teamwork. The implementation of team training, protocols, and algorithms can enhance surgical optimization, communication, and work relationships. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  9. Standardization and Optimization of Computed Tomography Protocols to Achieve Low-Dose

    Science.gov (United States)

    Chin, Cynthia; Cody, Dianna D.; Gupta, Rajiv; Hess, Christopher P.; Kalra, Mannudeep K.; Kofler, James M.; Krishnam, Mayil S.; Einstein, Andrew J.

    2014-01-01

    The increase in radiation exposure due to CT scans has been of growing concern in recent years. CT scanners differ in their capabilities and various indications require unique protocols, but there remains room for standardization and optimization. In this paper we summarize approaches to reduce dose, as discussed in lectures comprising the first session of the 2013 UCSF Virtual Symposium on Radiation Safety in Computed Tomography. The experience of scanning at low dose in different body regions, for both diagnostic and interventional CT procedures, is addressed. An essential primary step is justifying the medical need for each scan. General guiding principles for reducing dose include tailoring a scan to a patient, minimizing scan length, use of tube current modulation and minimizing tube current, minimizing-tube potential, iterative reconstruction, and periodic review of CT studies. Organized efforts for standardization have been spearheaded by professional societies such as the American Association of Physicists in Medicine. Finally, all team members should demonstrate an awareness of the importance of minimizing dose. PMID:24589403

  10. Blood cell mRNAs and microRNAs: optimized protocols for extraction and preservation.

    Science.gov (United States)

    Eikmans, Michael; Rekers, Niels V; Anholts, Jacqueline D H; Heidt, Sebastiaan; Claas, Frans H J

    2013-03-14

    Assessing messenger RNA (mRNA) and microRNA levels in peripheral blood cells may complement conventional parameters in clinical practice. Working with small, precious samples requires optimal RNA yields and minimal RNA degradation. Several procedures for RNA extraction and complementary DNA (cDNA) synthesis were compared for their efficiency. The effect on RNA quality of freeze-thawing peripheral blood cells and storage in preserving reagents was investigated. In terms of RNA yield and convenience, quality quantitative polymerase chain reaction signals per nanogram of total RNA and using NucleoSpin and mirVana columns is preferable. The SuperScript III protocol results in the highest cDNA yields. During conventional procedures of storing peripheral blood cells at -180°C and thawing them thereafter, RNA integrity is maintained. TRIzol preserves RNA in cells stored at -20°C. Detection of mRNA levels significantly decreases in degraded RNA samples, whereas microRNA molecules remain relatively stable. When standardized to reference targets, mRNA transcripts and microRNAs can be reliably quantified in moderately degraded (quality index 4-7) and severely degraded (quality index <4) RNA samples, respectively. We describe a strategy for obtaining high-quality and quantity RNA from fresh and stored cells from blood. The results serve as a guideline for sensitive mRNA and microRNA expression assessment in clinical material.

  11. Optimization of Protocols for In Vitro Regeneration of Sugarcane (Saccharum officinarum

    Directory of Open Access Journals (Sweden)

    Shakra Jamil

    2017-01-01

    Full Text Available Sugarcane contributes 60–70% of annual sugar production in the world. Somaclonal variation has potential to enhance genetic variation present within a species. Present study was done to optimize an in vitro propagation protocol for sugarcane. The experiments included four varieties, 9 callus induction media, 27 regeneration media, and 9 root induction media under two-factor factorial CRD. Data were recorded on callus induction, embryogenic callus formation, shoot elongation (cm, root induction, and plant regeneration. Statistically significant differences existed between genotypes and treatments for callus induction (%, embryogenic callus formation (%, shoot elongation (cm, root induction, and plant regeneration (%. All parameters showed dependency on genotypes, culture media, and their interaction. Highest callus induction (95% embryogenic callus formation (95% was observed in callus induction media 5. Highest plantlet regeneration (98.9% capacity was observed in regeneration media 11 whereas maximum shoot elongation (12.13 cm and root induction (8.32 were observed in rooting media 4. G1 showed best response for all traits and vice versa for G4. Hence it was concluded that G1, callus induction media 5, regeneration media 11, and rooting media 4 are the best conditions for in vitro propagation of sugarcane.

  12. Determination of an optimal priming duration and concentration protocol for pepper seeds (Capsicum annuum L.

    Directory of Open Access Journals (Sweden)

    Hassen ALOUI

    2015-12-01

    Full Text Available Seed priming is a simple pre-germination method to improve seed performance and to attenuate the effects of stress exposure. The objective of this study was to determinate an optimal priming protocol for three pepper cultivars (Capsicum annuum L.: ‘Beldi’, ‘Baklouti’ and ‘Anaheim Chili’. Seeds were primed with three solutions of NaCl, KCl and CaCl2 (0, 10, 20 and 50 mM for three different durations (12, 24 and 36h. Control seeds were soaked in distilled water for the same durations. After that, all seeds were kept to germinate in laboratory under normal light and controlled temperature. Results indicated that priming depends on concentration, duration and cultivar. The best combinations that we obtained were: KCl priming (10 mM, 36h for ‘Beldi’ cultivar, CaCl2 priming (10 mM, 36h for ‘Baklouti’ cultivar and finally NaCl priming (50 mM, 24h for ‘Anaheim Chili’ cultivar. Generally, priming had an effect on total germination percentage, mean germination time, germination index and the coefficient of velocity compared to control seeds. The beneficial effect of seed priming could be used for improving salt tolerance on germination and early seedling growth for pepper cultivar.

  13. Optimal Scanning Protocols for Dual-Energy CT Angiography in Peripheral Arterial Stents: An in Vitro Phantom Study

    Directory of Open Access Journals (Sweden)

    Abdulrahman Almutairi

    2015-05-01

    Full Text Available Objective: To identify the optimal dual-energy computed tomography (DECT scanning protocol for peripheral arterial stents while achieving a low radiation dose, while still maintaining diagnostic image quality, as determined by an in vitro phantom study. Methods: Dual-energy scans in monochromatic spectral imaging mode were performed on a peripheral arterial phantom with use of three gemstone spectral imaging (GSI protocols, three pitch values, and four kiloelectron volts (keV ranges. A total of 15 stents of different sizes, materials, and designs were deployed in the phantom. Image noise, the signal-to-noise ratio (SNR, different levels of adaptive statistical iterative reconstruction (ASIR, and the four levels of monochromatic energy for DECT imaging of peripheral arterial stents were measured and compared to determine the optimal protocols. Results: A total of 36 scans with 180 datasets were reconstructed from a combination of different protocols. There was a significant reduction of image noise with a higher SNR from monochromatic energy images between 65 and 70 keV in all investigated preset GSI protocols (p < 0.05. In addition, significant effects were found from the main effect analysis for these factors: GSI, pitch, and keV (p = 0.001. In contrast, there was significant interaction on the unstented area between GSI and ASIR (p = 0.015 and a very high significant difference between keV and ASIR (p < 0.001. A radiation dose reduction of 50% was achieved. Conclusions: The optimal scanning protocol and energy level in the phantom study were GSI-48, pitch value 0.984, and 65 keV, which resulted in lower image noise and a lower radiation dose, but with acceptable diagnostic images.

  14. Evaluating the optimal timing of surgical antimicrobial prophylaxis: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Mujagic, Edin; Zwimpfer, Tibor; Marti, Walter R; Zwahlen, Marcel; Hoffmann, Henry; Kindler, Christoph; Fux, Christoph; Misteli, Heidi; Iselin, Lukas; Lugli, Andrea Kopp; Nebiker, Christian A; von Holzen, Urs; Vinzens, Fabrizio; von Strauss, Marco; Reck, Stefan; Kraljević, Marko; Widmer, Andreas F; Oertli, Daniel; Rosenthal, Rachel; Weber, Walter P

    2014-05-24

    Surgical site infections are the most common hospital-acquired infections among surgical patients. The administration of surgical antimicrobial prophylaxis reduces the risk of surgical site infections . The optimal timing of this procedure is still a matter of debate. While most studies suggest that it should be given as close to the incision time as possible, others conclude that this may be too late for optimal prevention of surgical site infections. A large observational study suggests that surgical antimicrobial prophylaxis should be administered 74 to 30 minutes before surgery. The aim of this article is to report the design and protocol of a randomized controlled trial investigating the optimal timing of surgical antimicrobial prophylaxis. In this bi-center randomized controlled trial conducted at two tertiary referral centers in Switzerland, we plan to include 5,000 patients undergoing general, oncologic, vascular and orthopedic trauma procedures. Patients are randomized in a 1:1 ratio into two groups: one receiving surgical antimicrobial prophylaxis in the anesthesia room (75 to 30 minutes before incision) and the other receiving surgical antimicrobial prophylaxis in the operating room (less than 30 minutes before incision). We expect a significantly lower rate of surgical site infections with surgical antimicrobial prophylaxis administered more than 30 minutes before the scheduled incision. The primary outcome is the occurrence of surgical site infections during a 30-day follow-up period (one year with an implant in place). When assuming a 5% surgical site infection risk with administration of surgical antimicrobial prophylaxis in the operating room, the planned sample size has an 80% power to detect a relative risk reduction for surgical site infections of 33% when administering surgical antimicrobial prophylaxis in the anesthesia room (with a two-sided type I error of 5%). We expect the study to be completed within three years. The results of this

  15. Optimized Protocol for Protein Extraction from the Breast Tissue that is Compatible with Two-Dimensional Gel Electrophoresis

    Directory of Open Access Journals (Sweden)

    Olena Zakharchenko

    2011-01-01

    Full Text Available Proteomics is a highly informative approach to analyze cancer-associated transformation in tissues. The main challenge to use a tissue for proteomics studies is the small sample size and difficulties to extract and preserve proteins. The choice of a buffer compatible with proteomics applications is also a challenge. Here we describe a protocol optimized for the most efficient extraction of proteins from the human breast tissue in a buffer compatible with two-dimensional gel electrophoresis (2D-GE. This protocol is based on mechanically assisted disintegration of tissues directly in the 2D-GE buffer. Our method is simple, robust and easy to apply in clinical practice. We demonstrate high quality of separation of proteins prepared according to the reported here protocol.

  16. Practical considerations for optimizing cardiac computed tomography protocols for comprehensive acquisition prior to transcatheter aortic valve replacement.

    Science.gov (United States)

    Khalique, Omar K; Pulerwitz, Todd C; Halliburton, Sandra S; Kodali, Susheel K; Hahn, Rebecca T; Nazif, Tamim M; Vahl, Torsten P; George, Isaac; Leon, Martin B; D'Souza, Belinda; Einstein, Andrew J

    2016-01-01

    Transcatheter aortic valve replacement (TAVR) is performed frequently in patients with severe, symptomatic aortic stenosis who are at high risk or inoperable for open surgical aortic valve replacement. Computed tomography angiography (CTA) has become the gold standard imaging modality for pre-TAVR cardiac anatomic and vascular access assessment. Traditionally, cardiac CTA has been most frequently used for assessment of coronary artery stenosis, and scanning protocols have generally been tailored for this purpose. Pre-TAVR CTA has different goals than coronary CTA and the high prevalence of chronic kidney disease in the TAVR patient population creates a particular need to optimize protocols for a reduction in iodinated contrast volume. This document reviews details which allow the physician to tailor CTA examinations to maximize image quality and minimize harm, while factoring in multiple patient and scanner variables which must be considered in customizing a pre-TAVR protocol. Copyright © 2016 Society of Cardiovascular Computed Tomography. Published by Elsevier Inc. All rights reserved.

  17. An optimized protocol for generation and analysis of Ion Proton sequencing reads for RNA-Seq.

    Science.gov (United States)

    Yuan, Yongxian; Xu, Huaiqian; Leung, Ross Ka-Kit

    2016-05-26

    Previous studies compared running cost, time and other performance measures of popular sequencing platforms. However, comprehensive assessment of library construction and analysis protocols for Proton sequencing platform remains unexplored. Unlike Illumina sequencing platforms, Proton reads are heterogeneous in length and quality. When sequencing data from different platforms are combined, this can result in reads with various read length. Whether the performance of the commonly used software for handling such kind of data is satisfactory is unknown. By using universal human reference RNA as the initial material, RNaseIII and chemical fragmentation methods in library construction showed similar result in gene and junction discovery number and expression level estimated accuracy. In contrast, sequencing quality, read length and the choice of software affected mapping rate to a much larger extent. Unspliced aligner TMAP attained the highest mapping rate (97.27 % to genome, 86.46 % to transcriptome), though 47.83 % of mapped reads were clipped. Long reads could paradoxically reduce mapping in junctions. With reference annotation guide, the mapping rate of TopHat2 significantly increased from 75.79 to 92.09 %, especially for long (>150 bp) reads. Sailfish, a k-mer based gene expression quantifier attained highly consistent results with that of TaqMan array and highest sensitivity. We provided for the first time, the reference statistics of library preparation methods, gene detection and quantification and junction discovery for RNA-Seq by the Ion Proton platform. Chemical fragmentation performed equally well with the enzyme-based one. The optimal Ion Proton sequencing options and analysis software have been evaluated.

  18. Optimization of Fluosol-DA administration during a fractionated radiation protocol in the Lewis lung carcinoma

    International Nuclear Information System (INIS)

    Teicher, B.A.; McIntosh, N.L.

    1987-01-01

    The perfluorchemical emulsion, Fluosol-DA, in combination with breathing a 100% or 95% oxygen atmosphere, has been shown to enhance the response of several solid rodent tumors to single dose and fractionated radiation treatment. As an approach to determining the optimal dose schedule for Fluosol-DA during a course of fractionated radiation therapy, a total dose of 16 ml/kg of Fluosol-DA was administered either as two doses of 8 ml/kg on days 1 and 3 or as four doses of 4 ml/kg on days 1,2,3 and 4 of a four day protocol using the Lewis lung tumor model system. The Lewis lung tumor was grown s.c. in the flanks of C57BL/6J mice. Treatment was initiated when the tumors were 50-100 mm/sup 3/. Radiation was delivered as 4 daily fractions of 2.5, 4.0 or 5.0 Gray. Fluosol-DA was adminstered i.v. prior to irradiation. Each day carbogen breathing was maintained for 1 hr prior to and during each x-ray treatment. When Fluosol-DA was administered as two doses of 8 ml/kg, the dose modifying factor (DMF) observed was 1.7 +- 0.3. When Fluosol-DA was given as four doses of 4 ml/kg, the DMF was 1.5+-0.3 compared to x-ray treatment with carbogen breathing. It appears, therefore, administering Fluosol-DA at a therapeutic dose less frequently with carbogen breathing with every fraction may produce a better treatment outcome than giving more frequent lower doses

  19. Computed tomography-based lung nodule volumetry - do optimized reconstructions of routine protocols achieve similar accuracy, reproducibility and interobserver variability to that of special volumetry protocols?

    International Nuclear Information System (INIS)

    Bolte, H.; Riedel, C.; Knoess, N.; Hoffmann, B.; Heller, M.; Biederer, J.; Freitag, S.

    2007-01-01

    Purpose: The aim of this in vitro and ex vivo CT study was to investigate whether the use of a routine thorax protocol (RTP) with optimized reconstruction parameters can provide comparable accuracy, reproducibility and interobserver variability of volumetric analyses to that of a special volumetry protocol (SVP). Materials and Methods: To assess accuracy, 3 polyurethane (PU) spheres (35 HU; diameters: 4, 6 and 10 mm) were examined with a recommended SVP using a multislice CT (collimation 16 x 0.75 mm, pitch 1.25, 20 mAs, slice thickness 1 mm, increment 0.7 mm, medium kernel) and an optimized RTP (collimation 16 x 1.5 mm, pitch 1.25, 100 mAs, reconstructed slice thickness 2 mm, increment 0.4 mm, sharp kernel). For the assessment of intrascan and interscan reproducibility and interobserver variability, 20 artificial small pulmonary nodules were placed in a dedicated ex vivo chest phantom and examined with identical scan protocols. The artificial lesions consisted of a fat-wax-Lipiodol registered mixture. Phantoms and ex vivo lesions were examined afterwards using commercial volumetry software. To describe accuracy the relative deviations from the true volumes of the PU phantoms were calculated. For intrascan and interscan reproducibility and interobserver variability, the 95 % normal range (95 % NR) of relative deviations between two measurements was calculated. Results: For the SVP the achieved relative deviations for the 4, 6 and 10 mm PU phantoms were - 14.3 %, - 12.7 % and - 6.8 % and were 4.5 %, - 0.6 % and - 2.6 %, respectively, for the optimized RTP. SVP showed a 95 % NR of 0 - 1.5 % for intrascan and a 95 % NR of - 10.8 - 2.9 % for interscan reproducibility. The 95 % NR for interobserver variability was - 4.3 - 3.3 %. The optimized RTP achieved a 95 % NR of - 3.1 - 4.3 % for intrascan reproducibility and a 95 % NR of - 7.0 - 3.5 % for interscan reproducibility. The 95 % NR for interobserver variability was - 0.4 - 6.8 %. (orig.)

  20. Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The

  1. Using Green Star Metrics to Optimize the Greenness of Literature Protocols for Syntheses

    Science.gov (United States)

    Duarte, Rita C. C.; Ribeiro, M. Gabriela T. C.; Machado, Adélio A. S. C.

    2015-01-01

    A procedure to improve the greenness of a synthesis, without performing laboratory work, using alternative protocols available in the literature is presented. The greenness evaluation involves the separate assessment of the different steps described in the available protocols--reaction, isolation, and purification--as well as the global process,…

  2. An Optimized Protocol to Increase Virus-Induced Gene Silencing Efficiency and Minimize Viral Symptoms in Petunia

    OpenAIRE

    Broderick, Shaun R.; Jones, Michelle L.

    2013-01-01

    Virus-induced gene silencing (VIGS) is used to down-regulate endogenous plant genes. VIGS efficiency depends on viral proliferation and systemic movement throughout the plant. Although tobacco rattle virus (TRV)-based VIGS has been successfully used in petunia (Petunia × hybrida), the protocol has not been thoroughly optimized for efficient and uniform gene down-regulation in this species. Therefore, we evaluated six parameters that improved VIGS in petunia. Inoculation of mechanically wounde...

  3. Research of protocols for optimization of exposure dose in abdominopelic CT

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Dong Hee [Dept. of Radiological Science, Far East University, Eumseong (Korea, Republic of)

    2017-06-15

    This study measured the exposure dose during abdominal-pelvic CT exam which occupies 70% of CT exam and tried to propose a protocol for optimized exposure dose in abdomen and pelvis without affecting the imagery interpretation. The study scanned abdomen-pelvis using the current clinical scan method, the 120 kVp, auto exposure control(AEC), as 1 phase. As for the newly proposed 2 phase scan method, the study divided into 1 phase abdomen exam and 2 phase pelvis exam and each conducted tube voltage 120 kVp, AEC for abdomen exam, and fixed tube current method in 120 kVp, 100, 150, 200, 250, 300, 350, 400 mA for pelvis exam. The exposure dose value was compared using CTDIVOL, DLP value measured during scan, and average value of CT attenuation coefficient, noise, SNR from each scan image were obtained to evaluate the image. As for the result, scanning of 2 phase showed significant difference compared to 1 phase. In CTDIVOL value, the 2 phase showed 26% decrease in abdomen, 1.8∼59.5% decrease in pelvis for 100∼250 mA, 12.7%∼30% increase in pelvis for 300∼400 mA. Also, DLP value showed 53% decrease in abdomen and 41∼81% decrease in pelvis when scanned by 2 phase compared to 1 phase, but it was not statistically significant. As for the SNR, when scanning 2 phase close to heart, scanning 1 phase close to pelvis, scanning and scanning 1 phase at upper and lower abdomen, it was higher when scanning 2 phase for 200∼ 250 mA. Also, the CT number and noise was overall similar, but the noise was high close to pelvis. However, when scanning 2 phase for 250 mA close to pelvis, the noise value came out similar to 1 phase, and did not show statistically significant difference. It seems when separating pelvis to scan in 250 mA rather than 400 mA in 1 phase as before, it is expected to have reduced effect of exposure dose without difference in the quality of image. Thus, for patients who often get abdominal-pelvic CT exam, fertile women or children, this study proposes 2

  4. Clinical grade purification and expansion of NK cell products for an optimized manufacturing protocol

    Directory of Open Access Journals (Sweden)

    Ulrike eKoehl

    2013-05-01

    Full Text Available Allogeneic Natural Killer (NK cells are used for adoptive immunotherapy after stem cell transplantation. In order to overcome technical limitations in NK cell purification and activation, the following study investigates the impact of different variables on NK cell recovery, cytotoxicity and T cell depletion during GMP-grade NK cell selection. 40 NK cell products were derived from 54 unstimulated donor leukaphereses using immunomagnetic CD3 T-cell depletion, followed by a CD56 cell enrichment step. For T cell depletion, either the depletion 2.1 program in single or double procedure (D2.1 1depl, n=18; D2.1 2depl, n=13 or the faster depletion 3.1 (D3.1, n=9 was used on the CliniMACS instrument. 17 purified NK cell products were activated in vitro by IL-2 for 12 days. The whole process resulted in a median number of 7.59x10e8 CD56+CD3- cells with both purity and viability of 94%, respectively. The T-cell depletion was significantly better using D2.1 1depl/2depl compared to D3.1 (log 4.6/log 4.9 vs. log 3.7; p<0.01 and double procedure in two stages led always to residual T cells below 0.1%. In contrast D3.1 was superior to D2.1 1depl/2depl with regard to recovery of CD56+CD3- NK cells (68% vs 41%/38%. Concomitant monocytes and especially IL-2 activation led to increased NK cell activity against malignant target cells compared to unstimulated NK cells, which correlated with both up-regulation of natural cytotoxicity receptors and intracellular signaling. Overall, wide variations in the NK cell expansion rate and the distribution of NK cell subpopulations were found. In conclusion, our results indicate that GMP-grade purification of NK cells might be improved by a sequential processing of T cell depletion program D2.1 and D3.1. In addition NK cell expansion protocols need to be further optimized.

  5. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  6. Near-optimality of special periodic protocols for fluid models of single server switched networks with switchover times

    Science.gov (United States)

    Matveev, A. S.; Ishchenko, R.

    2017-11-01

    We consider a generic deterministic time-invariant fluid model of a single server switched network, which consists of finitely many infinite size buffers (queues) and receives constant rate inflows of jobs from the outside. Any flow undergoes a multi-phase service, entering a specific buffer after every phase, and ultimately leaves the network; the route of the flow over the buffers is pre-specified, and flows may merge inside the network. They share a common source of service, which can serve at most one buffer at a time and has to switch among buffers from time to time; any switch consumes a nonzero switchover period. With respect to the long-run maximal scaled wip (work in progress) performance metric, near-optimality of periodic scheduling and service protocols is established: the deepest optimum (that is over all feasible processes in the network, irrespective of the initial state) is furnished by such a protocol up to as small error as desired. Moreover, this can be achieved with a special periodic protocol introduced in the paper. It is also shown that the exhaustive policy is optimal for any buffer whose service at the maximal rate does not cause growth of the scaled wip.

  7. SU-F-207-16: CT Protocols Optimization Using Model Observer

    International Nuclear Information System (INIS)

    Tseng, H; Fan, J; Kupinski, M

    2015-01-01

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear

  8. SU-F-207-16: CT Protocols Optimization Using Model Observer

    Energy Technology Data Exchange (ETDEWEB)

    Tseng, H [University of Arizona, Tucson, AZ (United States); Fan, J [CT Systems Engineering, GE Healthcare, Waukesha, Wisconsin (United States); Kupinski, M [Univ Arizona, Tucson, AZ (United States)

    2015-06-15

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear.

  9. Optimization on the dose versus noise in the image on protocols for computed tomography of pediatric head

    International Nuclear Information System (INIS)

    Saint'Yves, Thalis L.A.; Travassos, Paulo Cesar B.; Goncalves, Elicardo A.S.; Mecca A, Fernando; Silveira, Thiago B.

    2010-01-01

    This article aims to establish protocols optimized for computed tomography of pediatric skull, to the Picker Q2000 tomography of the Instituto Nacional de Cancer, through the analysis of dose x noise on the image with the variation of values of mAs and kVp. We used a water phantom to measure the noise, a pencil type ionization chamber to measure the dose in the air and the Alderson Randon phantom for check the quality of the image. We found values of mAs and kVp that reduce the skin dose of the original protocol used in 35.9%, maintaining the same image quality at a safe diagnosis. (author)

  10. Economic comparison of common treatment protocols and J5 vaccination for clinical mastitis in dairy herds using optimized culling decisions.

    Science.gov (United States)

    Kessels, J A; Cha, E; Johnson, S K; Welcome, F L; Kristensen, A R; Gröhn, Y T

    2016-05-01

    This study used an existing dynamic optimization model to compare costs of common treatment protocols and J5 vaccination for clinical mastitis in US dairy herds. Clinical mastitis is an infection of the mammary gland causing major economic losses in dairy herds due to reduced milk production, reduced conception, and increased risk of mortality and culling for infected cows. Treatment protocols were developed to reflect common practices in dairy herds. These included targeted therapy following pathogen identification, and therapy without pathogen identification using a broad-spectrum antimicrobial or treating with the cheapest treatment option. The cost-benefit of J5 vaccination was also estimated. Effects of treatment were accounted for as changes in treatment costs, milk loss due to mastitis, milk discarded due to treatment, and mortality. Following ineffective treatments, secondary decisions included extending the current treatment, alternative treatment, discontinuing treatment, and pathogen identification followed by recommended treatment. Average net returns for treatment protocols and vaccination were generated using an existing dynamic programming model. This model incorporates cow and pathogen characteristics to optimize management decisions to treat, inseminate, or cull cows. Of the treatment protocols where 100% of cows received recommended treatment, pathogen-specific identification followed by recommended therapy yielded the highest average net returns per cow per year. Out of all treatment scenarios, the highest net returns were achieved with selecting the cheapest treatment option and discontinuing treatment, or alternate treatment with a similar spectrum therapy; however, this may not account for the full consequences of giving nonrecommended therapies to cows with clinical mastitis. Vaccination increased average net returns in all scenarios. Copyright © 2016 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  11. Acute beneficial hemodynamic effects of a novel 3D-echocardiographic optimization protocol in cardiac resynchronization therapy.

    Directory of Open Access Journals (Sweden)

    Carolin Sonne

    , individualized echocardiographic optimization with the integration of 3-dimensional indices into the optimization protocol acutely improved LV systolic function and decreased ESV and can be used to select the optimal AV delay and VV interval in CRT.

  12. Active SAmpling Protocol (ASAP) to Optimize Individual Neurocognitive Hypothesis Testing: A BCI-Inspired Dynamic Experimental Design.

    Science.gov (United States)

    Sanchez, Gaëtan; Lecaignard, Françoise; Otman, Anatole; Maby, Emmanuel; Mattout, Jérémie

    2016-01-01

    The relatively young field of Brain-Computer Interfaces has promoted the use of electrophysiology and neuroimaging in real-time. In the meantime, cognitive neuroscience studies, which make extensive use of functional exploration techniques, have evolved toward model-based experiments and fine hypothesis testing protocols. Although these two developments are mostly unrelated, we argue that, brought together, they may trigger an important shift in the way experimental paradigms are being designed, which should prove fruitful to both endeavors. This change simply consists in using real-time neuroimaging in order to optimize advanced neurocognitive hypothesis testing. We refer to this new approach as the instantiation of an Active SAmpling Protocol (ASAP). As opposed to classical (static) experimental protocols, ASAP implements online model comparison, enabling the optimization of design parameters (e.g., stimuli) during the course of data acquisition. This follows the well-known principle of sequential hypothesis testing. What is radically new, however, is our ability to perform online processing of the huge amount of complex data that brain imaging techniques provide. This is all the more relevant at a time when physiological and psychological processes are beginning to be approached using more realistic, generative models which may be difficult to tease apart empirically. Based upon Bayesian inference, ASAP proposes a generic and principled way to optimize experimental design adaptively. In this perspective paper, we summarize the main steps in ASAP. Using synthetic data we illustrate its superiority in selecting the right perceptual model compared to a classical design. Finally, we briefly discuss its future potential for basic and clinical neuroscience as well as some remaining challenges.

  13. Optimized protocol of chicken antibody (IgY) purification providing electrophoretically homogenous preparations

    Czech Academy of Sciences Publication Activity Database

    Hodek, P.; Trefil, P.; Šimůnek, Jiří; Hudeček, J.; Stiborová, M.

    2013-01-01

    Roč. 8, č. 1 (2013), 113-124 ISSN 1452-3981 Grant - others:GA ČR(CZ) GAP303/12/G163 Program:GA Institutional support: RVO:67985904 Keywords : yolk immunoglobulin * purification protocol * bio-compatible chemicals Subject RIV: CG - Electrochemistry Impact factor: 1.956, year: 2013

  14. Optimized protocols for Mycobacterium leprae strain management: frozen stock preservation and maintenance in athymic nude mice.

    Science.gov (United States)

    Trombone, Ana Paula Fávaro; Pedrini, Sílvia Cristina Barbosa; Diório, Suzana Madeira; Belone, Andréa de Faria Fernandes; Fachin, Luciana Raquel Vicenzi; do Nascimento, Dejair Caitano; Rosa, Patricia Sammarco

    2014-03-23

    Leprosy, caused by Mycobacterium leprae, is an important infectious disease that is still endemic in many countries around the world, including Brazil. There are currently no known methods for growing M. leprae in vitro, presenting a major obstacle in the study of this pathogen in the laboratory. Therefore, the maintenance and growth of M. leprae strains are preferably performed in athymic nude mice (NU-Foxn1(nu)). The laboratory conditions for using mice are readily available, easy to perform, and allow standardization and development of protocols for achieving reproducible results. In the present report, we describe a simple protocol for purification of bacilli from nude mouse footpads using trypsin, which yields a suspension with minimum cell debris and with high bacterial viability index, as determined by fluorescent microscopy. A modification to the standard method for bacillary counting by Ziehl-Neelsen staining and light microscopy is also demonstrated. Additionally, we describe a protocol for freezing and thawing bacillary stocks as an alternative protocol for maintenance and storage of M. leprae strains.

  15. An algorithm for optimal fusion of atlases with different labeling protocols

    DEFF Research Database (Denmark)

    Eugenio Iglesias, Juan; Sabuncu, Mert Rory; Aganj, Iman

    2015-01-01

    In this paper we present a novel label fusion algorithm suited for scenarios in which different manual delineation protocols with potentially disparate structures have been used to annotate the training scans (hereafter referred to as "atlases"). Such scenarios arise when atlases have missing str...

  16. Optimization of Protocol CT, PET-CT, whole body; Optimizacion de protocolo CT, en PET-CT, de cuerpo entero

    Energy Technology Data Exchange (ETDEWEB)

    Gutierrez, Fredys Santos, E-mail: fsantos@ccss.sa.cr [Caja Costarricense de Seguro Social (ACCPR/CCSS), San Jose (Costa Rica). Area Control de Calidade Y Proteccion Radiologica; Namias, Mauro, E-mail: mnamias@gmail.com [Comision Nacional de Energia Atomica (FCDN/CNEA), Buenos Aires (Argentina). Fundacion Centro Diagnostico Nuclear

    2013-11-01

    The objective of this study was to optimize the acquisition protocols and processing existing of the CT PET/CT scanner for clinical use of Nuclear Diagnostic Center Foundation, a way to minimize the radiation dose while maintaining diagnostic image quality properly. Dosimetric data of PET / CT service were surveyed and obtained the baseline against which we compare and define strategies and modifications to develop online. We selected transaxial up to the pulmonary hilum and liver slices as the anatomical regions of interest that led to the standardization of the study.

  17. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Juan J. Pérez-Solano

    2017-07-01

    Full Text Available Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  18. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks.

    Science.gov (United States)

    Pérez-Solano, Juan J; Claver, Jose M; Ezpeleta, Santiago

    2017-07-06

    Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  19. Determining the Optimal Protocol for Measuring an Albuminuria Class Transition in Clinical Trials in Diabetic Kidney Disease

    DEFF Research Database (Denmark)

    Kröpelin, Tobias F; de Zeeuw, Dick; Remuzzi, Giuseppe

    2016-01-01

    Albuminuria class transition (normo- to micro- to macroalbuminuria) is used as an intermediate end point to assess renoprotective drug efficacy. However, definitions of such class transition vary between trials. To determine the most optimal protocol, we evaluated the approaches used in four...... effect increased (decreased precision) with stricter end point definitions, resulting in a loss of statistical significance. In conclusion, the optimal albuminuria transition end point for use in drug intervention trials can be determined with a single urine collection for albuminuria assessment per...... clinical trials testing the effect of renin-angiotensin-aldosterone system intervention on albuminuria class transition in patients with diabetes: the BENEDICT, the DIRECT, the ALTITUDE, and the IRMA-2 Trial. The definition of albuminuria class transition used in each trial differed from the definitions...

  20. Optimization and validation of the protocol used to analyze the taste of traditional Chinese medicines using an electronic tongue.

    Science.gov (United States)

    Li, Xuelin; Gao, Xiaojie; Liu, Ruixin; Wang, Junming; Wu, Zidan; Zhang, Lu; Li, Huiling; Gui, Xinjing; Kang, Bingya; Shi, Junhan

    2016-11-01

    Tools to define the active ingredients and flavors of Traditional Chinese Medicines (TCMs) are limited by long analysis times, complex sample preparation and a lack of multiplexed analysis. The aim of the present study was to optimize and validate an electronic tongue (E-tongue) methodology to analyze the bitterness of TCMs. To test the protocol, 35 different TCM concoctions were measured using an E-tongue, and seven replicate measurements of each sample were taken to evaluate reproducibility and precision. E-tongue sensor information was identified and classified using analysis approaches including least squares support vector machine (LS-SVM), support vector machine (SVM), discriminant analysis (DA) and partial least squares (PLS). A benefit of this analytical protocol was that the analysis of a single sample took <15 min for all seven sensors. The results identified that the LS-SVM approach provided the best bitterness classification accuracy (binary classification accuracy, 100%; ternary classification accuracy, 89.66%). The E-tongue protocol developed showed good reproducibility and high precision within a 6 h measurement cycle. To the best of our knowledge, this is the first study of an E-tongue being applied to assay the bitterness of TCMs. This approach could be applied in the classification of the taste of TCMs, and serve important roles in other fields, including foods and beverages.

  1. Optimization of Nonambulant Mass Casualty Decontamination Protocols as Part of an Initial or Specialist Operational Response to Chemical Incidents.

    Science.gov (United States)

    Chilcott, Robert P; Mitchell, Hannah; Matar, Hazem

    2018-05-30

    The UK's Initial Operational Response (IOR) is a new process for improving the survival of multiple casualties following a chemical, biological, radiological or nuclear incident. Whilst the introduction of IOR represents a patient-focused response for ambulant casualties, there is currently no provision for disrobe and dry decontamination of nonambulant casualties. Moreover, the current specialist operational response (SOR) protocol for nonambulant casualty decontamination (also referred to as "clinical decontamination") has not been subject to rigorous evaluation or development. Therefore, the aim of this study was to confirm the effectiveness of putatively optimized dry (IOR) and wet (SOR) protocols for nonambulant decontamination in human volunteers. Dry and wet decontamination protocols were objectively evaluated using human volunteers. Decontamination effectiveness was quantified by liquid chromatography-mass spectrometry analysis of the recovery of a chemical warfare agent simulant (methylsalicylate) from skin and hair of volunteers, with whole-body fluorescence imaging to quantify the skin distribution of residual simulant. Both the dry and wet decontamination processes were rapid (3 and 4 min, respectively) and were effective in removing simulant from the hair and skin of volunteers, with no observable adverse effects related to skin surface spreading of contaminant. Further studies are required to assess the combined effectiveness of dry and wet decontamination under more realistic conditions and to develop appropriate operational procedures that ensure the safety of first responders.

  2. Optimizing Libraries’ Content Findability Using Simple Object Access Protocol (SOAP) With Multi-Tier Architecture

    Science.gov (United States)

    Lahinta, A.; Haris, I.; Abdillah, T.

    2017-03-01

    The aim of this paper is to describe a developed application of Simple Object Access Protocol (SOAP) as a model for improving libraries’ digital content findability on the library web. The study applies XML text-based protocol tools in the collection of data about libraries’ visibility performance in the search results of the book. Model from the integrated Web Service Document Language (WSDL) and Universal Description, Discovery and Integration (UDDI) are applied to analyse SOAP as element within the system. The results showed that the developed application of SOAP with multi-tier architecture can help people simply access the website in the library server Gorontalo Province and support access to digital collections, subscription databases, and library catalogs in each library in Regency or City in Gorontalo Province.

  3. Introduction of an individually optimized protocol for the injection of contrast medium for coronary CT angiography

    International Nuclear Information System (INIS)

    Seifarth, Harald; Puesken, Michael; Wienbeck, Susanne; Wessling, Johannes; Maintz, David; Heindel, Walter; Juergens, Kai-Uwe; Kalafut, John F.

    2009-01-01

    The aim of this study was to determine whether individually tailored protocols for the injection of contrast medium (CM) result in higher and more homogeneous vascular attenuation throughout the coronary arteries at coronary CT angiography compared with conventional injection protocols using fixed injection parameters. Of 120 patients included in the study, 80 patients were randomized into two groups. Group 1 received 80 mL of CM at 6 mL/s. For group 2 injection parameters were individually adjusted to patient weight, the duration of CT data acquisition, and attenuation parameters following a test bolus. In the control group (group 3) the volume of CM was adjusted to the duration of CT data acquisition and injected at 5 mL/s. Attenuation was measured in the proximal, middle, and distal right coronary artery (RCA), in the proximal and middle left anterior descending artery (LAD), and in cranial and caudal sections of both ventricles. Patient parameters, scan delay, and scan duration did not differ significantly between the groups. Mean CM volume was 82.5 mL (flow rate 5.1 mL/s) in group 2 and 73.5 mL in group 3. Attenuation in both RCA and LAD was significantly higher for group 2 vs. group 3 (RCA: 414.9(±49.9)-396.1(±52.1) HU vs. 366.0(±64.3)-341.6(±72.5) HU; LAD: 398.9(±48.6)-364.6(±44.6) HU vs. 356.3(±69.5)-323.0(±67.2) HU). For group 1 vs. group 2 only attenuation in the distal RCA differed significantly: 396.1(±52.1) vs. 370.7(±70.5) HU. Individually tailored CM injection protocols yield higher attenuation, especially in the distal segments of the coronary vessels, compared with injection protocols using fixed injection parameters. (orig.)

  4. An optimized protocol for handling and processing fragile acini cultured with the hanging drop technique.

    Science.gov (United States)

    Snyman, Celia; Elliott, Edith

    2011-12-15

    The hanging drop three-dimensional culture technique allows cultivation of functional three-dimensional mammary constructs without exogenous extracellular matrix. The fragile acini are, however, difficult to preserve during processing steps for advanced microscopic investigation. We describe adaptations to the protocol for handling of hanging drop cultures to include investigation using confocal, scanning, and electron microscopy, with minimal loss of cell culture components. Copyright © 2011 Elsevier Inc. All rights reserved.

  5. Optimized exosome isolation protocol for cell culture supernatant and human plasma

    Directory of Open Access Journals (Sweden)

    Richard J. Lobb

    2015-07-01

    Full Text Available Extracellular vesicles represent a rich source of novel biomarkers in the diagnosis and prognosis of disease. However, there is currently limited information elucidating the most efficient methods for obtaining high yields of pure exosomes, a subset of extracellular vesicles, from cell culture supernatant and complex biological fluids such as plasma. To this end, we comprehensively characterize a variety of exosome isolation protocols for their efficiency, yield and purity of isolated exosomes. Repeated ultracentrifugation steps can reduce the quality of exosome preparations leading to lower exosome yield. We show that concentration of cell culture conditioned media using ultrafiltration devices results in increased vesicle isolation when compared to traditional ultracentrifugation protocols. However, our data on using conditioned media isolated from the Non-Small-Cell Lung Cancer (NSCLC SK-MES-1 cell line demonstrates that the choice of concentrating device can greatly impact the yield of isolated exosomes. We find that centrifuge-based concentrating methods are more appropriate than pressure-driven concentrating devices and allow the rapid isolation of exosomes from both NSCLC cell culture conditioned media and complex biological fluids. In fact to date, no protocol detailing exosome isolation utilizing current commercial methods from both cells and patient samples has been described. Utilizing tunable resistive pulse sensing and protein analysis, we provide a comparative analysis of 4 exosome isolation techniques, indicating their efficacy and preparation purity. Our results demonstrate that current precipitation protocols for the isolation of exosomes from cell culture conditioned media and plasma provide the least pure preparations of exosomes, whereas size exclusion isolation is comparable to density gradient purification of exosomes. We have identified current shortcomings in common extracellular vesicle isolation methods and provide a

  6. Optimizing the use of X and VNC protocols for support of remote observing

    Science.gov (United States)

    Kibrick, Robert I.; Allen, Steven L.; Conrad, Al; Stickel, Terry; Wirth, Gregory D.

    2004-09-01

    Remote observing is the dominant mode of operation for both Keck Telescopes and their associated instruments. Over 90% of all Keck observations are carried out remotely from the Keck Headquarters in Waimea, Hawaii (located 40 kilometers from the telescopes on the summit of Mauna Kea). In addition, an increasing number of observations are now conducted by geographically-dispersed observing teams, with some team members working from Waimea while others collaborate from Keck remote observing facilities located in California. Such facilities are now operational on the Santa Cruz and San Diego campuses of the University of California, and at the California Institute of Technology in Pasadena. This report describes our use of the X and VNC protocols for providing remote and shared graphical displays to distributed teams of observers and observing assistants located at multiple sites. We describe the results of tests involving both protocols, and explore the limitations and performance of each under different regimes of network bandwidth and latency. We also examine other constraints imposed by differences in the processing performance and bit depth of the various frame buffers used to generate these graphical displays. Other topics covered include the use of ssh tunnels for securely encapsulating both X and VNC protocol streams and the results of tests of ssh compression to improve performance under conditions of limited network bandwidth. We also examine trade-offs between different topologies for locating VNC servers and clients when sharing displays between multiple sites.

  7. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  8. Optimization of the Treatment Protocol in Children with Gastroesophageal Reflux Disease

    Directory of Open Access Journals (Sweden)

    T.O. Kriuchko

    2016-03-01

    Full Text Available The article deals with the substantiation and assessment of the effectiveness of the inclusion of ursodeoxycholic acid preparation Ukrliv suspension in the treatment protocol of children with gastroesophageal reflux disease. Taking into account the results of the studies, the use of ursodeoxycholic acid drug can be recommended as a pathogenetic therapy in the combination treatment of children with gastroesophageal reflux disease. The findings suggest both the efficiency and the high level of safety and tolerability of ursodeoxycholic acid, in particular Ukrliv suspension, during long-term use to prevent recurrences.

  9. Using the multiphase optimization strategy (MOST to optimize an HIV care continuum intervention for vulnerable populations: a study protocol

    Directory of Open Access Journals (Sweden)

    Marya Viorst Gwadz

    2017-05-01

    Full Text Available Abstract Background More than half of persons living with HIV (PLWH in the United States are insufficiently engaged in HIV primary care and not taking antiretroviral therapy (ART, mainly African Americans/Blacks and Hispanics. In the proposed project, a potent and innovative research methodology, the multiphase optimization strategy (MOST, will be employed to develop a highly efficacious, efficient, scalable, and cost-effective intervention to increase engagement along the HIV care continuum. Whereas randomized controlled trials are valuable for evaluating the efficacy of multi-component interventions as a package, they are not designed to evaluate which specific components contribute to efficacy. MOST, a pioneering, engineering-inspired framework, addresses this problem through highly efficient randomized experimentation to assess the performance of individual intervention components and their interactions. We propose to use MOST to engineer an intervention to increase engagement along the HIV care continuum for African American/Black and Hispanic PLWH not well engaged in care and not taking ART. Further, the intervention will be optimized for cost-effectiveness. A similar set of multi-level factors impede both HIV care and ART initiation for African American/Black and Hispanic PLWH, primary among them individual- (e.g., substance use, distrust, fear, social- (e.g., stigma, and structural-level barriers (e.g., difficulties accessing ancillary services. Guided by a multi-level social cognitive theory, and using the motivational interviewing approach, the study will evaluate five distinct culturally based intervention components (i.e., counseling sessions, pre-adherence preparation, support groups, peer mentorship, and patient navigation, each designed to address a specific barrier to HIV care and ART initiation. These components are well-grounded in the empirical literature and were found acceptable, feasible, and promising with respect to

  10. Optimizing the ASC WAN: evaluating network performance tools for comparing transport protocols.

    Energy Technology Data Exchange (ETDEWEB)

    Lydick, Christopher L.

    2007-07-01

    The Advanced Simulation & Computing Wide Area Network (ASC WAN), which is a high delay-bandwidth network connection between US Department of Energy National Laboratories, is constantly being examined and evaluated for efficiency. One of the current transport-layer protocols which is used, TCP, was developed for traffic demands which are different from that on the ASC WAN. The Stream Control Transport Protocol (SCTP), on the other hand, has shown characteristics which make it more appealing to networks such as these. Most important, before considering a replacement for TCP on any network, a testing tool that performs well against certain criteria needs to be found. In order to try to find such a tool, two popular networking tools (Netperf v.2.4.3 & v.2.4.6 (OpenSS7 STREAMS), and Iperf v.2.0.6) were tested. These tools implement both TCP and SCTP and were evaluated using four metrics: (1) How effectively can the tool reach a throughput near the bandwidth? (2) How much of the CPU does the tool utilize during operation? (3) Is the tool freely and widely available? And, (4) Is the tool actively developed? Following the analysis of those tools, this paper goes further into explaining some recommendations and ideas for future work.

  11. SU-E-J-113: The Influence of Optimizing Pediatric CT Simulator Protocols On the Treatment Dose Calculation in Radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Y; Zhang, J; Hu, Q; Tie, J; Wu, H [Key Laboratory of Carcinogenesis and Translational Research (Ministry of Education), Department of Radiotherapy, Peking University Cancer Hospital ' Institute, Beijing (China); Deng, J [Department of Therapeutic Radiology, Yale University, New Haven, CT (United States)

    2014-06-01

    Purpose: To investigate the possibility of applying optimized scanning protocols for pediatric CT simulation by quantifying the dosimetric inaccuracy introduced by using a fixed HU to density conversion. Methods: The images of a CIRS electron density reference phantom (Model 062) were acquired by a Siemens CT simulator (Sensation Open) using the following settings of tube voltage and beam current: 120 kV/190mA (the reference protocol used to calibrate CT for our treatment planning system (TPS)); Fixed 190mA combined with all available kV: 80, 100, and 140; fixed 120 kV and various current from 37 to 444 mA (scanner extremes) with interval of 30 mA. To avoid the HU uncertainty of point sampling in the various inserts of known electron densities, the mean CT numbers of the central cylindrical volume were calculated using DICOMan software. The doses per 100 MU to the reference point (SAD=100cm, Depth=10cm, Field=10X10cm, 6MV photon beam) in a virtual cubic phantom (30X30X30cm) were calculated using Eclipse TPS (calculation model: AcurosXB-11031) by assigning the CT numbers to HU of typical materials acquired by various protocols. Results: For the inserts of densities less than muscle, CT number fluctuations of all protocols were within the tolerance of 10 HU as accepted by AAPM-TG66. For more condensed materials, fixed kV yielded stable HU with any mA combination where largest disparities were found in 1750mg/cc insert: HU{sub reference}=1801(106.6cGy), HU{sub minimum}=1799 (106.6cGy, error{sub dose}=0.00%), HU{sub maximum}=1815 (106.8cGy, error{sub dose}=0.19%). Yet greater disagreements were observed with increasing density when kV was modified: HU{sub minimum}=1646 (104.5cGy, error{sub dose}=- 1.97%), HU{sub maximum}=2487 (116.4cGy, error{sub dose}=9.19%) in 1750mg/cc insert. Conclusion: Without affecting treatment dose calculation, personalized mA optimization of CT simulator can be conducted by fixing kV for a better cost-effectiveness of imaging dose and quality

  12. Statistically optimized biotransformation protocol for continuous production of L-DOPA using Mucuna monosperma callus culture.

    Science.gov (United States)

    Inamdar, Shrirang Appasaheb; Surwase, Shripad Nagnath; Jadhav, Shekhar Bhagwan; Bapat, Vishwas Anant; Jadhav, Jyoti Prafull

    2013-01-01

    L-DOPA (3,4-dihydroxyphenyl-L-alanine), a modified amino acid, is an expansively used drug for the Parkinson's disease treatment. In the present study, optimization of nutritional parameters influencing L-DOPA production was attempted using the response surface methodology (RSM) from Mucuna monosperma callus. Optimization of the four factors was carried out using the Box-Behnken design. The optimized levels of factors predicted by the model include tyrosine 0.894 g l(-1), pH 4.99, ascorbic acid 31.62 mg l(-1)and copper sulphate 23.92 mg l(-1), which resulted in highest L-DOPA yield of 0.309 g l(-1). The optimization of medium using RSM resulted in a 3.45-fold increase in the yield of L-DOPA. The ANOVA analysis showed a significant R (2) value (0.9912), model F-value (112.465) and probability (0.0001), with insignificant lack of fit. Optimized medium was used in the laboratory scale column reactor for continuous production of L-DOPA. Uninterrupted flow column exhibited maximum L-DOPA production rate of 200 mg L(-1) h(-1) which is one of the highest values ever reported using plant as a biotransformation source. L-DOPA production was confirmed by HPTLC and HPLC analysis. This study demonstrates the synthesis of L- DOPA using Mucuna monosperma callus using a laboratory scale column reactor.

  13. Quantitative assessment of in-solution digestion efficiency identifies optimal protocols for unbiased protein analysis

    DEFF Research Database (Denmark)

    Leon, Ileana R; Schwämmle, Veit; Jensen, Ole N

    2013-01-01

    a combination of qualitative and quantitative LC-MS/MS methods and statistical data analysis. In contrast to previous studies we employed both standard qualitative as well as data-independent quantitative workflows to systematically assess trypsin digestion efficiency and bias using mitochondrial protein...... conditions (buffer, RapiGest, deoxycholate, urea), and two methods for removal of detergents prior to analysis of peptides (acid precipitation or phase separation with ethyl acetate). Our data-independent quantitative LC-MS/MS workflow quantified over 3700 distinct peptides with 96% completeness between all...... protocols and replicates, with an average 40% protein sequence coverage and an average of 11 peptides identified per protein. Systematic quantitative and statistical analysis of physicochemical parameters demonstrated that deoxycholate-assisted in-solution digestion combined with phase transfer allows...

  14. Optimized protocol for the radioiodination of hydrazone-type polymer drug delivery systems

    International Nuclear Information System (INIS)

    Sedláček, Ondřej; Kučka, Jan; Hrubý, Martin

    2015-01-01

    Hydrazone conjugates of polymers with doxorubicin represent a very promising tool for cancer chemotherapy. However, these conjugates are very difficult to radiolabel with iodine radionuclides, which possess otherwise very advantageous nuclear properties to, e.g., follow biodistribution. In this study, we developed a robust protocol for the high-yield radioiodination of hydrazone-type drug delivery systems with doxorubicin. In particular, it is crucial that the polymer radioiodination step be performed before the deprotection of the hydrazide and doxorubicin binding. - Highlights: • Hydrazone-type drug delivery systems with doxorubicin were radioiodinated. • Radioiodination was performed via polymer-bound phenolic moiety. • Radioiodination step must be performed before deprotection and drug binding

  15. Optimizing diffusion of an online computer tailored lifestyle program: a study protocol

    Directory of Open Access Journals (Sweden)

    Schulz Daniela N

    2011-06-01

    Full Text Available Abstract Background Although the Internet is a promising medium to offer lifestyle interventions to large amounts of people at relatively low costs and effort, actual exposure rates of these interventions fail to meet the high expectations. Since public health impact of interventions is determined by intervention efficacy and level of exposure to the intervention, it is imperative to put effort in optimal dissemination. The present project attempts to optimize the dissemination process of a new online computer tailored generic lifestyle program by carefully studying the adoption process and developing a strategy to achieve sustained use of the program. Methods/Design A prospective study will be conducted to yield relevant information concerning the adoption process by studying the level of adoption of the program, determinants involved in adoption and characteristics of adopters and non-adopters as well as satisfied and unsatisfied users. Furthermore, a randomized control trial will be conducted to the test the effectiveness of a proactive strategy using periodic e-mail prompts in optimizing sustained use of the new program. Discussion Closely mapping the adoption process will gain insight in characteristics of adopters and non-adopters and satisfied and unsatisfied users. This insight can be used to further optimize the program by making it more suitable for a wider range of users, or to develop adjusted interventions to attract subgroups of users that are not reached or satisfied with the initial intervention. Furthermore, by studying the effect of a proactive strategy using period prompts compared to a reactive strategy to stimulate sustained use of the intervention and, possibly, behaviour change, specific recommendations on the use and the application of prompts in online lifestyle interventions can be developed. Trial registration Dutch Trial Register NTR1786 and Medical Ethics Committee of Maastricht University and the University Hospital

  16. Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach

    Directory of Open Access Journals (Sweden)

    Cheng Xiuzhen

    2010-01-01

    Full Text Available Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC protocol that is latency-optimized and energy-efficient scheme and combines the physical layer and the MAC layer to shorten transmission delay. On physical layer, we apply convolution coding and interleaver for transmitted information. Moreover, dynamic code rate is exploited at the receiver side to accelerate data reception rate. On MAC layer, unfixed frame length scheme is applied to reduce transmission delay, and to ensure the data successful transmission rate at the same time. Furthermore, we propose a network topology: an underwater acoustic sensor network with mobile agent. Through fully utilizing the supper capabilities on computation and mobility of autonomous underwater vehicles, the energy consumption for fixed sensor nodes can be extremely reduced, so that the lifetime of networks is extended.

  17. Optimization of a protocol for direct organogenesis of red clover (Trifolium pratense L. meristems for breeding purposes

    Directory of Open Access Journals (Sweden)

    JUAN C CARRILLO

    2004-01-01

    Full Text Available A series of experiments were carried out in order to optimize a protocol for the direct organogenesis of Chilean red clover germplasm. A range of cultivars were used to analyze the effect of explant source (crown or stem meristems of vegetative plants, culture media and plant growth regulators. Our findings showed that stem meristems were easier to obtain, presented lower levels of contamination and a better development than crown meristems. The L2 medium showed better results than B5 and MS media for the cultivars and experimental lines studied. L2 medium supplemented with 0.003 mg/l of 4-amino-3,5,6-trichloropicolinic acid and 1.0 mg/l of 6-benzylaminopurine gave consistently better results and will be applied in our breeding program to propagate, maintain and eliminate viruses from elite red clover clones.

  18. Comparative assessment of various lipid extraction protocols and optimization of transesterification process for microalgal biodiesel production.

    Science.gov (United States)

    Mandal, Shovon; Patnaik, Reeza; Singh, Amit Kumar; Mallick, Nirupama

    2013-01-01

    Biodiesel, using microalgae as feedstocks, is being explored as the most potent form of alternative diesel fuel for sustainable economic development. A comparative assessment of various protocols for microalgal lipid extraction was carried out using five green algae, six blue-green algae and two diatom species treated with different single and binary solvents both at room temperature and using a soxhlet. Lipid recovery was maximum with chloroform-methanol in the soxhlet extractor. Pretreatments ofbiomass, such as sonication, homogenization, bead-beating, lyophilization, autoclaving, microwave treatment and osmotic shock did not register any significant rise in lipid recovery. As lipid recovery using chloroform-methanol at room temperature demonstrated a marginally lower value than that obtained under the soxhlet extractor, on economical point of view, the former is recommended for microalgal total lipid extraction. Transesterification process enhances the quality of biodiesel. Experiments were designed to determine the effects of catalyst type and quantity, methanol to oil ratio, reaction temperature and time on the transesterification process using response surface methodology. Fatty acid methyl ester yield reached up to 91% with methanol:HCl:oil molar ratio of 82:4:1 at 65 degrees C for 6.4h reaction time. The biodiesel yield relative to the weight of the oil was found to be 69%.

  19. Optimized IMAC-IMAC protocol for phosphopeptide recovery from complex biological samples

    DEFF Research Database (Denmark)

    Ye, Juanying; Zhang, Xumin; Young, Clifford

    2010-01-01

    using Fe(III)-NTA IMAC resin and it proved to be highly selective in the phosphopeptide enrichment of a highly diluted standard sample (1:1000) prior to MALDI MS analysis. We also observed that a higher iron purity led to an increased IMAC enrichment efficiency. The optimized method was then adapted...... to phosphoproteome analyses of cell lysates of high protein complexity. From either 20 microg of mouse sample or 50 microg of Drosophila melanogaster sample, more than 1000 phosphorylation sites were identified in each study using IMAC-IMAC and LC-MS/MS. We demonstrate efficient separation of multiply phosphorylated...... characterization of phosphoproteins in functional phosphoproteomics research projects....

  20. Optimized fabrication protocols of microfluidic devices for X-ray analysis

    KAUST Repository

    Catalano, Rossella

    2014-07-01

    Microfluidics combined with X-ray scattering techniques allows probing conformational changes or assembly processes of biological materials. Our aim was to develop a highly X-ray transparent microfluidic cell for detecting small variations of X-ray scattering involved in such processes. We describe the fabrication of a polyimide microfluidic device based on a simple, reliable and inexpensive lamination process. The implemented microstructured features result in windows with optimized X-ray transmission. The microfluidic device was characterized by X-ray microbeam scattering at the ID13 beamline of the European Synchrotron Radiation Facility. © 2014 Elsevier B.V. All rights reserved.

  1. Medially Directed TRUS Biopsy of the Prostate: Clinical Utility and Optimal Protocol

    International Nuclear Information System (INIS)

    Park, Byung Kwan; Kim, Seung Hyup

    2012-01-01

    The objective of this study is to determine whether medially directed transrectal ultrasound (TRUS)-guided biopsy is necessary for detection of prostate cancer and for establishment of an optimal biopsy regimen that is equivalent to a systematic 12 core biopsy. A total of 302 patients underwent a TRUS-guided systematic 12 core biopsy consisting of both medial sextant biopsy obtained between the parasagittal line and midline and lateral sextant biopsy obtained between the parasagittal line and lateral border. We obtained cancer detection rates of various biopsy regimens that were produced from a systematic 12 core biopsy. Using a systematic 12 core biopsy, cancer was detected in 116 (38.4%) of 302 patients. No significant difference was observed between cancer detection rates of medial sextant biopsy and lateral sextant biopsy (33.8% versus 31.5%, p >.05). Biopsy regimens that were equivalent to the systematic 12 core regarding cancer detection rate included medially directed cores that were obtained from both medial portions of the apex. Both medially directed biopsy and laterally directed biopsy are necessary for detection of prostate cancer and for establishment of an optimal biopsy regimen.

  2. Centrifugation protocols: tests to determine optimal lithium heparin and citrate plasma sample quality.

    Science.gov (United States)

    Dimeski, Goce; Solano, Connie; Petroff, Mark K; Hynd, Matthew

    2011-05-01

    Currently, no clear guidelines exist for the most appropriate tests to determine sample quality from centrifugation protocols for plasma sample types with both lithium heparin in gel barrier tubes for biochemistry testing and citrate tubes for coagulation testing. Blood was collected from 14 participants in four lithium heparin and one serum tube with gel barrier. The plasma tubes were centrifuged at four different centrifuge settings and analysed for potassium (K(+)), lactate dehydrogenase (LD), glucose and phosphorus (Pi) at zero time, poststorage at six hours at 21 °C and six days at 2-8°C. At the same time, three citrate tubes were collected and centrifuged at three different centrifuge settings and analysed immediately for prothrombin time/international normalized ratio, activated partial thromboplastin time, derived fibrinogen and surface-activated clotting time (SACT). The biochemistry analytes indicate plasma is less stable than serum. Plasma sample quality is higher with longer centrifugation time, and much higher g force. Blood cells present in the plasma lyse with time or are damaged when transferred in the reaction vessels, causing an increase in the K(+), LD and Pi above outlined limits. The cells remain active and consume glucose even in cold storage. The SACT is the only coagulation parameter that was affected by platelets >10 × 10(9)/L in the citrate plasma. In addition to the platelet count, a limited but sensitive number of assays (K(+), LD, glucose and Pi for biochemistry, and SACT for coagulation) can be used to determine appropriate centrifuge settings to consistently obtain the highest quality lithium heparin and citrate plasma samples. The findings will aid laboratories to balance the need to provide the most accurate results in the best turnaround time.

  3. Urinary extracellular vesicles for RNA extraction: optimization of a protocol devoid of prokaryote contamination.

    Science.gov (United States)

    Tataruch-Weinert, Dorota; Musante, Luca; Kretz, Oliver; Holthofer, Harry

    2016-01-01

    Urinary extracellular vesicles (UEVs) represent an ideal platform for biomarker discovery. They carry different types of RNA species, and reported profile discrepancies related to the presence/absence of 18s and 28s rRNA remain controversial. Moreover, sufficient urinary RNA yields and respective quality RNA profiles are still to be fully established. UEVs were enriched by hydrostatic filtration dialysis, and RNA content was extracted using 7 different commercially available techniques. RNA quantity was assessed using spectrophotometry and fluorometry, whilst RNA quality was determined by capillary electrophoresis. The presence of prokaryotic transcriptome was stressed when cellular RNA, as a control, was spiked into the UEVs samples before RNA extraction. The presence of bacteria in hydrostatic filtration dialysis above 1,000 kDa molecular weight cut-off and in crude urine was confirmed with growth media plates. The efficiency in removing urinary bacteria was evaluated by differential centrifugation, filtration (0.22 µm filters) and chemical pretreatment (water purification tablet). For volumes of urine >200 ml, the chemical treatment provides ease of handling without affecting vesicle integrity, protein and RNA profiles. This protocol was selected to enrich RNA with 7 methods, and its respective quality and quantity were assessed. The results were given as follows: (a) Fluorometry gave more repeatability and reproducibility than spectrophotometry to assess the RNA yields, (b) UEVs were enriched with small RNA, (c) Ribosomal RNA peaks were not observed for any RNA extraction method used and (d) RNA yield was higher for column-based method designed for urinary exosome, whilst the highest relative microRNA presence was obtained using TRIzol method. Our results show that the presence of bacteria can lead to misidentification in the electrophoresis peaks. Fluorometry is more reliable than spectrophotometry. RNA isolation method must be selected in conjunction with

  4. Metabolite extraction from adherently growing mammalian cells for metabolomics studies: optimization of harvesting and extraction protocols.

    Science.gov (United States)

    Dettmer, Katja; Nürnberger, Nadine; Kaspar, Hannelore; Gruber, Michael A; Almstetter, Martin F; Oefner, Peter J

    2011-01-01

    Trypsin/ethylenediaminetetraacetic acid (EDTA) treatment and cell scraping in a buffer solution were compared for harvesting adherently growing mammalian SW480 cells for metabolomics studies. In addition, direct scraping with a solvent was tested. Trypsinated and scraped cell pellets were extracted using seven different extraction protocols including pure methanol, methanol/water, pure acetone, acetone/water, methanol/chloroform/water, methanol/isopropanol/water, and acid-base methanol. The extracts were analyzed by GC-MS after methoximation/silylation and derivatization with propyl chloroformate, respectively. The metabolic fingerprints were compared and 25 selected metabolites including amino acids and intermediates of energy metabolism were quantitatively determined. Moreover, the influence of freeze/thaw cycles, ultrasonication and homogenization using ceramic beads on extraction yield was tested. Pure acetone yielded the lowest extraction efficiency while methanol, methanol/water, methanol/isopropanol/water, and acid-base methanol recovered similar metabolite amounts with good reproducibility. Based on overall performance, methanol/water was chosen as a suitable extraction solvent. Repeated freeze/thaw cycles, ultrasonication and homogenization did not improve overall metabolite yield of the methanol/water extraction. Trypsin/EDTA treatment caused substantial metabolite leakage proving it inadequate for metabolomics studies. Gentle scraping of the cells in a buffer solution and subsequent extraction with methanol/water resulted on average in a sevenfold lower recovery of quantified metabolites compared with direct scraping using methanol/water, making the latter one the method of choice to harvest and extract metabolites from adherently growing mammalian SW480 cells.

  5. Preliminary pilot fMRI study of neuropostural optimization with a noninvasive asymmetric radioelectric brain stimulation protocol in functional dysmetria

    Directory of Open Access Journals (Sweden)

    Mura M

    2012-04-01

    Full Text Available Marco Mura1, Alessandro Castagna2, Vania Fontani2, Salvatore Rinaldi21Institute of Radiology, University of Cagliari, 2Rinaldi Fontani Institute – Department of Neuro Psycho Physical Optimization, Florence, ItalyPurpose: This study assessed changes in functional dysmetria (FD and in brain activation observable by functional magnetic resonance imaging (fMRI during a leg flexion-extension motor task following brain stimulation with a single radioelectric asymmetric conveyer (REAC pulse, according to the precisely defined neuropostural optimization (NPO protocol.Population and methods: Ten healthy volunteers were assessed using fMRI conducted during a simple motor task before and immediately after delivery of a single REAC-NPO pulse. The motor task consisted of a flexion-extension movement of the legs with the knees bent. FD signs and brain activation patterns were compared before and after REAC-NPO.Results: A single 250-millisecond REAC-NPO treatment alleviated FD, as evidenced by patellar asymmetry during a sit-up motion, and modulated activity patterns in the brain, particularly in the cerebellum, during the performance of the motor task.Conclusion: Activity in brain areas involved in motor control and coordination, including the cerebellum, is altered by administration of a REAC-NPO treatment and this effect is accompanied by an alleviation of FD.Keywords: motor behavior, motor control, cerebellum, dysmetria, functional dysmetria, fluctuating asymmetry

  6. Improved identification of cranial nerves using paired-agent imaging: topical staining protocol optimization through experimentation and simulation

    Science.gov (United States)

    Torres, Veronica C.; Wilson, Todd; Staneviciute, Austeja; Byrne, Richard W.; Tichauer, Kenneth M.

    2018-03-01

    Skull base tumors are particularly difficult to visualize and access for surgeons because of the crowded environment and close proximity of vital structures, such as cranial nerves. As a result, accidental nerve damage is a significant concern and the likelihood of tumor recurrence is increased because of more conservative resections that attempt to avoid injuring these structures. In this study, a paired-agent imaging method with direct administration of fluorophores is applied to enhance cranial nerve identification. Here, a control imaging agent (ICG) accounts for non-specific uptake of the nerve-targeting agent (Oxazine 4), and ratiometric data analysis is employed to approximate binding potential (BP, a surrogate of targeted biomolecule concentration). For clinical relevance, animal experiments and simulations were conducted to identify parameters for an optimized stain and rinse protocol using the developed paired-agent method. Numerical methods were used to model the diffusive and kinetic behavior of the imaging agents in tissue, and simulation results revealed that there are various combinations of stain time and rinse number that provide improved contrast of cranial nerves, as suggested by optimal measures of BP and contrast-to-noise ratio.

  7. Urinary extracellular vesicles for RNA extraction: optimization of a protocol devoid of prokaryote contamination

    Directory of Open Access Journals (Sweden)

    Dorota Tataruch-Weinert

    2016-06-01

    Full Text Available Background: Urinary extracellular vesicles (UEVs represent an ideal platform for biomarker discovery. They carry different types of RNA species, and reported profile discrepancies related to the presence/absence of 18s and 28s rRNA remain controversial. Moreover, sufficient urinary RNA yields and respective quality RNA profiles are still to be fully established. Methods: UEVs were enriched by hydrostatic filtration dialysis, and RNA content was extracted using 7 different commercially available techniques. RNA quantity was assessed using spectrophotometry and fluorometry, whilst RNA quality was determined by capillary electrophoresis. Results: The presence of prokaryotic transcriptome was stressed when cellular RNA, as a control, was spiked into the UEVs samples before RNA extraction. The presence of bacteria in hydrostatic filtration dialysis above 1,000 kDa molecular weight cut-off and in crude urine was confirmed with growth media plates. The efficiency in removing urinary bacteria was evaluated by differential centrifugation, filtration (0.22 µm filters and chemical pretreatment (water purification tablet. For volumes of urine >200 ml, the chemical treatment provides ease of handling without affecting vesicle integrity, protein and RNA profiles. This protocol was selected to enrich RNA with 7 methods, and its respective quality and quantity were assessed. The results were given as follows: (a Fluorometry gave more repeatability and reproducibility than spectrophotometry to assess the RNA yields, (b UEVs were enriched with small RNA, (c Ribosomal RNA peaks were not observed for any RNA extraction method used and (d RNA yield was higher for column-based method designed for urinary exosome, whilst the highest relative microRNA presence was obtained using TRIzol method. Conclusion: Our results show that the presence of bacteria can lead to misidentification in the electrophoresis peaks. Fluorometry is more reliable than spectrophotometry. RNA

  8. Technical requirements, biophysical considerations and protocol optimization with magnetic resonance angiography using blood-pool agents

    International Nuclear Information System (INIS)

    Rohrer, M.; Geerts-Ossevoort, L.; Laub, G.

    2007-01-01

    In order to maximize the potential benefits of contrast-enhanced magnetic resonance angiography, careful attention must be paid to the choice of hardware, data acquisition and processing, and to the choice of contrast agent. Typically, contrast-enhanced magnetic resonance angiography uses parallel-imaging techniques, which shorten the acquisition time, enhance spatial resolution and reduce artefacts. The timing of data acquisition is crucial for maximal enhancement of the arteries: for optimal arterial depiction, the centre of k-space should be acquired at the time of peak concentration of contrast agent in the arterial bed being investigated, and a number of k-space acquisition techniques are available to achieve this. SENSE or GRAPPA techniques can be used to facilitate parallel-imaging reconstruction of either the image data or k-space data, respectively. Gadolinium contrast agents shorten the proton relaxation times (most importantly T1) of blood, thereby increasing the signal-to-noise ratio and enhancing differentiation between blood vessels and other tissues. The blood-pool (intravascular) contrast agent gadofosveset trisodium (Vasovist, Bayer Schering Pharma AG, Berlin, Germany) is reversibly protein-bound in human plasma. This results in a marked increase in relaxivity, and hence a strong T1 shortening effect compared with other gadolinium-based contrast agents. Furthermore, the blood retention time of gadofosveset trisodium is substantially prolonged compared with conventional contrast agents. As a result, gadofosveset trisodium permits both first-pass and steady-state imaging. (orig.)

  9. Optimization of protocol in computerized tomography scans of children's chest

    International Nuclear Information System (INIS)

    Lima, L.T.A.; Roberto, W. dos S.; Mourão Filho, A.P.

    2017-01-01

    The diffusion of the Computed Tomography (CT) has promoted a significant increase of the dose absorbed by patients. This technique showed a high growth as a result of clinical cases of medical emergencies, neoplasia and pediatric traumas. The risks of stochastic effects are greater for children due to tissue radiosensitivity coupled with longer life expectancy. In the present work, a cylindrical simulator was used, representing an adult thorax made of polymethylmethacrylate (PMMA), and a second simulator object of the same material was developed in oblong format including the axillary regions, based on the dimensions of the patient's thorax one-year-old pediatric population. The scanning on the adult simulator object was performed with the chest radiograph diagnostic service with a 120 kV supply voltage and in the pediatric simulator object were performed optimized scans with 120, 100 and 80 kV. This work compared the dose variation absorbed by the pediatric simulator object mentioned by the change in the tube supply voltage

  10. Optimization of individualized abdominal scan protocol with 64-slice CT scanner

    International Nuclear Information System (INIS)

    Hu Minxia; Zhao Xinming; Song Junfeng; Zhou Chunwu

    2012-01-01

    Objective: To explore an individualized abdominal scan protocol with a 64-slice CT scanner. Methods: From Sep. 2010 to Nov. 2010, one hundred consecutive patients, who underwent twice non-contrast-enhanced abdominal CT scans within 3 months, were enrolled in this study. For each patient, the tube current of 274 eff. mAs and 207 eff. mAs were applied respectively in the first and second abdominal scan. The imaging qualities of the two scans were evaluated retrospectively by 3 reviewers. All the individual variants,including height, weight, body mass index (BMI), the maximum transverse diameter, the anteroposterior diameter and the average maximum diameter of abdomen were recorded. A five-point scale was used for grading the image noise of eight organs, including abdominal aorta, portal vein, liver, spleen, gallbladder, pancreas, renal cortex and renal medulla. Diagnostic acceptability of CT images at three anatomic levels,including porta hepatis, pancreas and the upper pole of renal, was also evaluated by using a five-point scale. The noise value of abdominal aorta was defined as the standard deviation (SD) of CT values of aorta at the level of porta hepatis. Scatter diagram and Pearson correlation analysis were used for evaluating the linear relationship between the individual variants and the noise value of abdominal aorta, and multivariate linear regression analysis was used for evaluating the relevance between the individual variants and the noise value of aorta. Results: In this patients group, the average height was (164.6 ± 7.5) cm,the average weight was (64.3 ± 11.0) kg, the BMI was (23.7 ±3.3) kg/m 2 , the maximum transverse diameter of abdomen was (29.8 ± 2.3) cm, the anteroposterior diameter of abdomen was (23.1 ± 2.9) cm, and the average maximum diameter of abdomen was (26.5 ± 2.5) cm. Pearson correlation analysis showed significant positive linear correlation between the noise value of abdominal aorta (1 1.7 ± 3.0) and patients' weight (r=0

  11. Improving the characterization of endothelial progenitor cell subsets by an optimized FACS protocol.

    Directory of Open Access Journals (Sweden)

    Karin Huizer

    Full Text Available The characterization of circulating endothelial progenitor cells (EPCs is fundamental to any study related to angiogenesis. Unfortunately, current literature lacks consistency in the definition of EPC subsets due to variations in isolation strategies and inconsistencies in the use of lineage markers. Here we address critical points in the identification of hematopoietic progenitor cells (HPCs, circulating endothelial cells (CECs, and culture-generated outgrowth endothelial cells (OECs from blood samples of healthy adults (AB and umbilical cord (UCB. Peripheral blood mononuclear cells (PBMCs were enriched using a Ficoll-based gradient followed by an optimized staining and gating strategy to enrich for the target cells. Sorted EPC populations were subjected to RT-PCR for tracing the expression of markers beyond the limits of cell surface-based immunophenotyping. Using CD34, CD133 and c-kit staining, combined with FSC and SSC, we succeeded in the accurate and reproducible identification of four HPC subgroups and found significant differences in the respective populations in AB vs. UCB. Co-expression analysis of endothelial markers on HPCs revealed a complex pattern characterized by various subpopulations. CECs were identified by using CD34, KDR, CD45, and additional endothelial markers, and were subdivided according to their apoptotic state and expression of c-kit. Comparison of UCB-CECs vs. AB-CECs revealed significant differences in CD34 and KDR levels. OECs were grown from PBMC-fractions We found that viable c-kit+ CECs are a candidate circulating precursor for CECs. RT-PCR to angiogenic factors and receptors revealed that all EPC subsets expressed angiogenesis-related molecules. Taken together, the improvements in immunophenotyping and gating strategies resulted in accurate identification and comparison of better defined cell populations in a single procedure.

  12. International Study to Predict Optimized Treatment for Depression (iSPOT-D, a randomized clinical trial: rationale and protocol

    Directory of Open Access Journals (Sweden)

    Cooper Nicholas J

    2011-01-01

    Full Text Available Abstract Background Clinically useful treatment moderators of Major Depressive Disorder (MDD have not yet been identified, though some baseline predictors of treatment outcome have been proposed. The aim of iSPOT-D is to identify pretreatment measures that predict or moderate MDD treatment response or remission to escitalopram, sertraline or venlafaxine; and develop a model that incorporates multiple predictors and moderators. Methods/Design The International Study to Predict Optimized Treatment - in Depression (iSPOT-D is a multi-centre, international, randomized, prospective, open-label trial. It is enrolling 2016 MDD outpatients (ages 18-65 from primary or specialty care practices (672 per treatment arm; 672 age-, sex- and education-matched healthy controls. Study-eligible patients are antidepressant medication (ADM naïve or willing to undergo a one-week wash-out of any non-protocol ADM, and cannot have had an inadequate response to protocol ADM. Baseline assessments include symptoms; distress; daily function; cognitive performance; electroencephalogram and event-related potentials; heart rate and genetic measures. A subset of these baseline assessments are repeated after eight weeks of treatment. Outcomes include the 17-item Hamilton Rating Scale for Depression (primary and self-reported depressive symptoms, social functioning, quality of life, emotional regulation, and side-effect burden (secondary. Participants may then enter a naturalistic telephone follow-up at weeks 12, 16, 24 and 52. The first half of the sample will be used to identify potential predictors and moderators, and the second half to replicate and confirm. Discussion First enrolment was in December 2008, and is ongoing. iSPOT-D evaluates clinical and biological predictors of treatment response in the largest known sample of MDD collected worldwide. Trial registration International Study to Predict Optimised Treatment - in Depression (iSPOT-D ClinicalTrials.gov Identifier

  13. Design and protocol for the Dialysis Optimal Health Program (DOHP) randomised controlled trial.

    Science.gov (United States)

    Knowles, Simon R; Ski, Chantal F; Langham, Robyn; O'Flaherty, Emmet; Thompson, David R; Rossell, Susan L; Moore, Gaye; Hsueh, Ya-Seng Arthur; Castle, David J

    2016-09-09

    Chronic kidney disease (CKD) and end-stage kidney disease (ESKD) are serious and growing health problems with enormous impact on psychological and social functioning. Despite high rates of comorbid depression and anxiety in these patient populations, and the adverse impact these have upon treatment adherence, quality of life, social connectedness and healthcare costs there has been little attention focused on the prevention or management of these problems. Thus, our aim was to evaluate the Dialysis Optimal Health Program (DOHP) that adopts a person-centred approach and engages collaborative therapy to educate and support those diagnosed with ESKD who are commencing dialysis. The study design is a randomised controlled trial. Ninety-six adult patients initiating haemodialysis or peritoneal dialysis will be randomly allocated to either the intervention (DOHP) or usual care group. Participants receiving the intervention will receive nine (8 + 1 booster session) sequential sessions based on a structured information/workbook, psychosocial and educational supports and skills building. The primary outcome measures are depression and anxiety (assessed by the Hospital Anxiety and Depression Scale; HADS). Secondary outcomes include health-related quality of life (assessed by the Kidney Disease Quality of Life instrument; KDQOL), self-efficacy (assessed by General Self-Efficacy Scale) and clinical indices (e.g. albumin and haemoglobin levels). Cost-effectiveness analysis and process evaluation will also be performed to assess the economic value and efficacy of the DOHP. Primary and secondary measures will be collected at baseline and at 3-, 6-, and 12-month follow-up time points. We believe that this innovative trial will enhance knowledge of interventions aimed at supporting patients in the process of starting dialysis, and will broaden the focus from physical symptoms to include psychosocial factors such as depression, anxiety, self-efficacy, wellbeing and community

  14. Optimizing Gestational Weight Gain With the Eating4Two Smartphone App: Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Davis, Deborah; Davey, Rachel; Williams, Lauren T; Foureur, Maralyn; Nohr, Ellen; Knight-Agarwal, Catherine; Lawlis, Tanya; Oats, Jeremy; Skouteris, Helen; Fuller-Tyszkiewicz, Matthew

    2018-05-30

    than expected. Additional funds are required to employ research assistants and promote the study in an advertising campaign. Feasibility testing highlighted the inadequacy of the original recruitment strategy and the need to provide the app in both major platforms (Android and iOS). Smartphone technologies may offer an effective alternative to resource intensive strategies for assisting women to optimize weight gain in pregnancy. Australian New Zealand Clinical Trials Registry ACTRN12617000169347; https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?id=371470 (Archived by WebCite at http://www.webcitation.org /6zDvgw5bo). RR1-10.2196/9920. ©Deborah Davis, Rachel Davey, Lauren T. Williams, Maralyn Foureur, Ellen Nohr, Catherine Knight-Agarwal, Tanya Lawlis, Jeremy Oats, Helen Skouteris, Matthew Fuller-Tyszkiewicz. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 30.05.2018.

  15. Optimal conditions to use Pfu exo(-) DNA polymerase for highly efficient ligation-mediated polymerase chain reaction protocols.

    Science.gov (United States)

    Angers, M; Cloutier, J F; Castonguay, A; Drouin, R

    2001-08-15

    Ligation-Mediated Polymerase Chain Reaction (LMPCR) is the most sensitive sequencing technique available to map single-stranded DNA breaks at the nucleotide level of resolution using genomic DNA. LMPCR has been adapted to map DNA damage and reveal DNA-protein interactions inside living cells. However, the sequence context (GC content), the global break frequency and the current combination of DNA polymerases used in LMPCR affect the quality of the results. In this study, we developed and optimized an LMPCR protocol adapted for Pyrococcus furiosus exo(-) DNA polymerase (Pfu exo(-)). The relative efficiency of Pfu exo(-) was compared to T7-modified DNA polymerase (Sequenase 2.0) at the primer extension step and to Thermus aquaticus DNA polymerase (Taq) at the PCR amplification step of LMPCR. At all break frequencies tested, Pfu exo(-) proved to be more efficient than Sequenase 2.0. During both primer extension and PCR amplification steps, the ratio of DNA molecules per unit of DNA polymerase was the main determinant of the efficiency of Pfu exo(-), while the efficiency of Taq was less affected by this ratio. Substitution of NaCl for KCl in the PCR reaction buffer of Taq strikingly improved the efficiency of the DNA polymerase. Pfu exo(-) was clearly more efficient than Taq to specifically amplify extremely GC-rich genomic DNA sequences. Our results show that a combination of Pfu exo(-) at the primer extension step and Taq at the PCR amplification step is ideal for in vivo DNA analysis and DNA damage mapping using LMPCR.

  16. Optimization of whole-body PET imaging protocol for the detection of 18F-FDG overlappings in oncology

    International Nuclear Information System (INIS)

    Lartizien, C.

    2001-01-01

    Positron emission tomography (PET) is a nuclear imaging modality that allows studying in vivo cellular metabolic and biochemical processes. During the 90's, there has been a growing interest in the applications of PET in oncology related to the use of a glucose analog (FDG) labeled with the positron emitter 18 F. This tracer of the glucose metabolism is trapped in the cancer cells characterized by a deregulated glycolytic activity. This allows detecting tumors and metastases. The interest of PET in oncology has lead to develop imaging systems and protocols to perform whole-body acquisitions of the patient. Whole-body PET imaging has been limited in practice by the high level of statistical noise that affects the detection of small lesions due to limited radioactive dose injected to the patient and short acquisition time. In this context, our work focused on the optimization of detection performances in whole-body 18 F-FDG PET images. We have first developed an original method to evaluate detectability based on the psychophysical approach of the ROC methodology and adapted to the specificity of whole-body PET images. This method was used to evaluate detection performances of different reconstruction algorithms used for whole-body imaging. We have also studied the influence of the acquisition mode, namely the 2D and the 3D modes. To that purpose, we have used the NEC index to select relevant statistical acquisition conditions in both acquisition modes as a function of the injected dose to the patient. Then, we have compared the detection performances of these different acquisition conditions based on our psychophysical evaluation technique. (author) [fr

  17. Initial experience on protocol optimization for integrated PET/MR%PET/MR一体机操作优化的初步经验

    Institute of Scientific and Technical Information of China (English)

    刘家金; 陈英茂; 张雄伟; 富丽萍; 田嘉禾; 尹大一; 徐白萱

    2014-01-01

    目的 通过比较PET/CT和PET/MR,初步探索PET/MR一体机的操作流程和成像优化方案.方法 228例患者同日内接受PET/CT和PET/MR检查,通过6种不同MR序列与PET采集组合方案,比较图像质量的优劣,以在保证诊断信息基础上缩短患者扫描时间的原则分析判断,并初步确定最优PET/MR一体机采集方案.结果 PET/MR结果与PET/CT相近,但其操作流程和注意事项有独特之处;在6种方案中,以躯干和头部各有独立序列组合、兼顾各向同性结构显示与突出病灶特点的方案6效果最优;PET/MR比PET/CT更易产生伪影.结论 在优化方案基础上,PET/MR可获得与PET/CT一致的诊断级图像,但PET/MR采集时间长、伪影多,有待进一步完善.%Objective To investigate the optimal workflow and protocol for integrated PET/MR by comparison with PET/CT.Methods A total of 228 patients were enrolled in this study for PET/CT and PET/MR evaluation on the same day.Six PET/MR protocols with different MR sequences but the same PET acquisition protocol were investigated and the optimal protocol was identified based on image quality,acquisition time and diagnostic performance.Results PET/MR workflow was similar to PET/CT,however,some special issues needed to be considered for PET/MR.Among the 6 protocols,protocol No.6 outperformed others for body and head regions.Types of artifacts were found more often in PET/MR than in PET/CT.Conclusions By optimizing the protocol,PET/MR could achieve almost the same diagnostic performance as PET/CT.However,the issues of long acquisition time and artifacts on PET/MR need to be further improved.

  18. An efficient protocol for the synthesis of highly sensitive indole imines utilizing green chemistry: optimization of reaction conditions.

    Science.gov (United States)

    Nisar, Bushra; Rubab, Syeda Laila; Raza, Abdul Rauf; Tariq, Sobia; Sultan, Ayesha; Tahir, Muhammad Nawaz

    2018-04-11

    Novel and highly sensitive indole-based imines have been synthesized. Their synthesis has been compared employing a variety of protocols. Ultimately, a convenient, economical and high yielding set of conditions employing green chemistry have been designed for their synthesis.

  19. SU-F-I-46: Optimizing Dose Reduction in Adult Head CT Protocols While Maintaining Image Quality in Postmortem Head Scans

    International Nuclear Information System (INIS)

    Lipnharski, I; Carranza, C; Quails, N; Correa, N; Rajderkar, D; Bennett, J; Rill, L; Arreola, M

    2016-01-01

    Purpose: To optimize adult head CT protocol by reducing dose to an appropriate level while providing CT images of diagnostic quality. Methods: Five cadavers were scanned from the skull base to the vertex using a routine adult head CT protocol (120 kVp, 270 mA, 0.75 s rotation, 0.5 mm × 32 detectors, 70.8 mGy CTDIvol) followed by seven reduced-dose protocols with varying combinations of reduced tube current, reduced rotation time, and increased detectors with CTDIvol ranging from 38.2 to 65.6 mGy. Organ doses were directly measured with 21 OSL dosimeters placed on the surface and implanted in the head by a neurosurgeon. Two neuroradiologists assessed grey-white matter differentiation, fluid space, ventricular size, midline shift, brain mass, edema, ischemia, and skull fractures on a three point scale: (1) Unacceptable, (2) Borderline Acceptable, and (3) Acceptable. Results: For the standard scan, doses to the skin, lens of the eye, salivary glands, thyroid, and brain were 37.55 mGy, 49.65 mGy, 40.67 mGy, 4.63 mGy, and 27.33 mGy, respectively. Two cadavers had cerebral edema due to changing dynamics of postmortem effects, causing the grey-white matter differentiation to appear less distinct. Two cadavers with preserved grey-white matter received acceptable scores for all image quality features for the protocol with a CTDIvol of 57.3 mGy, allowing organ dose savings ranging from 34% to 45%. One cadaver allowed for greater dose reduction for the protocol with a CTDIvol of 42 mGy. Conclusion: Efforts to optimize scan protocol should consider both dose and clinical image quality. This is made possible with postmortem subjects, whose brains are similar to patients, allowing for an investigation of ideal scan parameters. Radiologists at our institution accepted scan protocols acquired with lower scan parameters, with CTDIvol values closer to the American College of Radiology’s (ACR) Achievable Dose level of 57 mGy.

  20. SU-F-I-46: Optimizing Dose Reduction in Adult Head CT Protocols While Maintaining Image Quality in Postmortem Head Scans

    Energy Technology Data Exchange (ETDEWEB)

    Lipnharski, I; Carranza, C; Quails, N; Correa, N; Rajderkar, D; Bennett, J; Rill, L; Arreola, M [University of Florida, Gainesville, FL (United States)

    2016-06-15

    Purpose: To optimize adult head CT protocol by reducing dose to an appropriate level while providing CT images of diagnostic quality. Methods: Five cadavers were scanned from the skull base to the vertex using a routine adult head CT protocol (120 kVp, 270 mA, 0.75 s rotation, 0.5 mm × 32 detectors, 70.8 mGy CTDIvol) followed by seven reduced-dose protocols with varying combinations of reduced tube current, reduced rotation time, and increased detectors with CTDIvol ranging from 38.2 to 65.6 mGy. Organ doses were directly measured with 21 OSL dosimeters placed on the surface and implanted in the head by a neurosurgeon. Two neuroradiologists assessed grey-white matter differentiation, fluid space, ventricular size, midline shift, brain mass, edema, ischemia, and skull fractures on a three point scale: (1) Unacceptable, (2) Borderline Acceptable, and (3) Acceptable. Results: For the standard scan, doses to the skin, lens of the eye, salivary glands, thyroid, and brain were 37.55 mGy, 49.65 mGy, 40.67 mGy, 4.63 mGy, and 27.33 mGy, respectively. Two cadavers had cerebral edema due to changing dynamics of postmortem effects, causing the grey-white matter differentiation to appear less distinct. Two cadavers with preserved grey-white matter received acceptable scores for all image quality features for the protocol with a CTDIvol of 57.3 mGy, allowing organ dose savings ranging from 34% to 45%. One cadaver allowed for greater dose reduction for the protocol with a CTDIvol of 42 mGy. Conclusion: Efforts to optimize scan protocol should consider both dose and clinical image quality. This is made possible with postmortem subjects, whose brains are similar to patients, allowing for an investigation of ideal scan parameters. Radiologists at our institution accepted scan protocols acquired with lower scan parameters, with CTDIvol values closer to the American College of Radiology’s (ACR) Achievable Dose level of 57 mGy.

  1. Neurofeedback Treatment and Posttraumatic Stress Disorder: Effectiveness of Neurofeedback on Posttraumatic Stress Disorder and the Optimal Choice of Protocol.

    Science.gov (United States)

    Reiter, Karen; Andersen, Søren Bo; Carlsson, Jessica

    2016-02-01

    Neurofeedback is an alternative, noninvasive approach used in the treatment of a wide range of neuropsychiatric disorders, including posttraumatic stress disorder (PTSD). Many different neurofeedback protocols and methods exist. Likewise, PTSD is a heterogeneous disorder. To review the evidence on effectiveness and preferred protocol when using neurofeedback treatment on PTSD, a systematic search of PubMed, PsychInfo, Embase, and Cochrane databases was undertaken. Five studies were included in this review. Neurofeedback had a statistically significant effect in three studies. Neurobiological changes were reported in three studies. Interpretation of results is, however, limited by differences between the studies and several issues regarding design. The optimistic results presented here qualify neurofeedback as probably efficacious for PTSD treatment.

  2. ACCPndn : adaptive congestion control protocol in named data networking by learning capacities using optimized time-lagged feedforward neural network

    OpenAIRE

    Karami, Amin

    2015-01-01

    Named Data Networking (NDN) is a promising network architecture being considered as a possible replacement for the current IP-based Internet infrastructure. However, NDN is subject to congestion when the number of data packets that reach one or various routers in a certain period of time is so high than its queue gets overflowed. To address this problem many congestion control protocols have been proposed in the literature which, however, they are highly sensitive to their control parameters ...

  3. A simple protocol for attenuating the auto-fluorescence of cyanobacteria for optimized fluorescence in situ hybridization (FISH) imaging.

    Science.gov (United States)

    Zeller, Perrine; Ploux, Olivier; Méjean, Annick

    2016-03-01

    Cyanobacteria contain pigments, which generate auto-fluorescence that interferes with fluorescence in situ hybridization (FISH) imaging of cyanobacteria. We describe simple chemical treatments using CuSO4 or H2O2 that significantly reduce the auto-fluorescence of Microcystis strains. These protocols were successfully applied in FISH experiments using 16S rRNA specific probes and filamentous cyanobacteria. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. Future long-term trials of postmenopausal hormone replacement therapy - what is possible and what is the optimal protocol and regimen?

    Science.gov (United States)

    Purbrick, B; Stranks, K; Sum, C; MacLennan, A H

    2012-06-01

    The ideal long-term, randomized, placebo-controlled trial of hormone replacement therapy (HRT) from near menopause for up to 30 years to assess major morbidity and mortality is impractical because of high cost, participant retention, therapy compliance, and continuity of research staff and funding. Also the trial regimen may become outdated. It is nihilistic to demand such a long-term trial before endorsing HRT. However, medium-term trials using surrogate measures for long-term morbidity and mortality are possible and two are near completion. If these studies have been able to maintain reasonable participant retention, therapy compliance and minimal breach of protocol, they will set standards for trials of new HRT regimens. This paper discusses lessons learnt from past attempts at long-term trials and suggests the currently optimal protocol and cost of assessing new HRT regimens to optimize potential benefits and minimize adverse effects. A 5-7-year randomized, placebo-controlled trial of a flexible transdermal estrogen regimen ± either a selective estrogen receptor modulator, e.g. bazedoxifene, or micronized progesterone is discussed. Mild to moderately symptomatic women, 1-4 years post menopause, can be recruited via general practice and group meetings. Future trials should be funded by independent agencies and are high priority in women's health.

  5. Determination of hydrazine in drinking water: Development and multivariate optimization of a rapid and simple solid phase microextraction-gas chromatography-triple quadrupole mass spectrometry protocol.

    Science.gov (United States)

    Gionfriddo, Emanuela; Naccarato, Attilio; Sindona, Giovanni; Tagarelli, Antonio

    2014-07-04

    In this work, the capabilities of solid phase microextraction were exploited in a fully optimized SPME-GC-QqQ-MS analytical approach for hydrazine assay. A rapid and easy method was obtained by a simple derivatization reaction with propyl chloroformate and pyridine carried out directly in water samples, followed by automated SPME analysis in the same vial without further sample handling. The affinity of the different derivatized compounds obtained towards five commercially available SPME coatings was evaluated, in order to achieve the best extraction efficiency. GC analyses were carried out using a GC-QqQ-MS instrument in selected reaction monitoring (SRM) acquisition mode which has allowed the achievement of high specificity by selecting appropriate precursor-product ion couples improving the capability in analyte identification. The multivariate approach of experimental design was crucial in order to optimize derivatization reaction, SPME process and tandem mass spectrometry parameters. Accuracy of the proposed protocol, tested at 60, 200 and 800 ng L(-1), provided satisfactory values (114.2%, 83.6% and 98.6%, respectively), whereas precision (RSD%) at the same concentration levels were of 10.9%, 7.9% and 7.7% respectively. Limit of detection and quantification of 4.4 and 8.3 ng L(-1) were obtained. The reliable application of the proposed protocol to real drinking water samples confirmed its capability to be used as analytical tool for routine analyses. Copyright © 2014 Elsevier B.V. All rights reserved.

  6. MR imaging of the ankle at 3 Tesla and 1.5 Tesla: protocol optimization and application to cartilage, ligament and tendon pathology in cadaver specimens

    International Nuclear Information System (INIS)

    Barr, Cameron; Malfair, David; Henning, Tobias D.; Steinbach, Lynne; Link, Thomas M.; Bauer, Jan S.; Ma, Benjamin

    2007-01-01

    The objective of this study was to optimize ankle joint MR imaging in volunteers at 1.5 Tesla (T) and 3.0 T, and to compare these optimized sequences concerning image quality and performance in assessing cartilage, ligament and tendon pathology in fresh human cadaver specimens. Initially our clinical ankle protocol consisting of T1-weighted (-w), fat-saturated (fs) T2-w, and short τ inversion-recovery fast spinecho (FSE) sequences was optimized at 1.5 T and 3.0 T by two radiologists. For dedicated cartilage imaging, fs-intermediate (IM)-w FSE, fs spoiled gradient echo, and balanced free-precession steady-state sequences were optimized. Using the optimized sequences, thirteen cadaver ankle joints were imaged. Four radiologists independently assessed these images concerning image quality and pathology. All radiologists consistently rated image quality higher at 3.0 T (all sequences p<0.05). For detecting cartilage pathology, diagnostic performance was significantly higher at 3.0 T (ROC-values up to 0.93 vs. 0.77; p<0.05); the fs-IM FSE sequence showed highest values among the different sequences. Average sensitivity for detecting tendon pathology was 63% at 3.0 T vs. 41% at 1.5 T and was significantly higher at 3.0 T for 2 out of 4 radiologists (p<0.05). Compared to 1.5 T, imaging of the ankle joint at 3.0 T significantly improved image quality and diagnostic performance in assessing cartilage pathology. (orig.)

  7. Cooperative Optimization QoS Cloud Routing Protocol Based on Bacterial Opportunistic Foraging and Chemotaxis Perception for Mobile Internet

    Directory of Open Access Journals (Sweden)

    Shujuan Wang

    2015-01-01

    Full Text Available In order to strengthen the mobile Internet mobility management and cloud platform resources utilization, optimizing the cloud routing efficiency is established, based on opportunistic bacterial foraging bionics, and puts forward a chemotaxis perception of collaborative optimization QoS (Quality of Services cloud routing mechanism. The cloud routing mechanism is based on bacterial opportunity to feed and bacterial motility and to establish the data transmission and forwarding of the bacterial population behavior characteristics. This mechanism is based on the characteristics of drug resistance of bacteria and the structure of the field, and through many iterations of the individual behavior and population behavior the bacteria can be spread to the food gathering area with a certain probability. Finally, QoS cloud routing path would be selected and optimized based on bacterial bionic optimization and hedge mapping relationship between mobile Internet node and bacterial population evolution iterations. Experimental results show that, compared with the standard dynamic routing schemes, the proposed scheme has shorter transmission delay, lower packet error ratio, QoS cloud routing loading, and QoS cloud route request overhead.

  8. Comparison of capture and storage methods for aqueous macrobial eDNA using an optimized extraction protocol

    DEFF Research Database (Denmark)

    Spens, Johan; Evans, Alice Ruth; Halfmaerten, David

    2017-01-01

    Aqueous environmental DNA (eDNA) is an emerging efficient non-invasive tool for species inventory studies. To maximize performance of downstream quantitative PCR (qPCR) and next-generation sequencing (NGS) applications, quality and quantity of the starting material is crucial, calling for optimized...

  9. Optimizing the MRI protocol of the sacroiliac joints in Spondyloarthritis: which para-axial sequence should be used?

    Energy Technology Data Exchange (ETDEWEB)

    Giraudo, Chiara; Weber, Michael; Platzgummer, Hannes; Kainberger, Franz; Schueller-Weidekamm, Claudia [Medical University of Vienna, Vienna General Hospital, Division of Neuroradiology and Musculoskeletal Radiology, Department of Biomedical Imaging und Image-guided Therapy, Vienna (Austria); Magnaldi, Silvia [Fondazione Poliambulanza Istituto Ospedaliero, Dipartimento di Radiologia e Diagnostica per Immagini, Brescia (Italy); Puchner, Antonia [Medical University of Vienna, Vienna General Hospital, Division of Rheumatology, Department of Internal Medicine III, Vienna (Austria)

    2016-01-15

    To assess the diagnostic value of para-axial T2w-TSE (paT2) and fat-suppressed proton density (paPD-FS) MRI sequences for the evaluation of the sacroiliac joint (SIJ) of patients with axial Spondylarthritis (SpA). One hundred and six patients with clinical findings suggestive of SpA underwent an MR protocol of the SIJ with additional paPD-FS (41 patients) and paT2 (105 patients). Acute (bone marrow oedema [BME], enthesitis, capsulitis, synovitis) and chronic findings (erosions, ankylosis) were assessed by paPD-FS and compared with the gold standard post-contrast sequences, whereas chronic features (because of the lack of fat suppression) were evaluated on paT2 and compared with pcT1. paPD-FS demonstrated high sensitivity (98.9 %) and specificity (99.1 %) for BME; sensitivity and specificity for synovitis and enthesitis were 100 %; 85.7 % and 100 %, respectively, for capsulitis. paPD-FS and paT2 showed 100 % sensitivity and specificity for ankylosis; for erosions, paT2 demonstrated 85.3 % sensitivity and 100 % specificity, whereas paPD-FS, respectively, 98 % and 100 %. PaT2 and paPD-FS provided precious information enabling an accurate interpretation of the heterogeneous findings of SpA. paPD-FS showed good results in detecting acute and chronic lesions and its inclusion in a routine MR examination of the SIJ could increase the diagnostic performance of a pre-contrast protocol. (orig.)

  10. Resveratrol Ameliorates the Maturation Process of β-Cell-Like Cells Obtained from an Optimized Differentiation Protocol of Human Embryonic Stem Cells

    Science.gov (United States)

    Pezzolla, Daniela; López-Beas, Javier; Lachaud, Christian C.; Domínguez-Rodríguez, Alejandro; Smani, Tarik; Hmadcha, Abdelkrim; Soria, Bernat

    2015-01-01

    Human embryonic stem cells (hESCs) retain the extraordinary capacity to differentiate into different cell types of an adult organism, including pancreatic β-cells. For this particular lineage, although a lot of effort has been made in the last ten years to achieve an efficient and reproducible differentiation protocol, it was not until recently that this aim was roughly accomplished. Besides, several studies evidenced the impact of resveratrol (RSV) on insulin secretion, even though the mechanism by which this polyphenol potentiates glucose-stimulated insulin secretion (GSIS) is still not clear. The aim of this study was to optimize an efficient differentiation protocol that mimics in vivo pancreatic organogenesis and to investigate whether RSV may improve the final maturation step to obtain functional insulin-secreting cells. Our results indicate that treatment of hESCs (HS-181) with activin-A induced definitive endoderm differentiation as detected by the expression of SOX17 and FOXA2. Addition of retinoic acid (RA), Noggin and Cyclopamine promoted pancreatic differentiation as indicated by the expression of the early pancreatic progenitor markers ISL1, NGN3 and PDX1. Moreover, during maturation in suspension culture, differentiating cells assembled in islet-like clusters, which expressed specific endocrine markers such as PDX1, SST, GCG and INS. Similar results were confirmed with the human induced Pluripotent Stem Cell (hiPSC) line MSUH-001. Finally, differentiation protocols incorporating RSV treatment yielded numerous insulin-positive cells, induced significantly higher PDX1 expression and were able to transiently normalize glycaemia when transplanted in streptozotocin (STZ) induced diabetic mice thus promoting its survival. In conclusion, our strategy allows the efficient differentiation of hESCs into pancreatic endoderm capable of generating β-cell-like cells and demonstrates that RSV improves the maturation process. PMID:25774684

  11. Patient dosimetry workshop - Scanner in clinical practice: how to optimize one's protocols (acquisition, interpretation, dosimetry)? - Radiation protection in medical environment

    International Nuclear Information System (INIS)

    Valero, M.; Pilleul, F.; Favre, F.; Tack, D.; Etard, C.; Aubert, B.; Roch, P.; Sinno-Tellier, S.; Gevenois, P.A.; Marelle, P.; Noel, A.; Coquel, P.; Museux, E.; Lair, F.; Francois, A.; Lemaire, P.; Delgoffe, C.; Puech, J.L.; Haller Montejo, M.; Rousselle, I.; Noel, A.; Pierrat, N.; Lasalle, S.; Brisse, H.; Guerson, T.; Mertz, L.; Mertz, M.; Wasylczenko, T.; Bietry, J.; Notter, S.; Jahnen, A.; Back, C.; Kohler, S.; Harpes, N.

    2010-01-01

    A selection of eleven brief communications given at the 2010 French days of radiology are compiled here and deal with: 1 - patient's dosimetry in classical radiology (Valero, M.); 2 - Oncology: how to optimize monitoring (dosimetry, new response criteria)? (Pilleul, F.; Favre, F.); 3 - Thorax: how to optimize lecture (MPR - Multi-Planar Reformat, MIP - Maximum Intensity Projection, MinIP - minimum intensity projection) and dosimetry? (Braine-L'Alleud); 4 - Medical exposure of the French population to diagnostic techniques in 2007 (Etard, C.; Aubert, B.; Sinno-Tellier, S.); 5 - Doses delivered to patients in radio-diagnostics: status of a national inquiry in the public sector (Etard, C.; Sinno-Tellier, S.; Aubert, B.); 6 - External help for the dose per section optimization in tomodensitometry (Tack, D.; Jahnen, A.; Back, C.; Kohler, S.; Harpes, N.; Gevenois, P.A.); 7 - Diagnostic reference levels (DRL) in radiology and scanography: status and evolution (Roch, P.; Aubert, B.); 8 - What conclusions can be drawn from the analysis of the DRLs in conventional radiology addressed to the CEPPIM (College for the evaluation of professional practices in medical imaging) (Marelle, P.; Coquel, P.; Museux, E.; Lair, F.; Francois, A.; Lemaire, P.; Delgoffe, C.; Puech, J.L.; Haller Montejo, M.); 9 - DRL analysis in scanography, an optimization tool? (Rousselle, I.; Noel, A.); 10 - Iterative reconstruction in scanography: potential dosimetric benefit and impact on image quality (Pierrat, N.; Lasalle, S.; Guerson, T.; Brisse, H.); 11 - Development of a patient's dose optimisation aided system in medical imaging (Mertz, L.; Mertz, M.; Wasylczenko, T.; Bietry, J.; Notter, S.)

  12. The optimization of low-dose scanning protocols of 64-slice spiral CT in the adult chest: a multicenter study

    International Nuclear Information System (INIS)

    Tang Wei; Huang Yao; Wu Ning

    2011-01-01

    Objective: To compare the image quality of chest low dose CT (LDCT) using automatic exposure control (AEC) and constant current. control (CCC) and explore a more reasonable scanning protocol. Methods: Two hundred and eighty participants were examined with 64 CT scanner at 7 centers in China. All were divided into 4 groups. Two groups underwent LDCT using AEC with standard deviation set at 25 (Al) and 30 (A2) respectively and the tube current ranged from 10 mA to 80 mA. The other two groups underwent LDCT using CCC with tube current set at 40 mA (Cl) and 50 mA (C2) respectively. The axial and MPR images were evaluated by two radiologists who were blinded to the scanning protocols. The radiation dose, noise and the image quality of the 4 groups were compared and analyzed statistically. Differences of radiation dose and noise among groups were determined with variance analysis and t test, image quality with Mann- Whitney test and the consistency of diagnosis with Kappa test. Results: There was a significant lower DLP in AEC group than in CCC group [(82.62±40.31) vs (110.81±18.21) mGy · cm (F=56.88, P 0.05]. The noisy of AEC group was higher than that of CCC group both on lung window (41.50±9.58 vs 40.86±7.03) and mediastinum window (41.19±7.83 vs 40.92±9.89), but there was no significant difference (F lung =0.835, P=0.476, F wediastinum =1.910, P=0.128). The quality score of axial image in AEC group was higher than that in CCC group (superior margin of the brachiocephalic vein level: 4.49± 0.56 vs 4.38±0.64, superior margin of the aortic arch: 4.86±0.23 vs 4.81±0.32, the right superior lobar bronchus Level: 4.87±0.27 vs 4.84±0.22, the right middle lobar bronchus Level: 4.90±0.25 vs 4.88±0.21) except on the right inferior pulmonary vein level (4.92±0.25 vs 4.93±0.17) and superior margin of the left diaphragmatic dome level (4.91±0.27 vs 4.93±0.22) on lung window, but no significant differences (F=0.076-1.748, P>0.05) were observed. A significant

  13. Optimization of synthesis protocols to control the nanostructure and the morphology of metal oxide thin films for memristive applications

    Energy Technology Data Exchange (ETDEWEB)

    Baldi, G., E-mail: giacomo.baldi@cnr.it; Bosi, M.; Attolini, G.; Berzina, T.; Mosca, R.; Ponraj, J. S.; Iannotta, S. [IMEM-CNR Institute, Parco Area delle Scienze 37/A, I-43124 Parma (Italy); Giusti, G.; Nozar, P.; Toccoli, T.; Verucchi, R. [IMEM-CNR Institute, Via alla Cascata 56/C, Povo – I-38123 Trento (Italy); Collini, C.; Lorenzelli, L. [FBK Bruno Kessler Foundation, Via Sommarive 18, I-38123 Trento (Italy)

    2015-03-10

    We propose a multi-technique approach based on in-vacuum synthesis of metal oxides to optimize the memristive properties of devices that use a metal oxide thin film as insulating layer. Pulsed Microplasma Cluster Source (PMCS) is based on supersonic beams seeded by clusters of the metal oxide. Nanocrystalline TiO{sub 2} thin films can be grown at room temperature, controlling the oxide stoichiometry from titanium metal up to a significant oxygen excess. Pulsed Electron beam Deposition (PED) is suitable to grow crystalline thin films on large areas, a step towards producing device arrays with controlled morphology and stoichiometry. Atomic Layer Deposition (ALD) is a powerful technique to grow materials layer-by-layer, finely controlling the chemical and structural properties of the film up to thickness of 50-80 nm. We will present a few examples of metal-insulator-metal structures showing a pinched hysteresis loop in their current-voltage characteristic. The structure, stoichiometry and morphology of the metal oxide layer, either aluminum oxide or titanium dioxide, is investigated by means of scanning electron microscopy (SEM) and by Raman scattering.

  14. Optimization of the dose versus noise in the image on protocols for computed tomography of pediatric head;Otimizacao da relacao dose versus ruido na imagem em protocolos de tomografia computadorizada de cranio pediatrico

    Energy Technology Data Exchange (ETDEWEB)

    Saint' Yves, T.L.A.; Travassos, P.C.; Goncalves, E.A.S.; Mecca, F.A.; Silveira, T.B. [Instituto Nacional de Cancer (INCA), Rio de Janeiro, RJ (Brazil)

    2009-07-01

    This article aims to establish protocols optimized for computed tomography of pediatric skull, to the Picker Q 2000 tomography of the Instituto Nacional de Cancer, through the analysis of dose x noise on the image with the variation of values of m As and k Vp. We used a water phantom to measure the noise, a pencil type ionization chamber to measure the dose in the air and the Alderson Randon phantom for check the quality of the image. We found values of m As and k Vp that reduce the skin dose of the original protocol used in 35.9%, maintaining the same image quality at a safe diagnosis. (author)

  15. Optimizing life success through residential immersive life skills programs for youth with disabilities: study protocol of a mixed-methods, prospective, comparative cohort study.

    Science.gov (United States)

    McPherson, Amy C; King, Gillian; Rudzik, Alanna; Kingsnorth, Shauna; Gorter, Jan Willem

    2016-09-06

    Young people with disabilities often lag behind their typically developing peers in the achievement of adult roles, which has been attributed to a lack of opportunities to develop critical life skills. Residential Immersive Life Skills (RILS) programs provide situated learning opportunities to develop life skills alongside peers and away from home in real-world settings. Retrospective research suggests that attending RILS programs is a transformative experience that empowers youth, provides parental hope, and increases service provider expertise. However, prospective, comparative research is needed to determine longer term benefits of these programs on youth life trajectories, in addition to exploring the program features and participant experiences that optimize program success. This protocol describes a 5-year, multi-site prospective study examining the effects of RILS programs for youth with disabilities. The study involves RILS programs at three sites in Ontario, Canada. Cohorts of treatment and control groups will receive the study protocol over 3 successive years. Thirty English-speaking participants aged 14-21 years with a child-onset disability and the cognitive capacity to engage in goal setting will be recruited every year for 3 years in the following groups: youth attending a RILS program (Group A); a deferred RILS control group of youth (Group B); a control group of youth attending a non-residential life skills program (Group C); and a control group matched on age, diagnoses, and cognitive capacity not receiving any life skills intervention (Group D). All participants will complete measures of self-determination and self-efficacy at four time points. Program opportunities and experiences will also be assessed in-the-moment at the RILS programs. Qualitative interviews pre-program and at 3- and 12-months post-program will be undertaken with a sub-sample of youth and parents to explore their expectations and experiences. This study will address key gaps

  16. 64-section multidetector CT of the upper abdomen: optimization of a saline chaser injection protocol for improved vascular and parenchymal contrast enhancement

    Energy Technology Data Exchange (ETDEWEB)

    Marin, Daniele [Duke University Medical Center, Department of Radiology, Durham, NC (United States); University of Rome Sapienza, Department of Radiological Sciences, Rome (Italy); Nelson, Rendon C. [Duke University Medical Center, Department of Radiology, Durham, NC (United States); Guerrisi, Antonino; Passariello, Roberto; Catalano, Carlo [University of Rome Sapienza, Department of Radiological Sciences, Rome (Italy); Barnhart, Huiman [Duke University Medical Center, Department of Biostatistics and Bioinformatics, Durham, NC (United States); Schindera, Sebastian T. [University Hospital of Bern, Institute for Diagnostic, Interventional and Pediatric Radiology, Bern (Switzerland)

    2011-09-15

    To prospectively investigate the effect of varying the injection flow rates of a saline chaser on vascular and parenchymal contrast enhancement during abdominal MDCT. 100 consecutive patients were randomly assigned to four injection protocols. A fixed dose of contrast medium was administered followed by no saline (Protocol A) or 50 mL of saline at 2, 4, or 8 mL/s (Protocols B, C, and D). Peak, time-to-peak, and duration of 90% peak enhancement were determined for aorta, pancreas, and liver. Aortic peak enhancement was significantly higher for Protocol D (369.5 HU) compared with Protocols A and B (332.9 HU and 326.0 HU, respectively; P < 0.05). Pancreatic peak enhancement was significantly higher for Protocols C and D (110.6 HU and 110.9 HU, respectively) compared to Protocol A (92.5 HU; P < 0.05). Aortic and pancreatic time-to-peak enhancement occurred significantly later for Protocol D compared with Protocol A (42.8 s vs. 36.1 s [P < 0.001] and 49.7 s vs. 45.3 s [P = 0.003]). Injecting a saline chaser at high flow rates yields significantly higher peak aortic and pancreatic enhancement, with a slight longer time-to-peak enhancement. (orig.)

  17. Does training family physicians in shared decision making promote optimal use of antibiotics for acute respiratory infections? Study protocol of a pilot clustered randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Côté Luc

    2007-11-01

    Full Text Available Abstract Background In North America, although it varies according to the specific type of acute respiratory infections (ARI, use of antibiotics is estimated to be well above the expected prevalence of bacterial infections. The objective of this pilot clustered randomized controlled trial (RCT is to assess the feasibility of a larger clustered RCT aiming at evaluating the impact of DECISION+, a continuing professional development (CPD program in shared decision making, on the optimal use of antibiotics in the context of ARI. Methods/design This pilot study is a cluster RCT conducted with family physicians from Family Medicine Groups (FMG in the Quebec City area, Canada. Participating FMG are randomised to an immediate DECISION+ group, a CPD program in shared decision making, (experimental group, or a delayed DECISION+ group (control group. Data collection involves recruiting five patients consulting for ARI per physician from both study groups before (Phase 1 and after (Phase 2 exposure of the experimental group to the DECISION+ program, and after exposure of the control group to the DECISION+ program (Phase 3. The primary outcome measures to assess the feasibility of a larger RCT include: 1 proportion of contacted FMG that agree to participate; 2 proportion of recruited physicians who participate in the DECISION+ program; 3 level of satisfaction of physicians regarding DECISION+; and 4 proportion of missing data in each data collection phase. Levels of agreement of the patient-physician dyad on the Decisional Conflict Scale and physicians' prescription profile for ARI are performed as secondary outcome measures. Discussion This study protocol is informative for researchers and clinicians interested in designing and/or conducting clustered RCT with FMG regarding training of physicians in shared decision making. Trial Registration ClinicalTrials.gov Identifier: NCT00354315

  18. MO-G-BRF-02: Enhancement of Texture-Based Metastasis Prediction Models Via the Optimization of PET/MRI Acquisition Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Vallieres, M; Laberge, S; Levesque I, R; El Naqa, I [McGill University, Montreal, QC (Canada)

    2014-06-15

    Purpose: We have previously identified a prediction model of lung metastases at diagnosis of soft-tissue sarcomas (STS) that is composed of two textural features extracted from FDG-PET and T1-weighted (T1w) MRI scans. The goal of this study is to evaluate whether the optimization in FDGPET and MRI acquisition parameters would enhance the prediction performance of texture-based models. Methods: Ten FDG-PET and T1w- MRI digitized tumor models were generated from imaging data of STS patients who underwent pre-treatment clinical scans between 2005 and 2011. Five of ten patients eventually developed lung metastases. Numerically simulated MR images were produced using echo times (TE) of 2 and 4 times the nominal clinical parameter (TEc), and repetition times (TR) of 0.5, 0.67, 1.5 and 2 times the nominal clinical parameter (TRc) found in the DICOM headers (TEc range: 9–13 ms, TRc range: 410-667 ms). PET 2D images were simulated using Monte-Carlo and were reconstructed using an ordered-subsets expectation maximization (OSEM) algorithm with 1 to 32 iterations and a post-reconstruction Gaussian filter of 0, 2, 4 or 6 mm width. For all possible combinations of PET and MRI acquisition parameters, the prediction model was constructed using logistic regression with new coefficients, and its associated prediction performance for lung metastases was evaluated using the area under the ROC curve (AUC). Results: The prediction performance over all simulations yielded AUCs ranging from 0.7 to 1. Notably, TR values below or equal to TRc and higher PET post-reconstruction filter widths yielded higher prediction performance. The best results were obtained with a combination of 4*TEc, TRc, 30 OSEM iterations and 2mm filter width. Conclusion: This work indicates that texture-based metastasis prediction models could be improved using optimized choices of FDG-PET and MRI acquisition protocols. This principle could be generalized to other texture-based models.

  19. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  20. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  1. A PET/MRI study towards finding the optimal ["1"8F]Fluciclovine PET protocol for detection and characterisation of primary prostate cancer

    International Nuclear Information System (INIS)

    Elschot, Mattijs; Sandsmark, Elise; Tessem, May-Britt; Selnaes, Kirsten M.; Bathen, Tone F.; Krueger-Stokke, Brage; Stoerkersen, Oeystein; Moestue, Siver A.; Bertilsson, Helena

    2017-01-01

    ["1"8F]Fluciclovine PET imaging shows promise for the assessment of prostate cancer. The purpose of this PET/MRI study is to optimise the PET imaging protocol for detection and characterisation of primary prostate cancer, by quantitative evaluation of the dynamic uptake of ["1"8F]Fluciclovine in cancerous and benign tissue. Patients diagnosed with high-risk primary prostate cancer underwent an integrated ["1"8F]Fluciclovine PET/MRI exam before robot-assisted radical prostatectomy with extended pelvic lymph node dissection. Volumes-of-interest (VOIs) of selected organs (prostate, bladder, blood pool) and sub-glandular prostate structures (tumour, benign prostatic hyperplasia (BPH), inflammation, healthy tissue) were delineated on T2-weighted MR images, using whole-mount histology samples as a reference. Three candidate windows for optimal PET imaging were identified based on the dynamic curves of the mean and maximum standardised uptake value (SUV_m_e_a_n and SUV_m_a_x, respectively). The statistical significance of differences in SUV between VOIs were analysed using Wilcoxon rank sum tests (p<0.05, adjusted for multiple testing). Twenty-eight (28) patients [median (range) age: 66 (55-72) years] were included. An early (W1: 5-10 minutes post-injection) and two late candidate windows (W2: 18-23; W3: 33-38 minutes post-injection) were selected. Late compared with early imaging was better able to distinguish between malignant and benign tissue [W3, SUV_m_e_a_n: tumour vs. BPH 2.5 vs. 2.0 (p<0.001), tumour vs. inflammation 2.5 vs. 1.7 (p<0.001), tumour vs. healthy tissue 2.5 vs. 2.0 (p<0.001); W1, SUV_m_e_a_n: tumour vs. BPH 3.1 vs. 3.1 (p=0.771), tumour vs inflammation 3.1 vs. 2.2 (p=0.021), tumour vs. healthy tissue 3.1 vs. 2.5 (p<0.001)] as well as between high-grade and low/intermediate-grade tumours (W3, SUV_m_e_a_n: 2.6 vs. 2.1 (p=0.040); W1, SUV_m_e_a_n: 3.1 vs. 2.8 (p=0.173)). These differences were relevant to the peripheral zone, but not the central gland

  2. A PET/MRI study towards finding the optimal [{sup 18}F]Fluciclovine PET protocol for detection and characterisation of primary prostate cancer

    Energy Technology Data Exchange (ETDEWEB)

    Elschot, Mattijs; Sandsmark, Elise; Tessem, May-Britt [NTNU, Norwegian University of Science and Technology, Deparment of Circulation and Medical Imaging, Faculty of Medicine, Trondheim (Norway); Selnaes, Kirsten M.; Bathen, Tone F. [NTNU, Norwegian University of Science and Technology, Deparment of Circulation and Medical Imaging, Faculty of Medicine, Trondheim (Norway); Trondheim University Hospital, St. Olavs Hospital, Trondheim (Norway); Krueger-Stokke, Brage [NTNU, Norwegian University of Science and Technology, Deparment of Circulation and Medical Imaging, Faculty of Medicine, Trondheim (Norway); Trondheim University Hospital, Department of Radiology, St. Olavs Hospital, Trondheim (Norway); Stoerkersen, Oeystein [Trondheim University Hospital, Department of Pathology, St. Olavs Hospital, Trondheim (Norway); Moestue, Siver A. [NTNU, Norwegian University of Science and Technology, Deparment of Circulation and Medical Imaging, Faculty of Medicine, Trondheim (Norway); NTNU, Norwegian University of Science and Technology, Department of Laboratory Medicine, Children' s and Women' s Health, Faculty of Medicine, Trondheim (Norway); Bertilsson, Helena [Trondheim University Hospital, Department of Urology, St. Olavs Hospital, Trondheim (Norway); NTNU, Norwegian University of Science and Technology, Department of Cancer Research and Molecular Medicine, Faculty of Medicine, Trondheim (Norway)

    2017-04-15

    [{sup 18}F]Fluciclovine PET imaging shows promise for the assessment of prostate cancer. The purpose of this PET/MRI study is to optimise the PET imaging protocol for detection and characterisation of primary prostate cancer, by quantitative evaluation of the dynamic uptake of [{sup 18}F]Fluciclovine in cancerous and benign tissue. Patients diagnosed with high-risk primary prostate cancer underwent an integrated [{sup 18}F]Fluciclovine PET/MRI exam before robot-assisted radical prostatectomy with extended pelvic lymph node dissection. Volumes-of-interest (VOIs) of selected organs (prostate, bladder, blood pool) and sub-glandular prostate structures (tumour, benign prostatic hyperplasia (BPH), inflammation, healthy tissue) were delineated on T2-weighted MR images, using whole-mount histology samples as a reference. Three candidate windows for optimal PET imaging were identified based on the dynamic curves of the mean and maximum standardised uptake value (SUV{sub mean} and SUV{sub max}, respectively). The statistical significance of differences in SUV between VOIs were analysed using Wilcoxon rank sum tests (p<0.05, adjusted for multiple testing). Twenty-eight (28) patients [median (range) age: 66 (55-72) years] were included. An early (W1: 5-10 minutes post-injection) and two late candidate windows (W2: 18-23; W3: 33-38 minutes post-injection) were selected. Late compared with early imaging was better able to distinguish between malignant and benign tissue [W3, SUV{sub mean}: tumour vs. BPH 2.5 vs. 2.0 (p<0.001), tumour vs. inflammation 2.5 vs. 1.7 (p<0.001), tumour vs. healthy tissue 2.5 vs. 2.0 (p<0.001); W1, SUV{sub mean}: tumour vs. BPH 3.1 vs. 3.1 (p=0.771), tumour vs inflammation 3.1 vs. 2.2 (p=0.021), tumour vs. healthy tissue 3.1 vs. 2.5 (p<0.001)] as well as between high-grade and low/intermediate-grade tumours (W3, SUV{sub mean}: 2.6 vs. 2.1 (p=0.040); W1, SUV{sub mean}: 3.1 vs. 2.8 (p=0.173)). These differences were relevant to the peripheral zone, but

  3. Optimization on the dose versus noise in the image on protocols for computed tomography of pediatric head; Otimizacao da relacao dose versus ruido na imagem em protocolos de tomografia computadorizada de cranio pediatrico

    Energy Technology Data Exchange (ETDEWEB)

    Saint' Yves, Thalis L.A.; Travassos, Paulo Cesar B.; Goncalves, Elicardo A.S.; Mecca A, Fernando; Silveira, Thiago B. [Instituto Nacional do Cancer (INCa), Rio de Janeiro, RJ (Brazil)], e-mail: fmecca@inca.gov.br, e-mail: thalis09@yahoo.com.br

    2010-03-15

    This article aims to establish protocols optimized for computed tomography of pediatric skull, to the Picker Q2000 tomography of the Instituto Nacional de Cancer, through the analysis of dose x noise on the image with the variation of values of mAs and kVp. We used a water phantom to measure the noise, a pencil type ionization chamber to measure the dose in the air and the Alderson Randon phantom for check the quality of the image. We found values of mAs and kVp that reduce the skin dose of the original protocol used in 35.9%, maintaining the same image quality at a safe diagnosis. (author)

  4. Quantitative and qualitative comparison of MR imaging of the temporomandibular joint at 1.5 and 3.0 T using an optimized high-resolution protocol

    Science.gov (United States)

    Spinner, Georg; Wyss, Michael; Erni, Stefan; Ettlin, Dominik A; Nanz, Daniel; Ulbrich, Erika J; Gallo, Luigi M; Andreisek, Gustav

    2016-01-01

    Objectives: To quantitatively and qualitatively compare MRI of the temporomandibular joint (TMJ) using an optimized high-resolution protocol at 3.0 T and a clinical standard protocol at 1.5 T. Methods: A phantom and 12 asymptomatic volunteers were MR imaged using a 2-channel surface coil (standard TMJ coil) at 1.5 and 3.0 T (Philips Achieva and Philips Ingenia, respectively; Philips Healthcare, Best, Netherlands). Imaging protocol consisted of coronal and oblique sagittal proton density-weighted turbo spin echo sequences. For quantitative evaluation, a spherical phantom was imaged. Signal-to-noise ratio (SNR) maps were calculated on a voxelwise basis. For qualitative evaluation, all volunteers underwent MRI of the TMJ with the jaw in closed position. Two readers independently assessed visibility and delineation of anatomical structures of the TMJ and overall image quality on a 5-point Likert scale. Quantitative and qualitative measurements were compared between field strengths. Results: The quantitative analysis showed similar SNR for the high-resolution protocol at 3.0 T compared with the clinical protocol at 1.5 T. The qualitative analysis showed significantly better visibility and delineation of clinically relevant anatomical structures of the TMJ, including the TMJ disc and pterygoid muscle as well as better overall image quality at 3.0 T than at 1.5 T. Conclusions: The presented results indicate that expected gains in SNR at 3.0 T can be used to increase the spatial resolution when imaging the TMJ, which translates into increased visibility and delineation of anatomical structures of the TMJ. Therefore, imaging at 3.0 T should be preferred over 1.5 T for imaging the TMJ. PMID:26371077

  5. Quantitative and qualitative comparison of MR imaging of the temporomandibular joint at 1.5 and 3.0 T using an optimized high-resolution protocol.

    Science.gov (United States)

    Manoliu, Andrei; Spinner, Georg; Wyss, Michael; Erni, Stefan; Ettlin, Dominik A; Nanz, Daniel; Ulbrich, Erika J; Gallo, Luigi M; Andreisek, Gustav

    2016-01-01

    To quantitatively and qualitatively compare MRI of the temporomandibular joint (TMJ) using an optimized high-resolution protocol at 3.0 T and a clinical standard protocol at 1.5 T. A phantom and 12 asymptomatic volunteers were MR imaged using a 2-channel surface coil (standard TMJ coil) at 1.5 and 3.0 T (Philips Achieva and Philips Ingenia, respectively; Philips Healthcare, Best, Netherlands). Imaging protocol consisted of coronal and oblique sagittal proton density-weighted turbo spin echo sequences. For quantitative evaluation, a spherical phantom was imaged. Signal-to-noise ratio (SNR) maps were calculated on a voxelwise basis. For qualitative evaluation, all volunteers underwent MRI of the TMJ with the jaw in closed position. Two readers independently assessed visibility and delineation of anatomical structures of the TMJ and overall image quality on a 5-point Likert scale. Quantitative and qualitative measurements were compared between field strengths. The quantitative analysis showed similar SNR for the high-resolution protocol at 3.0 T compared with the clinical protocol at 1.5 T. The qualitative analysis showed significantly better visibility and delineation of clinically relevant anatomical structures of the TMJ, including the TMJ disc and pterygoid muscle as well as better overall image quality at 3.0 T than at 1.5 T. The presented results indicate that expected gains in SNR at 3.0 T can be used to increase the spatial resolution when imaging the TMJ, which translates into increased visibility and delineation of anatomical structures of the TMJ. Therefore, imaging at 3.0 T should be preferred over 1.5 T for imaging the TMJ.

  6. Optimizing Staining Protocols for Laser Microdissection of Specific Cell Types from the Testis Including Carcinoma In Situ

    DEFF Research Database (Denmark)

    Sonne, Si Brask; Dalgaard, Marlene D; Nielsen, John Erik

    2009-01-01

    Microarray and RT-PCR based methods are important tools for analysis of gene expression; however, in tissues containing many different cells types, such as the testis, characterization of gene expression in specific cell types can be severely hampered by noise from other cells. The laser microdis......Microarray and RT-PCR based methods are important tools for analysis of gene expression; however, in tissues containing many different cells types, such as the testis, characterization of gene expression in specific cell types can be severely hampered by noise from other cells. The laser...... protocols, and present two staining protocols for frozen sections, one for fast and specific staining of fetal germ cells, testicular carcinoma in situ cells, and other cells with embryonic stem cell-like properties that express the alkaline phosphatase, and one for specific staining of lipid droplet...

  7. Optimization protocol for the extraction of 6-gingerol and 6-shogaol from Zingiber officinale var. rubrum Theilade and improving antioxidant and anticancer activity using response surface methodology.

    Science.gov (United States)

    Ghasemzadeh, Ali; Jaafar, Hawa Z E; Rahmat, Asmah

    2015-07-30

    Analysis and extraction of plant matrices are important processes for the development, modernization, and quality control of herbal formulations. Response surface methodology is a collection of statistical and mathematical techniques that are used to optimize the range of variables in various experimental processes to reduce the number of experimental runs, cost , and time, compared to other methods. Response surface methodology was applied for optimizing reflux extraction conditions for achieving high 6-gingerol and 6-shogaol contents, and high antioxidant activity in Zingiber officinale var. rubrum Theilade . The two-factor central composite design was employed to determine the effects of two independent variables, namely extraction temperature (X1: 50-80 °C) and time (X2: 2-4 h), on the properties of the extracts. The 6-gingerol and 6-shogaol contents were measured using ultra-performance liquid chromatography. The antioxidant activity of the rhizome extracts was determined by means of the 1,1-diphenyl-2-picrylhydrazyl assay. Anticancer activity of optimized extracts against HeLa cancer cell lines was measured using MTT (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide) assay. Increasing the extraction temperature and time induced significant response of the variables. The optimum extraction condition for all responses was at 76.9 °C for 3.4 h. Under the optimum condition, the corresponding predicted response values for 6-gingerol, 6-shogaol, and the antioxidant activity were 2.89 mg/g DW, 1.85 mg/g DW, and 84.3%, respectively. 6-gingerol and 6-shogaol were extracted under optimized condition to check the viability of the models. The values were 2.92 and 1.88 mg/g DW, and 84.0% for 6-gingerol, 6-shogaol, and the antioxidant activity respectively. The experimental values agreed with those predicted, thus indicating suitability of the models employed and the success of RSM in optimizing the extraction condition. With optimizing of reflux extraction

  8. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  9. Assessment of a robust model protocol with accelerated throughput for a human recombinant full length estrogen receptor-alpha binding assay: protocol optimization and intralaboratory assay performance as initial steps towards validation.

    Science.gov (United States)

    Freyberger, Alexius; Wilson, Vickie; Weimer, Marc; Tan, Shirlee; Tran, Hoai-Son; Ahr, Hans-Jürgen

    2010-08-01

    Despite about two decades of research in the field of endocrine active compounds, still no validated human recombinant (hr) estrogen receptor-alpha (ERalpha) binding assay is available, although hr-ERalpha is available from several sources. In a joint effort, US EPA and Bayer Schering Pharma with funding from the EU-sponsored 6th framework project, ReProTect, developed a model protocol for such a binding assay. Important features of this assay are the use of a full length hr-ERalpha and performance in a 96-well plate format. A full length hr-ERalpha was chosen, as it was considered to provide the most accurate and human-relevant results, whereas truncated receptors could perform differently. Besides three reference compounds [17beta-estradiol, norethynodrel, dibutylphthalate] nine test compounds with different affinities for the ERalpha [diethylstilbestrol (DES), ethynylestradiol, meso-hexestrol, equol, genistein, o,p'-DDT, nonylphenol, n-butylparaben, and corticosterone] were used to explore the performance of the assay. Three independent experiments per compound were performed on different days, and dilutions of test compounds from deep-frozen stocks, solutions of radiolabeled ligand and receptor preparation were freshly prepared for each experiment. The ERalpha binding properties of reference and test compounds were well detected. As expected dibutylphthalate and corticosterone were non-binders in this assay. In terms of the relative ranking of binding affinities, there was good agreement with published data obtained from experiments using a human recombinant ERalpha ligand binding domain. Irrespective of the chemical nature of the compound, individual IC(50)-values for a given compound varied by not more than a factor of 2.5. Our data demonstrate that the assay was robust and reliably ranked compounds with strong, weak, and no affinity for the ERalpha with high accuracy. It avoids the manipulation and use of animals, i.e., the preparation of uterine cytosol as

  10. Study of Optimal Replacement of Thyroxine in the ElDerly (SORTED): protocol for a mixed methods feasibility study to assess the clinical utility of lower dose thyroxine in elderly hypothyroid patients: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Wilkes, Scott; Pearce, Simon; Ryan, Vicky; Rapley, Tim; Ingoe, Lorna; Razvi, Salman

    2013-03-22

    The population of the UK is ageing. There is compelling evidence that thyroid stimulating hormone distribution levels increase with age. Currently, in UK clinical practice elderly hypothyroid patients are treated with levothyroxine to lower their thyroid stimulating hormone levels to a standard non-age-related range. Evidence suggests that mortality is negatively associated with thyroid stimulating hormone levels. We report the protocol of a feasibility study working towards a full-scale randomized controlled trial to test whether lower dose levothyroxine has beneficial cardiovascular outcomes in the oldest old. SORTED is a mixed methods study with three components: SORTED A: A feasibility study of a dual-center single-blinded randomized controlled trial of elderly hypothyroid patients currently treated with levothyroxine. Patients will be recruited from 20 general practices and two hospital trust endocrine units in Northumberland, Tyne and Wear. Target recruitment of 50 elderly hypothyroid patients currently treated with levothyroxine, identified in both primary and secondary care settings. Reduced dose of levothyroxine to achieve an elevated serum thyroid stimulating hormone (target range 4.1 to 8.0 mU/L) versus standard levothyroxine replacement (target range 0.4 to 4.0 mU/L). Using random permuted blocks, in a ratio of 1:1, randomization will be carried out by Newcastle Clinical Trials Unit. Study feasibility (recruitment and retention rates and medication compliance), acceptability of the trial design, assessment of mobility and falls risk, and change in cardiovascular risk factors. Qualitative study using in-depth interviews to understand patients' willingness to take part in a randomized controlled trial and participants' experience of the intervention. Retrospective cohort study of 400 treated hypothyroid patients aged 80 years or over registered in 2008 in primary care practices, studying their 4-year cardiovascular outcomes to inform the power of SORTED

  11. Optimal contouring of seminal vesicle for definitive radiotherapy of localized prostate cancer: comparison between EORTC prostate cancer radiotherapy guideline, RTOG0815 protocol and actual anatomy

    International Nuclear Information System (INIS)

    Qi, Xin; Gao, Xian-Shu; Asaumi, Junichi; Zhang, Min; Li, Hong-Zhen; Ma, Ming-Wei; Zhao, Bo; Li, Fei-Yu; Wang, Dian

    2014-01-01

    Intermediate- to-high-risk prostate cancer can locally invade seminal vesicle (SV). It is recommended that anatomic proximal 1-cm to 2-cm SV be included in the clinical target volume (CTV) for definitive radiotherapy based on pathology studies. However, it remains unclear whether the pathology indicated SV extent is included into the CTV defined by current guidelines. The purpose of this study is to compare the volume of proximal SV included in CTV defined by EORTC prostate cancer radiotherapy guideline and RTOG0815 protocol with the actual anatomic volume. Radiotherapy planning CT images from 114 patients with intermediate- (36.8%) or high-risk (63.2%) prostate cancer were reconstructed with 1-mm-thick sections. The starting and ending points of SV and the cross sections of SV at 1-cm and 2-cm from the starting point were determined using 3D-view. Maximum (D 1H , D 2H ) and minimum (D 1L , D 2L ) vertical distance from these cross sections to the starting point were measured. Then, CTV of proximal SV defined by actual anatomy, EORTC guideline and RTOG0815 protocol were contoured and compared (paired t test). Median length of D 1H , D 1L , D 2H and D 2L was 10.8 mm, 2.1 mm, 17.6 mm and 8.8 mm (95th percentile: 13.5mm, 5.0mm, 21.5mm and 13.5mm, respectively). For intermediate-risk patients, the proximal 1-cm SV CTV defined by EORTC guideline and RTOG0815 protocol inadequately included the anatomic proximal 1-cm SV in 62.3% (71/114) and 71.0% (81/114) cases, respectively. While for high-risk patients, the proximal 2-cm SV CTV defined by EORTC guideline inadequately included the anatomic proximal 2-cm SV in 17.5% (20/114) cases. SV involvement indicated by pathology studies was not completely included in the CTV defined by current guidelines. Delineation of proximal 1.4 cm and 2.2 cm SV in axial plane may be adequate to include the anatomic proximal 1-cm and 2-cm SV. However, part of SV may be over-contoured

  12. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  13. Detection and characteristics of microvascular obstruction in reperfused acute myocardial infarction using an optimized protocol for contrast-enhanced cardiovascular magnetic resonance imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bekkers, Sebastiaan C.A.M.; Gorgels, Anton P.M.; Passos, Valeria Lima; Waltenberger, Johannes; Crijns, Harry J.G.M.; Schalla, Simon [Maastricht University Medical Center, Department of Cardiology, P. Debyelaan 25, PO Box 5800, Maastricht (Netherlands); Backes, Walter H.; Snoep, Gabriel [Maastricht University Medical Center, Department of Radiology, P. Debyelaan 25, PO Box 5800, Maastricht (Netherlands); Kim, Raymond J. [Duke University Medical Center, Duke Cardiovascular Magnetic Resonance Center, PO Box 3934, Durham, NC (United States)

    2009-12-15

    Several cardiovascular magnetic resonance imaging (CMR) techniques are used to detect microvascular obstruction (MVO) after acute myocardial infarction (AMI). To determine the prevalence of MVO and gain more insight into the dynamic changes in appearance of MVO, we studied 84 consecutive patients with a reperfused AMI on average 5 and 104 days after admission, using an optimised single breath-hold 3D inversion recovery gradient echo pulse sequence (IR-GRE) protocol. Early MVO (2 min post-contrast) was detected in 53 patients (63%) and late MVO (10 min post-contrast) in 45 patients (54%; p = 0.008). The extent of MVO decreased from early to late imaging (4.3 {+-} 3.2% vs. 1.8 {+-} 1.8%, p < 0.001) and showed a heterogeneous pattern. At baseline, patients without MVO (early and late) had a higher left ventricular ejection fraction (LVEF) than patients with persistent late MVO (56 {+-} 7% vs. 48 {+-} 7%, p < 0.001) and LVEF was intermediate in patients with early MVO but late MVO disappearance (54 {+-} 6%). During follow-up, LVEF improved in all three subgroups but remained intermediate in patients with late MVO disappearance. This optimised single breath-hold 3D IR-GRE technique for imaging MVO early and late after contrast administration is fast, accurate and allows detection of patients with intermediate remodelling at follow-up. (orig.)

  14. An Optimized Protocol for DNA Extraction from Wheat Seeds and Loop-Mediated Isothermal Amplification (LAMP to Detect Fusarium graminearum Contamination of Wheat Grain

    Directory of Open Access Journals (Sweden)

    Mohamed Moslem

    2011-06-01

    Full Text Available A simple, rapid, and efficient method for isolating genomic DNA from germinated seeds of wheat that is free from polysaccharides and polyphenols is reported. DNA was extracted, treated with RNase, measured and tested for completeness using agarose gel electrophoresis. DNA purification from wheat grains yielded abundant, amplifiable DNA with yields typically between 100 and 200 ng DNA/mg. The effectiveness and reliability of the method was tested by assessing quantity and quality of the isolated DNA using three PCR-based markers. Inter-simple sequence repeats (ISSRs were used to assess the genetic diversity between different wheat varieties. Specific PCR primer pair Tox5-1/Tox5-2 and a loop-mediated isothermal amplification (LAMP procedure were used to detect genomic DNA of Fusarium graminearum in contaminated wheat seeds. In this method there is no need to use liquid nitrogen for crushing germinated seedlings. The protocol takes approximately one hour to prepare high quality DNA. In combination with the LAMP assay it is a fast and cost-effective alternative to traditional diagnostic methods for the early detection of toxigenic fusaria in cereals.

  15. An optimized protocol for DNA extraction from wheat seeds and Loop-Mediated Isothermal Amplification (LAMP) to detect Fusarium graminearum contamination of wheat grain.

    Science.gov (United States)

    Abd-Elsalam, Kamel; Bahkali, Ali; Moslem, Mohamed; Amin, Osama E; Niessen, Ludwig

    2011-01-01

    A simple, rapid, and efficient method for isolating genomic DNA from germinated seeds of wheat that is free from polysaccharides and polyphenols is reported. DNA was extracted, treated with RNase, measured and tested for completeness using agarose gel electrophoresis. DNA purification from wheat grains yielded abundant, amplifiable DNA with yields typically between 100 and 200 ng DNA/mg. The effectiveness and reliability of the method was tested by assessing quantity and quality of the isolated DNA using three PCR-based markers. Inter-simple sequence repeats (ISSRs) were used to assess the genetic diversity between different wheat varieties. Specific PCR primer pair Tox5-1/Tox5-2 and a loop-mediated isothermal amplification (LAMP) procedure were used to detect genomic DNA of Fusarium graminearum in contaminated wheat seeds. In this method there is no need to use liquid nitrogen for crushing germinated seedlings. The protocol takes approximately one hour to prepare high quality DNA. In combination with the LAMP assay it is a fast and cost-effective alternative to traditional diagnostic methods for the early detection of toxigenic fusaria in cereals.

  16. SU-G-TeP2-03: Comparison of Standard Dosimetry Protocol in Japan and AAPM TG-51 Addendum in Order to Establish Optimal Dosimetry for FFF Beam

    Energy Technology Data Exchange (ETDEWEB)

    Matsunaga, T; Adachi, Y [Department of Radiology, Seirei Hamamatsu General Hospital, Hamamatsu, Shizuoka (Japan); Hayashi, N [Graduate School of Health Sciences, Fujita Health University, Tayoake, Aichi (Japan); Nozue, M [Department of Radiation Oncology, Seirei Hamamtsu General Hospital, Hamamatsu, Shizuoka (Japan)

    2016-06-15

    Purpose: Japan Standard Dosimetry of Absorbed dose to water in external beam radiotherapy (JSDP12) is widely used to measure radiation dose in radiotherapy. However, JSDP12 does not take flattening-filter-free (FFF) beam into consideration. In addition, JSDP12 applied TPR20,10 for dose quality index for photon beam. The purpose of this study is to compare JSDP12 with AAPM TG-51 addendum in order to establish optimal dosimetry procedure for FFF beam. Method: We evaluated the ion-recombination factor (ks) and the correction factor of radial beam profile (Prp) in FFF beam dosimetry. The ks was introduced by 2 voltages method and verified by Jaffe’s plot. The Prp was given by both film measurement and calculation of treatment planning system, and compared them. Next, we compared the dose quality indexes (kQ) between TPR20,10 method and PDD(10)x method. Finally we considered optimal dosimetry protocol for FFF photon beam using JSDP12 with referring TG-51 addendum protocols. The FFF photon beams of 6 MV (6X-FFF) and 10 MV (10X-FFF) from TrueBeam were investigated in this study. Results: The ks for 6X-FFF and 10X-FFF beams were 1.005 and 1.010, respectively. The Prp of 0.6 cc ionization chamber for 6X-FFF and 10X-FFF beams (Film, TPS) were (1.004, 1.008) and (1.005, 1.008), respectively. The kQ for 6X-FFF and 10X-FFF beams (JSDP12, TG-51 addendum) were (0.9950, 0.9947) and (0.9851, 0.9845), respectively. The most effective factor for uncertainty in FFF photon beam measurement was Prp for JSDP12 formalism. Total dosimetric differences between JSDP12 and TG-51 addendum for 6X-FFF and 10X-FFF were -0.47% and -0.73%, respectively. Conclusion: The total dosimetric difference between JSDP12 and TG-51 addendum was within 1%. The introduction of kQ given by JSDP is feasible for FFF photon beam dosimetry. However, we think Prp should be considered for optimal dosimetry procedure even if JSDP12 is used for FFF photon beam dosimetry.

  17. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  18. Granulocyte-colony stimulating factor in the prevention of postoperative infectious complications and sub-optimal recovery from operation in patients with colorectal cancer and increased preoperative risk (ASA 3 and 4). Protocol of a controlled clinical trial developed by consensus of an international study group. Part three: individual patient, complication algorithm and quality manage.

    NARCIS (Netherlands)

    Stinner, B.; Bauhofer, A.; Lorenz, W.; Rothmund, M.; Plaul, U.; Torossian, A.; Celik, I.; Sitter, H.; Koller, M.; Black, A.; Duda, D.; Encke, A.; Greger, B.; Goor, H. van; Hanisch, E.; Hesterberg, R.; Klose, K.J.; Lacaine, F.; Lorijn, R.H.; Margolis, C.; Neugebauer, E.; Nystrom, P.O.; Reemst, P.H.M.; Schein, M.; Solovera, J.

    2001-01-01

    GENERAL DESIGN: Presentation of a new type of a study protocol for evaluation of the effectiveness of an immune modifier (rhG-CSF, filgrastim): prevention of postoperative infectious complications and of sub-optimal recovery from operation in patients with colorectal cancer and increased

  19. The optimal protocol to reduce blood loss and blood transfusion after unilateral total knee replacement: Low-dose IA-TXA plus 30-min drain clamping versus drainage clamping for the first 3 h without IA-TXA.

    Science.gov (United States)

    Park, Joo Hyun; Choi, Sung Wook; Shin, Eun Ho; Park, Myung Hoon; Kim, Myung Ku

    2017-01-01

    Although intraarticular tranexamic acid (IA-TXA) administration or drainage clamping are popular methods used to reduce blood loss after total knee replacement (TKR), the protocol remains controversial. We aimed (1) to establish new protocols through investigating whether two methods, that is, low-dose (500 mg) IA-TXA plus 30-min drain clamping and drainage clamping for the first 3 h without IA-TXA, can reduce blood loss and blood transfusion after unilateral TKR and (2) to make recommendations related to clinical application. This study, conducted from September 2014 to June 2016 related to enrolled 95 patients with primary osteoarthritis who were to have a unilateral cemented TKR, was nonrandomized and retrospective. In group A, the drain was released following tourniquet deflation. In group B, 500-mg TXA was injected into the knee joint via a drain tube after fascia closure and the drain was clamped for the first 30 min to prevent leakage. In group C, the drain was clamped for the first 3-h postoperation. Demographic characteristics and clinical data were collected, including the levels of hematocrit (Hct), the total blood loss (TBL), drained blood volume (BV), the amount of blood transfused, and any complications that developed. We found a significantly lower postoperative TBL, drained BV, decreasing Hct level, and less transfused BV in the IA-TXA injection group (group B) and the 3-h drainage clamping group (group C) compared to the conventional negative drainage group (group A; p optimal than drainage clamping in patients with high bleeding tendency or lateral retinacular release during TKR, who would be concerned about postoperative wound complication.

  20. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  1. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  2. Relationship among RR interval, optimal reconstruction phase, temporal resolution, and image quality of end-systolic reconstruction of coronary CT angiography in patients with high heart rates. In search of the optimal acquisition protocol

    International Nuclear Information System (INIS)

    Sano, Tomonari; Matsutani, Hideyuki; Kondo, Takeshi; Fujimoto, Shinichiro; Sekine, Takako; Arai, Takehiro; Morita, Hitomi; Takase, Shinichi

    2011-01-01

    The purpose of this study is to elucidate the relationship among RR interval (RR), the optimal reconstruction phase, and adequate temporal resolution (TR) to obtain coronary CT angiography images of acceptable quality using 64-multi detector-row CT (MDCT) (Aquilion 64) of end-systolic reconstruction in 407 patients with high heart rates. Image quality was classified into 3 groups [rank A (excellent): 161, rank B (acceptable): 207, and rank C (unacceptable): 39 patients]. The optimal absolute phase (OAP) significantly correlated with RR [OAP (ms)=119-0.286 RR (ms), r=0.832, p<0.0001], and the optimal relative phase (ORP) also significantly correlated with RR [ORP (%)=62-0.023 RR (ms), r=0.656, p<0.0001], and the correlation coefficient of OAP was significantly (p<0.0001) higher than that of ORP. The OAP range (±2 standard deviation (SD)) in which it is highly possible to get a static image was from [119-0.286 RR (ms)-46] to [119-0.286 RR (ms)+46]. The TR was significantly different among ranks A (97±22 ms), B (111±31 ms) and C (135±34 ms). The TR significantly correlated with RR in ranks A (TR=-16+0.149 RR, r=0.767, p<0.0001), B (TR=-15+0.166 RR, r=0.646, p<0.0001), and C (TR=52+0.117 RR, r=0.425, p=0.0069). Rank C was distinguished from ranks A or B by linear discriminate analysis (TR=-46+0.21 RR), and the discriminate rate was 82.6%. In conclusion, both the OAP and adequate TR depend on RR, and the OAP range (±2 SD) can be calculated using the formula [119-0.286 RR (ms)-46] to [119-0.286 RR (ms) +46], and an adequate TR value would be less than (-46+0.21 RR). (author)

  3. Service Characteristics Based High Speed Multimedia Transport Protocol

    National Research Council Canada - National Science Library

    Chen, C

    1997-01-01

    .... This multimedia protocol will automatically extract service requirements from multimedia applications by selecting certain sets of parameters from user applications to optimally drive the lower level physical network...

  4. Barriers and facilitators to the dissemination of DECISION+, a continuing medical education program for optimizing decisions about antibiotics for acute respiratory infections in primary care: A study protocol

    Directory of Open Access Journals (Sweden)

    Gagnon Marie-Pierre

    2011-01-01

    decision making regarding the use of antibiotics in acute respiratory infections, to facilitate its dissemination in primary care on a large scale. Our results should help continuing medical educators develop a continuing medical education program in shared decision making for other clinically relevant topics. This will help optimize clinical decisions in primary care.

  5. Optimization of low-dose protocol in thoracic aorta CTA: weighting of adaptive statistical iterative reconstruction (ASIR) algorithm and scanning parameters

    International Nuclear Information System (INIS)

    Zhao Yongxia; Chang Jin; Zuo Ziwei; Zhang Changda; Zhang Tianle

    2014-01-01

    Objective: To investigate the best weighting of adaptive statistical iterative reconstruction (ASIR) algorithm and optimized low-dose scanning parameters in thoracic aorta CT angiography(CTA). Methods: Totally 120 patients with the body mass index (BMI) of 19-24 were randomly divided into 6 groups. All patients underwent thoracic aorta CTA with a GE Discovery CT 750 HD scanner (ranging from 290-330 mm). The default parameters (100 kV, 240 mAs) were applied in Group 1. Reconstructions were performed with different weightings of ASIR(10%-100% with 10%), and the signal to noise ratio (S/N) and contrast to noise ratio(C/N) of images were calculated. The images of series were evaluated by 2 independent radiologists with 5-point-scale and lastly the best weighting were revealed. Then the mAs in Group 2-6 were defined as 210, 180, 150, 120 and 90 with the kilovoltage 100. The CTDI_v_o_l and DLP in every scan series were recorded and the effective dose (E) was calculated. The S/N and C/N were calculated and the image quality was assessed by two radiologists. Results: The best weighing of ASIR was 60% at the 100 kV, 240 mAs. Under 60% of ASIR and 100 kV, the scores of image quality from 240 mAs to 90 mAs were (4.78±0.30)-(3.15±0.23). The CTDI_v_o_l and DLP were 12.64-4.41 mGy and 331.81-128.27 mGy, and the E was 4.98-1.92 mSv. The image qualities among Group 1-5 were nor significantly different (F = 5.365, P > 0.05), but the CTDI_v_o_l and DLP of Group 5 were reduced by 37.0% and 36.9%, respectively compared with Group 1. Conclusions: In thoracic aorta CT Angiography, the best weighting of ASIR is 60%, and 120 mAs is the best mAs with 100 kV in patients with BMI 19-24. (authors)

  6. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  7. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  8. The PULSAR primary care protocol: a stepped-wedge cluster randomized controlled trial to test a training intervention for general practitioners in recovery-oriented practice to optimize personal recovery in adult patients.

    Science.gov (United States)

    Enticott, Joanne C; Shawyer, Frances; Brophy, Lisa; Russell, Grant; Fossey, Ellie; Inder, Brett; Mazza, Danielle; Vasi, Shiva; Weller, Penelope June; Wilson-Evered, Elisabeth; Edan, Vrinda; Meadows, Graham

    2016-12-20

    General practitioners (GPs) in Australia play a central role in the delivery of mental health care. This article describes the PULSAR (Principles Unite Local Services Assisting Recovery) Primary Care protocol, a novel mixed methods evaluation of a training intervention for GPs in recovery-oriented practice. The aim of the intervention is to optimize personal recovery in patients consulting study GPs for mental health issues. The intervention mixed methods design involves a stepped-wedge cluster randomized controlled trial testing the outcomes of training in recovery-oriented practice, together with an embedded qualitative study to identify the contextual enablers and challenges to implementing recovery-oriented practice. The project is conducted in Victoria, Australia between 2013 and 2017. Eighteen general practices and community health centers are randomly allocated to one of two steps (nine months apart) to start an intervention comprising GP training in the delivery of recovery-oriented practice. Data collection consists of cross-sectional surveys collected from patients of participating GPs at baseline, and again at the end of Steps 1 and 2. The primary outcome is improvement in personal recovery using responses to the Questionnaire about the Process of Recovery. Secondary outcomes are improvements in patient-rated measures of personal recovery and wellbeing, and of the recovery-oriented practice they have received, using the INSPIRE questionnaire, the Warwick-Edinburgh Mental Well-being Scale, and the Kessler Psychological Distress Scale. Participant data will be analyzed in the group that the cluster was assigned to at each study time point. Another per-protocol dataset will contain all data time-stamped according to the date of intervention received at each cluster site. Qualitative interviews with GPs and patients at three and nine months post-training will investigate experiences and challenges related to implementing recovery-oriented practice in primary

  9. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  10. Protocol optimization for deoxyribonucleic acid (DNA) extraction ...

    African Journals Online (AJOL)

    MUNAWAR ROOMI

    2013-12-18

    Dec 18, 2013 ... research institutes, such as National Agricultural Research Centre. (NARC) .... and was experienced on soybean, chickpea seeds and wheat. When high ... suitable for molecular marker and transgenic analysis. Afr. J.

  11. Protocol optimization for deoxyribonucleic acid (DNA) extraction ...

    African Journals Online (AJOL)

    Arachis hypogaea L.) is particularly problematic due to the presence of phenolic compounds and polysaccharides. Inconsistencies in extraction results can be attributed to the age and growth stages of the plant material analyzed. Mature leaves ...

  12. Scanner and irradiation: optimization of protocols

    International Nuclear Information System (INIS)

    Duchemin, J.; Martine-Rollet, B.; Lienart, S.; Mobailly, M.; Florin, J.P.; Beregi, J.P.; Puech, N.

    2006-01-01

    The irradiation of the patient or the personnel increased with the arrival of the multi-detector scanners. The objective of this work is to realize a didactic poster to inform and make sensitive on the irradiation with scan so that to propose solutions of protection. (N.C.)

  13. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  14. Optimization problem in quantum cryptography

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2003-01-01

    A complete optimization was recently performed, yielding the maximum information gain by a general unitary entangling probe in the four-state protocol of quantum cryptography. A larger set of optimum probe parameters was found than was known previously from an incomplete optimization. In the present work, a detailed comparison is made between the complete and incomplete optimizations. Also, a new set of optimum probe parameters is identified for the four-state protocol

  15. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  16. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  17. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  18. Advanced flooding-based routing protocols for underwater sensor networks

    OpenAIRE

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a flooding-based protocol with the goal to improve the performance and the energy efficiency. The first idea considers the node position information in order to reduce the number of relays that may apply flood...

  19. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  20. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  1. Optimization of protocols and increase the life of the tube of X rays in computer tomography;Otimizacao de protocolos e aumento dsa vida util do tubo de raios X em tomografia computadorizada

    Energy Technology Data Exchange (ETDEWEB)

    Viero, A.P. [Centro Universitario Franciscano, Santa Maria, RS (Brazil); Botelho, Marcel Z.; Torunsky, Caroline G. [STAFF - Solucoes em Fisica Medica e Radioprotecao, Santa Maria, RS (Brazil); Paula, V. [Clinica Radiologica Caridade (DIX), Santa Maria, RS (Brazil)

    2009-07-01

    The objective of this study was to evaluate the reduction of the radiation dose and X-ray tube heating in computed tomography exams. Exams of the skull, abdomen and thorax were evaluated. It was verified that the technique used could be changed, suggesting new protocols and comparing image quality, radiation dose and X-ray tube heating. A mAs reduction could be done without compromising the diagnostic quality bringing a decrease up to 21,92% in the dose of skull exams, 20,25% for the examinations, abdomen and 22,06% for the examinations of thorax. The reduction on the X-ray tube heating for skull, abdomen and thorax exams was approximately 22,2%, 20,0% and 22,2% respectively. It is concluded that a change on the described protocols will cause a significant reduction dose delivered to patients and on X-ray tube heating without compromising the diagnosis. (author)

  2. Wirelessly programmed deep brain stimulation of the bilateral subthalamic nucleus for the treatment of primary Parkinson′s disease: study protocol for a multicenter, randomized, parallel-controlled optimal-efficiency trial

    Directory of Open Access Journals (Sweden)

    Chen-cheng Zhang

    2016-01-01

    Ethics: The study protocol has been approved by the Ethics Committee of Tangdu Hospital of the Fourth Military Medical University of China (approval number: 2012009; Ethics Committee of Changhai Hospital of China (approval number: CHEC2012-044; Clinical Trial Ethics Committee, Ruijin Hospital, Shanghai Jiao Tong University School of Medicine of China (approval number: 2012-67; Clinical Trial and Biomedical Ethics Committee of West China Hospital of Sichuan University of China (approval number: 2012-7; Ethics Committee of First Affiliated Hospital of Guangzhou Medical University of China (approval number: 2013-8. The study protocol will be performed in strict accordance with the Declaration of Helsinki, formulated by the World Medical Association. Informed consent: Signed informed consent will be obtained from the patients or their relatives.

  3. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  4. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  5. Optimization and Optimal Control

    CERN Document Server

    Chinchuluun, Altannar; Enkhbat, Rentsen; Tseveendorj, Ider

    2010-01-01

    During the last four decades there has been a remarkable development in optimization and optimal control. Due to its wide variety of applications, many scientists and researchers have paid attention to fields of optimization and optimal control. A huge number of new theoretical, algorithmic, and computational results have been observed in the last few years. This book gives the latest advances, and due to the rapid development of these fields, there are no other recent publications on the same topics. Key features: Provides a collection of selected contributions giving a state-of-the-art accou

  6. Optimally Stopped Optimization

    Science.gov (United States)

    Vinci, Walter; Lidar, Daniel

    We combine the fields of heuristic optimization and optimal stopping. We propose a strategy for benchmarking randomized optimization algorithms that minimizes the expected total cost for obtaining a good solution with an optimal number of calls to the solver. To do so, rather than letting the objective function alone define a cost to be minimized, we introduce a further cost-per-call of the algorithm. We show that this problem can be formulated using optimal stopping theory. The expected cost is a flexible figure of merit for benchmarking probabilistic solvers that can be computed when the optimal solution is not known, and that avoids the biases and arbitrariness that affect other measures. The optimal stopping formulation of benchmarking directly leads to a real-time, optimal-utilization strategy for probabilistic optimizers with practical impact. We apply our formulation to benchmark the performance of a D-Wave 2X quantum annealer and the HFS solver, a specialized classical heuristic algorithm designed for low tree-width graphs. On a set of frustrated-loop instances with planted solutions defined on up to N = 1098 variables, the D-Wave device is between one to two orders of magnitude faster than the HFS solver.

  7. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  8. Efficacy, cost-utility and reach of an eHealth self-management application 'Oncokompas' that helps cancer survivors to obtain optimal supportive care: study protocol for a randomised controlled trial

    NARCIS (Netherlands)

    van der Hout, Anja; van Uden-Kraan, Cornelia F; Witte, Birgit I; Coupé, Veerle M H; Jansen, Femke; Leemans, C René; Cuijpers, Pim; van de Poll-Franse, Lonneke V; Verdonck-de Leeuw, Irma M

    2017-01-01

    BACKGROUND: Cancer survivors have to deal with a wide range of physical symptoms, psychological, social and existential concerns, and lifestyle issues related to cancer and its treatment. Therefore, it is essential that they have access to optimal supportive care services. The eHealth

  9. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  10. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  11. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  12. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  13. Compressed optimization of device architectures

    Energy Technology Data Exchange (ETDEWEB)

    Frees, Adam [Univ. of Wisconsin, Madison, WI (United States). Dept. of Physics; Gamble, John King [Microsoft Research, Redmond, WA (United States). Quantum Architectures and Computation Group; Ward, Daniel Robert [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States). Center for Computing Research; Blume-Kohout, Robin J [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States). Center for Computing Research; Eriksson, M. A. [Univ. of Wisconsin, Madison, WI (United States). Dept. of Physics; Friesen, Mark [Univ. of Wisconsin, Madison, WI (United States). Dept. of Physics; Coppersmith, Susan N. [Univ. of Wisconsin, Madison, WI (United States). Dept. of Physics

    2014-09-01

    Recent advances in nanotechnology have enabled researchers to control individual quantum mechanical objects with unprecedented accuracy, opening the door for both quantum and extreme- scale conventional computation applications. As these devices become more complex, designing for facility of control becomes a daunting and computationally infeasible task. Here, motivated by ideas from compressed sensing, we introduce a protocol for the Compressed Optimization of Device Architectures (CODA). It leads naturally to a metric for benchmarking and optimizing device designs, as well as an automatic device control protocol that reduces the operational complexity required to achieve a particular output. Because this protocol is both experimentally and computationally efficient, it is readily extensible to large systems. For this paper, we demonstrate both the bench- marking and device control protocol components of CODA through examples of realistic simulations of electrostatic quantum dot devices, which are currently being developed experimentally for quantum computation.

  14. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  15. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  16. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  17. Thermodynamic metrics and optimal paths.

    Science.gov (United States)

    Sivak, David A; Crooks, Gavin E

    2012-05-11

    A fundamental problem in modern thermodynamics is how a molecular-scale machine performs useful work, while operating away from thermal equilibrium without excessive dissipation. To this end, we derive a friction tensor that induces a Riemannian manifold on the space of thermodynamic states. Within the linear-response regime, this metric structure controls the dissipation of finite-time transformations, and bestows optimal protocols with many useful properties. We discuss the connection to the existing thermodynamic length formalism, and demonstrate the utility of this metric by solving for optimal control parameter protocols in a simple nonequilibrium model.

  18. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  19. Systematic optimization of multiplex zymography protocol to detect active cathepsins K, L, S, and V in healthy and diseased tissue: compromise among limits of detection, reduced time, and resources.

    Science.gov (United States)

    Dumas, Jerald E; Platt, Manu O

    2013-07-01

    Cysteine cathepsins are a family of proteases identified in cancer, atherosclerosis, osteoporosis, arthritis, and a number of other diseases. As this number continues to rise, so does the need for low cost, broad use quantitative assays to detect their activity and can be translated to the clinic in the hospital or in low resource settings. Multiplex cathepsin zymography is one such assay that detects subnanomolar levels of active cathepsins K, L, S, and V in cell or tissue preparations observed as clear bands of proteolytic activity after gelatin substrate SDS-PAGE with conditions optimal for cathepsin renaturing and activity. Densitometric analysis of the zymogram provides quantitative information from this low cost assay. After systematic modifications to optimize cathepsin zymography, we describe reduced electrophoresis time from 2 h to 10 min, incubation assay time from overnight to 4 h, and reduced minimal tissue protein necessary while maintaining sensitive detection limits; an evaluation of the pros and cons of each modification is also included. We further describe image acquisition by Smartphone camera, export to Matlab, and densitometric analysis code to quantify and report cathepsin activity, adding portability and replacing large scale, darkbox imaging equipment that could be cost prohibitive in limited resource settings.

  20. Systematic optimization of multiplex zymography protocol to detect active cathepsins K, L, S, and V in healthy and diseased tissue: compromise between limits of detection, reduced time, and resources

    Science.gov (United States)

    Dumas, Jerald E.; Platt, Manu O.

    2013-01-01

    Cysteine cathepsins are a family of proteases identified in cancer, atherosclerosis, osteoporosis, arthritis and a number of other diseases. As this number continues to rise, so does the need for low cost, broad use quantitative assays to detect their activity and can be translated to the clinic in the hospital or in low resource settings. Multiplex cathepsin zymography is one such assay that detects subnanomolar levels of active cathepsins K, L, S, and V in cell or tissue preparations observed as cleared bands of proteolytic activity after gelatin substrate SDS-PAGE with conditions optimal for cathepsin renaturing and activity. Densitometric analysis of the zymogram provides quantitative information from this low cost assay. After systematic modifications to optimize cathepsin zymography, we describe reduced electrophoresis time from 2 hours to 10 minutes, incubation assay time from overnight to 4 hours, and reduced minimal tissue protein necessary while maintaining sensitive detection limits; an evaluation of the pros and cons of each modification is also included. We further describe image acquisition by smartphone camera, export to Matlab, and densitometric analysis code to quantify and report cathepsin activity, adding portability and replacing large scale, darkbox imaging equipment that could be cost prohibitive in limited resource settings. PMID:23532386

  1. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  2. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  3. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  4. Multislice CT urography (MSCTU): evaluation of a modified scan protocol for optimized opacification of the collecting system; Mehrschicht-CT-Urographie (MSCTU): Beurteilung eines modifizierten Untersuchungsprotokolls zur Optimierung der Kontrastierung des Harnwegsystems

    Energy Technology Data Exchange (ETDEWEB)

    Kemper, J.; Regier, M.; Stork, A.; Adam, G.; Nolte-Ernsting, C. [Klinik und Poliklinik fuer Diagnostische und Interventionelle Radiologie, Universitaetsklinikum Hamburg-Eppendorf (Germany)

    2006-05-15

    Purpose: To retrospectively quantify opacification of the urinary tract using a MSCTU protocol based on furosemide and individual adaptation of urographic acquisition delay. Materials and methods: MSCTU examinations obtained from 4-row and 16-row CT scanners in 53 patients (35 men, 18 women, average age 59) were independently reviewed by two radiologists. MSCTUs were performed using a low-dose injection of furosemide. No fixed scan delay for urographic image acquisition was applied. The urographic timing was individually adapted by performing low-dose test images of the distal ureters to display their current opacification. Image analysis included grading of the opacification of the segmented collecting system. The average urographic delay was calculated. Stratified comparisons of mean scores were assessed using the Friedman and Wilcoxon tests. The inter-observer kappa value was calculated. Results: The calculated median scan delay for patients with normal serum-creatinine levels (n=51) was 418 sec (mean 447 sec; SD, 118 sec). The median number of acquired test images was 2 (range 1-6 images). The opacification analysis demonstrated that 98% of the ICS, 90% of the proximal, 86% of the middle, and 83% of the distal ureteral segments showed opacification greater than 90%. 9.5% of the distal ureteral segments could not be visualized. Statistics did not show significant opacification differences between proximal, middle, and distal ureteral segments (p>0.05). The two observers were largely in agreement (kappa coefficient r=0.81). Conclusion: The analyzed MSCTU technique based on furosemide and scan delay timing by means of test images reliably lead to a homogeneous opacification of the entire upper urinary tract. It features the individual adaptation of MSCTU to the excretory rate of the kidneys. (orig.)

  5. QoS-aware self-adaptation of communication protocols in a pervasive service middleware

    DEFF Research Database (Denmark)

    Zhang, Weishan; Hansen, Klaus Marius; Fernandes, João

    2010-01-01

    Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols have different quality of service (Qo......S) properties, this motivates optimized self-adaption of protocols for devices, e.g., considering power consumption and other QoS requirements, e.g. round trip time (RTT) for service invocations, throughput, and reliability. In this paper, we present an extensible approach for self-adaptation of communication...... protocols for pervasive web services, where protocols are designed as reusable connectors and our middleware infrastructure can hide the complexity of using different communication protocols to upper layers. We also propose to use Genetic Algorithms (GAs) to find optimized configurations at runtime...

  6. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  7. The Design of Finite State Machine for Asynchronous Replication Protocol

    Science.gov (United States)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  8. Standardization and optimization of arthropod inventories-the case of Iberian spiders

    DEFF Research Database (Denmark)

    Bondoso Cardoso, Pedro Miguel

    2009-01-01

    and optimization of sampling protocols, especially for mega-diverse arthropod taxa. This study had two objectives: (1) propose guidelines and statistical methods to improve the standardization and optimization of arthropod inventories, and (2) to propose a standardized and optimized protocol for Iberian spiders......, by finding common results between the optimal options for the different sites. The steps listed were successfully followed in the determination of a sampling protocol for Iberian spiders. A protocol with three sub-protocols of varying degrees of effort (24, 96 and 320 h of sampling) is proposed. I also...

  9. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  10. High-Performance CCSDS AOS Protocol Implementation in FPGA

    Science.gov (United States)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  11. Australian high-dose-rate brachytherapy protocols for gynaecological malignancy

    International Nuclear Information System (INIS)

    MacLeod, C.; Dally, M.; Stevens, M.; Thornton, D.; Carruthers, S.; Jeal, P.

    2001-01-01

    There is no consensus over the optimal dose fractionation schedules for high-dose-rate (HDR) brachytherapy used for gynaecological malignancy. In Australian public hospital departments of radiation oncology, HDR brachytherapy for gynaecological cancer is being more commonly used. A survey of public departments that are using this technology, or that plan to introduce this technology, was performed. Their current protocols are presented. In general, protocols are similar biologically; however, the practical aspects such as the number of fractions given do vary and may reflect resource restrictions or, alternatively, differences in interpretations of the literature and of the best protocols by clinicians. Copyright (2001) Blackwell Science Pty Ltd

  12. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  13. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  14. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  15. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  16. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  17. Optimization of protocol in computerized tomography scans of children's chest; Otimização de protocolo em varreduras de tomografia computadorizada de tórax infantil

    Energy Technology Data Exchange (ETDEWEB)

    Lima, L.T.A.; Roberto, W. dos S.; Mourão Filho, A.P., E-mail: luanaabrao@gmail.com, E-mail: aprata@des.cefetmg.br [Centro Federal de Educação Tecnológica de Minas Gerais (CEFET-MG), Belo Horizonte, MG (Brazil). Núcleo de Engenharia Hospitalar

    2017-07-01

    The diffusion of the Computed Tomography (CT) has promoted a significant increase of the dose absorbed by patients. This technique showed a high growth as a result of clinical cases of medical emergencies, neoplasia and pediatric traumas. The risks of stochastic effects are greater for children due to tissue radiosensitivity coupled with longer life expectancy. In the present work, a cylindrical simulator was used, representing an adult thorax made of polymethylmethacrylate (PMMA), and a second simulator object of the same material was developed in oblong format including the axillary regions, based on the dimensions of the patient's thorax one-year-old pediatric population. The scanning on the adult simulator object was performed with the chest radiograph diagnostic service with a 120 kV supply voltage and in the pediatric simulator object were performed optimized scans with 120, 100 and 80 kV. This work compared the dose variation absorbed by the pediatric simulator object mentioned by the change in the tube supply voltage.

  18. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  19. The 'Harmonizing Optimal Strategy for Treatment of coronary artery stenosis - sAfety & effectiveneSS of drug-elUting stents & antiplatelet REgimen' (HOST-ASSURE trial: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Park Kyung

    2012-03-01

    Full Text Available Abstract Background Second-generation drug-eluting stents (DES have raised the bar of clinical performance. These stents are mostly made from cobalt chromium alloy. A newer generation DES has been developed from platinum chromium alloy, but clinical data regarding the efficacy and safety of the platinum chromium-based everolimus-eluting stent (PtCr-EES is limited, with no comparison data against the cobalt chromium-based zotarolimus-eluting stent (CoCr-ZES. In addition, an antiplatelet regimen is an integral component of medical therapy after percutaneous coronary intervention (PCI. A 1-week duration of doubling the dose of clopidogrel (double-dose antiplatelet therapy (DDAT was shown to improve outcome at 1 month compared with conventional dose in acute coronary syndrome (ACS patients undergoing PCI. However in Asia, including Korea, the addition of cilostazol (triplet antiplatelet therapy (TAT is used more commonly than doubling the dose of clopidogrel in high-risk patients. Methods In the 'Harmonizing Optimal Strategy for Treatment of coronary artery stenosis - sAfety & effectiveneSS of drug-elUting stents & antiplatelet REgimen' (HOST-ASSURE trial, approximately 3,750 patients are being prospectively and randomly assigned in a 2 × 2 factorial design according to the type of stent (PtCr-EES vs CoCr-ZES and antiplatelet regimen (TAT vs DDAT. The first primary endpoint is target lesion failure at 1 year for the stent comparison, and the second primary endpoint is net clinical outcome at 1 month for comparison of antiplatelet therapy regimen. Discussion The HOST-ASSURE trial is the largest study yet performed to directly compare the efficacy and safety of the PtCr-EES versus CoCr-ZES in an 'all-comers' population. In addition, this study will also compare the clinical outcome of TAT versus DDAT for 1-month post PCI. Trial registration ClincalTrials.gov number NCT01267734.

  20. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  1. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chaojing; Zhang Quan

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  2. Adaptive hybrid optimal quantum control for imprecisely characterized systems.

    Science.gov (United States)

    Egger, D J; Wilhelm, F K

    2014-06-20

    Optimal quantum control theory carries a huge promise for quantum technology. Its experimental application, however, is often hindered by imprecise knowledge of the input variables, the quantum system's parameters. We show how to overcome this by adaptive hybrid optimal control, using a protocol named Ad-HOC. This protocol combines open- and closed-loop optimal control by first performing a gradient search towards a near-optimal control pulse and then an experimental fidelity estimation with a gradient-free method. For typical settings in solid-state quantum information processing, adaptive hybrid optimal control enhances gate fidelities by an order of magnitude, making optimal control theory applicable and useful.

  3. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  4. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  5. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  6. Distributed Cooperative Optimal Control for Multiagent Systems on Directed Graphs: An Inverse Optimal Approach.

    Science.gov (United States)

    Zhang, Huaguang; Feng, Tao; Yang, Guang-Hong; Liang, Hongjing

    2015-07-01

    In this paper, the inverse optimal approach is employed to design distributed consensus protocols that guarantee consensus and global optimality with respect to some quadratic performance indexes for identical linear systems on a directed graph. The inverse optimal theory is developed by introducing the notion of partial stability. As a result, the necessary and sufficient conditions for inverse optimality are proposed. By means of the developed inverse optimal theory, the necessary and sufficient conditions are established for globally optimal cooperative control problems on directed graphs. Basic optimal cooperative design procedures are given based on asymptotic properties of the resulting optimal distributed consensus protocols, and the multiagent systems can reach desired consensus performance (convergence rate and damping rate) asymptotically. Finally, two examples are given to illustrate the effectiveness of the proposed methods.

  7. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  8. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  9. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  10. Essentially Optimal Universally Composable Oblivious Transfer

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio

    2009-01-01

    . Communication complexity: it communicates O(1) group elements to transfer one out of two group elements. The Big-O notation hides 32, meaning that the communication is probably not optimal, but is essentially optimal in that the overhead is at least constant. Our construction is based on pairings, and we assume......Oblivious transfer is one of the most important cryptographic primitives, both for theoretical and practical reasons and several protocols were proposed during the years. We provide the first oblivious transfer protocol which is simultaneously optimal on the following list of parameters: Security...

  11. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  12. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  13. Tools for Performance Assessment of OLSR Protocol

    Directory of Open Access Journals (Sweden)

    Makoto Ikeda

    2009-01-01

    Full Text Available In this paper, we evaluate the performance of Optimized Link State Routing (OLSR protocol by experimental and simulation results. The experiments are carried out by using our implemented testbed and the simulations by using ns-2 simulator. We also designed and implemented a new interface for the ad-hoc network testbed in order to make more easier the experiments. The comparison between experimental and simulation results shows that for the same parameters set, in the simulation we did not notice any packet loss. On the other hand, in the experiments we experienced packet loss because of the environment effects and traffic interference.

  14. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  15. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  16. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  17. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  18. Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol

    International Nuclear Information System (INIS)

    Horoshko, D B

    2007-01-01

    The quantum key distribution protocol BB84 combined with the repetition protocol for error correction is analysed from the point of view of its security against individual eavesdropping relying on quantum memory. It is shown that the mere knowledge of the error-correcting protocol changes the optimal attack and provides the eavesdropper with additional information on the distributed key. (fifth seminar in memory of d.n. klyshko)

  19. Design of a 1-chip IBM-3270 protocol handler

    NARCIS (Netherlands)

    Spaanenburg, L.

    1989-01-01

    The single-chip design of a 20MHz IBM-3270 coax protocol handler in a conventional 3 μ CMOS process-technology is discussed. The harmonious combination of CMOS circuit tricks and high-level design disciplines allows the 50k transistor design to be compiled and optimized into a 35 mm**2 chip in 4

  20. A 4D Digital Phantom for Patient-Specific Simulation of Brain CT Perfusion Protocols

    NARCIS (Netherlands)

    Boom, R. van den; Manniesing, R.; Oei, M.T.H.; Woude, W.J. van der; Smit, E.J.; Laue, H.O.A.; Ginneken, B. van; Prokop, M.

    2014-01-01

    Purpose Optimizing CT brain perfusion protocols is a challenge because of the complex interaction between image acquisition, calculation of perfusion data and patient hemodynamics. Several digital phantoms have been developed to avoid unnecessary patient exposure or suboptimum choice of parameters.

  1. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    Science.gov (United States)

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  2. Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2013-01-01

    This paper introduces a design and simulation of a locally optimized network coding protocol, called PlayNCool, for wireless mesh networks. PlayN-Cool is easy to implement and compatible with existing routing protocols and devices. This allows the system to gain from network coding capabilities i...

  3. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  4. Optimal control of transitions between nonequilibrium steady states.

    Directory of Open Access Journals (Sweden)

    Patrick R Zulkowski

    Full Text Available Biological systems fundamentally exist out of equilibrium in order to preserve organized structures and processes. Many changing cellular conditions can be represented as transitions between nonequilibrium steady states, and organisms have an interest in optimizing such transitions. Using the Hatano-Sasa Y-value, we extend a recently developed geometrical framework for determining optimal protocols so that it can be applied to systems driven from nonequilibrium steady states. We calculate and numerically verify optimal protocols for a colloidal particle dragged through solution by a translating optical trap with two controllable parameters. We offer experimental predictions, specifically that optimal protocols are significantly less costly than naive ones. Optimal protocols similar to these may ultimately point to design principles for biological energy transduction systems and guide the design of artificial molecular machines.

  5. The Groningen Protocol - the Jewish perspective.

    Science.gov (United States)

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. Copyright 2009 S. Karger AG, Basel.

  6. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  7. Biologic comparison of partial breast irradiation protocols

    International Nuclear Information System (INIS)

    Rosenstein, Barry S.; Lymberis, Stella C.; Formenti, Silvia C.

    2004-01-01

    Purpose: To analyze the dose/fractionation schedules currently used in ongoing clinical trials of partial breast irradiation (PBI) by comparing their biologically effective dose (BED) values to those of three standard whole breast protocols commonly used after segmental mastectomy in the treatment of breast cancer. Methods and materials: The BED equation derived from the linear-quadratic model for radiation-induced cell killing was used to calculate the BEDs for three commonly used whole breast radiotherapy regimens, in addition to a variety of external beam radiotherapy, as well as high-dose-rate and low-dose-rate brachytherapy, PBI protocols. Results: The BED values of most PBI protocols resulted in tumor control BEDs roughly equivalent to a 50-Gy standard treatment, but consistently lower than the BEDs for regimens in which the tumor bed receives a total dose of either 60 Gy or 66 Gy. The BED values calculated for the acute radiation responses of erythema and desquamation were nearly all lower for the PBI schedules, and the late-response BEDs for most PBI regimens were in a similar range to the BEDs for the standard treatments. Conclusion: Biologically effective dose modeling raises the concern that inadequate doses might be delivered by PBI to ensure optimal in-field tumor control

  8. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  9. Optimal teleportation with a noisy source

    Energy Technology Data Exchange (ETDEWEB)

    Taketani, Bruno G. [Instituto de Fisica, Universidade Federal do Rio de Janeiro, Rio de Janeiro (Brazil); Physikalisches Institut der Albert-Ludwigs-Universitaet, Freiburg im Breisgau (Germany); Melo, Fernando de [Instituut voor Theoretische Fysica, Katholieke Universiteit Leuven, Leuven, Belgie (Belgium); Physikalisches Institut der Albert-Ludwigs-Universitaet, Freiburg im Breisgau (Germany); Matos Filho, Ruynet L. de [Instituto de Fisica, Universidade Federal do Rio de Janeiro, Rio de Janeiro (Brazil)

    2012-07-01

    In this work we discuss the role of decoherence in quantum information protocols. Particularly, we study quantum teleportation in the realistic situation where not only the transmission channel is imperfect, but also the preparation of the state to be teleported. The optimal protocol to be applied in this situation is found and we show that taking into account the input state noise leads to sizable gains in teleportation fidelity. It is then evident that sources of noise in the input state preparation must be taken into consideration in order to maximize the teleportation fidelity. The optimization of the protocol can be defined for specific experimental realizations and accessible operations, giving a trade-off between protocol quality and experiment complexity.

  10. Optimization of vitrification protocol for cryopreservation of groundnut

    African Journals Online (AJOL)

    user

    2014-01-08

    Jan 8, 2014 ... lose viability after 2 to 3 years of storage (Roberts and. Ellis, 1989; Dunbar et al., 1993). Studies on .... within three to four weeks without intermediary callus formation. There were no apparent morphological abnor- ... fication is the careful control of dehydration and pre- vention of injury by chemical toxicity.

  11. optimization of protocol for m apical meristem of embryonic axes

    African Journals Online (AJOL)

    userpc

    The hypocotyl segments, prima were removed and embryonic axes were placed in culture bott nd Skoog basal + B5 vitamins (MSB5) fortified with 22.2µM, 26.6µM opurine (BAP) to induce multiple shoots. Elongated shoots we tion media consisting of MSB5 supplemented with low concentrati one free media promoted direct ...

  12. Optimization of a protocol for extraction of Plasmodium falciparum ...

    African Journals Online (AJOL)

    STORAGESEVER

    2008-05-16

    May 16, 2008 ... compared to saponin lysed samples when such whole blood ... infected blood intended for extraction of P. falciparum RNA for DNA microarrays and other sensitive ... TaqMan® and LightCycler® technology, and other.

  13. Optimized qualification protocol on particle cleanliness for EUV mask infrastructure

    Science.gov (United States)

    van der Donck, J. C. J.; Stortelder, J. K.; Derksen, G. B.

    2011-11-01

    With the market introduction of the NXE:3100, Extreme Ultra Violet Lithography (EUVL) enters a new stage. Now infrastructure in the wafer fabs must be prepared for new processes and new materials. Especially the infrastructure for masks poses a challenge. Because of the absence of a pellicle reticle front sides are exceptionally vulnerable to particles. It was also shown that particles on the backside of a reticle may cause tool down time. These effects set extreme requirements to the cleanliness level of the fab infrastructure for EUV masks. The cost of EUV masks justifies the use of equipment that is qualified on particle cleanliness. Until now equipment qualification on particle cleanliness have not been carried out with statistically based qualification procedures. Since we are dealing with extreme clean equipment the number of observed particles is expected to be very low. These particle levels can only be measured by repetitively cycling a mask substrate in the equipment. Recent work in the EUV AD-tool presents data on added particles during load/unload cycles, reported as number of Particles per Reticle Pass (PRP). In the interpretation of the data, variation by deposition statistics is not taken into account. In measurements with low numbers of added particles the standard deviation in PRP number can be large. An additional issue is that particles which are added in the routing outside the equipment may have a large impact on the testing result. The number mismatch between a single handling step outside the tool and the multiple cycling in the equipment makes accuracy of measurements rather complex. The low number of expected particles, the large variation in results and the combined effect of added particles inside and outside the equipment justifies putting good effort in making a test plan. Without a proper statistical background, tests may not be suitable for proving that equipment qualifies for the limiting cleanliness levels. Other risks are that a test may requires an unrealistic high testing effort or that equipment can only pass for a test when it meets unrealistic high cleanliness levels. TNO developed a testing model which enables setting up a qualification test on particle cleanliness for EUV mask infrastructure. It is based on particle deposition models with a Poisson statistics and an acceptance sampling test method. The test model combines the single contribution of the routing outside the equipment and contribution of multiple cycling in the equipment. This model enables designing a test with minimal testing effort that proves that equipment meets a required cleanliness level. Furthermore, it gives insight in other equipment requirements on reliability.

  14. Optimization of genetic transformation protocol mediated by biolistic ...

    African Journals Online (AJOL)

    Abhay Kumar

    2013-02-06

    Feb 6, 2013 ... We report here an efficient genotype-independent genetic transformation system in wheat. Highly regenerable embryogenic calli obtained from mature seeds were employed as the target tissue for the genetic transformation of three bread wheat varieties viz C306, HDR77 and PBW343 representing.

  15. Rauwolfia serpentina: Protocol optimization for in vitro propagation

    African Journals Online (AJOL)

    STORAGESEVER

    2008-12-03

    Dec 3, 2008 ... stimulant to uterine contraction for insomnia and most of all for insanity (Vakil, 1949). *Corresponding author. E-mail: marif181@gmail.com. The plant is vegetatively ... ment Centre, Haldi, Govind Ballabh Pant University of Agriculture and Technology, Pantnagar. Endophytic microflora is a major cause of.

  16. Optimization of DNA isolation and PCR protocol for RAPD analysis ...

    African Journals Online (AJOL)

    hope&shola

    The method involves a modified CTAB extraction employing polyvinyl ... The technique is ideal for isolation of DNA from different plant species and .... The tubes were incubated at 65°C in hot air oven or water bath for 60-90 min with intermittent shaking and .... permission to collect germ plasm Financial assistance (to.

  17. Optimization of a protocol for the micropropagation of pineapple

    Directory of Open Access Journals (Sweden)

    ALMEIDA WELITON ANTONIO BASTOS DE

    2002-01-01

    Full Text Available The present work aimed at maximizing the number of plantlets obtained by the micropropagation of pineapple (Ananas comosus (L. Merrill cv. Pérola. Changes in benzylaminopurine (BAP concentration, type of medium (liquid or solidified and the type of explant in the proliferation phase were evaluated. Slips were used as the explant source, which consisted of axillary buds obtained after careful excision of the leaves. A Sterilization was done in the hood with ethanol (70%, for three minutes, followed by calcium hypochlorite (2%, for fifteen minutes, and three washes in sterile water. The explants were introduced in MS medium supplemented with 2mg L-1 BAP and maintained in a growth room at a 16h photoperiod (40 mmol.m-2.s-1, 27 ± 2ºC. After eight weeks, cultures were subcultured for multiplication in MS medium. The following treatments were tested: liquid x solidified medium with different BAP concentrations (0.0, 1.5 or 3.0 mg L-1, and the longitudinal cut, or not, of the shoot bud used as explant. The results showed that liquid medium supplemented with BAP at 1.5 mg L-1, associated with the longitudinal sectioning of the shoot bud used as explant presented the best results, maximizing shoot proliferation. On average, the best treatment would allow for an estimated production of 161,080 plantlets by the micropropagation of the axillary buds of one plant with eight slips and ten buds/slips, within a period of eight months.

  18. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  19. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  20. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  1. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Nonlinear optimization

    CERN Document Server

    Ruszczynski, Andrzej

    2011-01-01

    Optimization is one of the most important areas of modern applied mathematics, with applications in fields from engineering and economics to finance, statistics, management science, and medicine. While many books have addressed its various aspects, Nonlinear Optimization is the first comprehensive treatment that will allow graduate students and researchers to understand its modern ideas, principles, and methods within a reasonable time, but without sacrificing mathematical precision. Andrzej Ruszczynski, a leading expert in the optimization of nonlinear stochastic systems, integrates the theory and the methods of nonlinear optimization in a unified, clear, and mathematically rigorous fashion, with detailed and easy-to-follow proofs illustrated by numerous examples and figures. The book covers convex analysis, the theory of optimality conditions, duality theory, and numerical methods for solving unconstrained and constrained optimization problems. It addresses not only classical material but also modern top...

  3. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  4. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  5. Website Optimization

    CERN Document Server

    King, Andrew

    2008-01-01

    Remember when an optimized website was one that merely didn't take all day to appear? Times have changed. Today, website optimization can spell the difference between enterprise success and failure, and it takes a lot more know-how to achieve success. This book is a comprehensive guide to the tips, techniques, secrets, standards, and methods of website optimization. From increasing site traffic to maximizing leads, from revving up responsiveness to increasing navigability, from prospect retention to closing more sales, the world of 21st century website optimization is explored, exemplified a

  6. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  7. Radiologic procedures, policies and protocols for pediatric emergency medicine

    International Nuclear Information System (INIS)

    Woodward, George A.

    2008-01-01

    Protocol development between radiology and pediatric emergency medicine requires a multidisciplinary approach to manage straightforward as well as complex and time-sensitive needs for emergency department patients. Imaging evaluation requires coordination of radiologic technologists, radiologists, transporters, nurses and coordinators, among others, and might require accelerated routines or occur at sub-optimal times. Standardized protocol development enables providers to design a best practice in all of these situations and should be predicated on evidence, mission, and service expectations. As in any new process, constructive feedback channels are imperative for evaluation and modification. (orig.)

  8. Optimization and industry new frontiers

    CERN Document Server

    Korotkikh, Victor

    2003-01-01

    Optimization from Human Genes to Cutting Edge Technologies The challenges faced by industry today are so complex that they can only be solved through the help and participation of optimization ex­ perts. For example, many industries in e-commerce, finance, medicine, and engineering, face several computational challenges due to the mas­ sive data sets that arise in their applications. Some of the challenges include, extended memory algorithms and data structures, new program­ ming environments, software systems, cryptographic protocols, storage devices, data compression, mathematical and statistical methods for knowledge mining, and information visualization. With advances in computer and information systems technologies, and many interdisci­ plinary efforts, many of the "data avalanche challenges" are beginning to be addressed. Optimization is the most crucial component in these efforts. Nowadays, the main task of optimization is to investigate the cutting edge frontiers of these technologies and systems ...

  9. Identification of a research protocol to study orthodontic tooth movement

    Directory of Open Access Journals (Sweden)

    Annalisa Dichicco

    2014-06-01

    Full Text Available Aim: The orthodontic movement is associated with a process of tissue remodeling together with the release of several chemical mediators in periodontal tissues. Each mediator is a potential marker of tooth movement and expresses biological processes as: tissue inflammation and bone remodeling. Different amounts of every mediator are present in several tissues and fluids of the oral cavity. Therefore, there are different methods that allow sampling with several degrees of invasiveness. Chemical mediators are also substances of different molecular nature, and multiple kind of analysis methods allow detection. The purpose of this study was to draft the best research protocol for an optimal study on orthodontic movement efficiency. Methods: An analysis of the international literature have been made, to identify the gold standard of each aspect of the protocol: type of mediator, source and method of sampling and analysis method. Results: From the analysis of the international literature was created an original research protocol for the study and the assessment of the orthodontic movement, by using the biomarkers of the tooth movement. Conclusions: The protocol created is based on the choice of the gold standard of every aspect already analyzed in the literature and in existing protocols for the monitoring of orthodontic tooth movement through the markers of tooth movement. Clinical trials re required for the evaluation and validation of the protocol created.

  10. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  11. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  12. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  13. Optimality Conditions in Vector Optimization

    CERN Document Server

    Jiménez, Manuel Arana; Lizana, Antonio Rufián

    2011-01-01

    Vector optimization is continuously needed in several science fields, particularly in economy, business, engineering, physics and mathematics. The evolution of these fields depends, in part, on the improvements in vector optimization in mathematical programming. The aim of this Ebook is to present the latest developments in vector optimization. The contributions have been written by some of the most eminent researchers in this field of mathematical programming. The Ebook is considered essential for researchers and students in this field.

  14. Medicinsk Optimering

    DEFF Research Database (Denmark)

    Birkholm, Klavs

    2010-01-01

    En undersøgelse af anvendelsen af medicin til optimering af koncentration, hukommelse og følelsestonus. Efterfulgt af etiske overvejelser og anbefalinger til det politiske system......En undersøgelse af anvendelsen af medicin til optimering af koncentration, hukommelse og følelsestonus. Efterfulgt af etiske overvejelser og anbefalinger til det politiske system...

  15. Structural optimization

    CERN Document Server

    MacBain, Keith M

    2009-01-01

    Intends to supplement the engineer's box of analysis and design tools making optimization as commonplace as the finite element method in the engineering workplace. This title introduces structural optimization and the methods of nonlinear programming such as Lagrange multipliers, Kuhn-Tucker conditions, and calculus of variations.

  16. Topology Optimization

    DEFF Research Database (Denmark)

    A. Kristensen, Anders Schmidt; Damkilde, Lars

    2007-01-01

    . A way to solve the initial design problem namely finding a form can be solved by so-called topology optimization. The idea is to define a design region and an amount of material. The loads and supports are also fidefined, and the algorithm finds the optimal material distribution. The objective function...... dictates the form, and the designer can choose e.g. maximum stiness, maximum allowable stresses or maximum lowest eigenfrequency. The result of the topology optimization is a relatively coarse map of material layout. This design can be transferred to a CAD system and given the necessary geometrically...... refinements, and then remeshed and reanalysed in other to secure that the design requirements are met correctly. The output of standard topology optimization has seldom well-defined, sharp contours leaving the designer with a tedious interpretation, which often results in less optimal structures. In the paper...

  17. Dispositional Optimism

    Science.gov (United States)

    Carver, Charles S.; Scheier, Michael F.

    2014-01-01

    Optimism is a cognitive construct (expectancies regarding future outcomes) that also relates to motivation: optimistic people exert effort, whereas pessimistic people disengage from effort. Study of optimism began largely in health contexts, finding positive associations between optimism and markers of better psychological and physical health. Physical health effects likely occur through differences in both health-promoting behaviors and physiological concomitants of coping. Recently, the scientific study of optimism has extended to the realm of social relations: new evidence indicates that optimists have better social connections, partly because they work harder at them. In this review, we examine the myriad ways this trait can benefit an individual, and our current understanding of the biological basis of optimism. PMID:24630971

  18. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  19. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissi......We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...... successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  20. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  1. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  2. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  3. The DOMUS study protocol

    DEFF Research Database (Denmark)

    Nordly, Mie; Benthien, Kirstine Skov; Von Der Maase, Hans

    2014-01-01

    be a powerful tool to improve patients' quality of life and support family/caregivers during the disease trajectory. The present study offers a model for achieving optimal delivery of palliative care in the patient's preferred place of care and attempt to clarify challenges. TRIAL REGISTRATION: Clinicaltrials......BACKGROUND: The focus of Specialized Palliative Care (SPC) is to improve care for patients with incurable diseases and their families, which includes the opportunity to make their own choice of place of care and ultimately place of death. The Danish Palliative Care Trial (DOMUS) aims to investigate...... psychological intervention for patients and caregivers at home or b) standard care alone. Inclusion criteria are incurable cancer with no or limited antineoplastic treatment options. DISCUSSION: Programs that facilitate transition from hospital treatment to SPC at home for patients with incurable cancer can...

  4. Bellman Ford algorithm - in Routing Information Protocol (RIP)

    Science.gov (United States)

    Krianto Sulaiman, Oris; Mahmud Siregar, Amir; Nasution, Khairuddin; Haramaini, Tasliyah

    2018-04-01

    In a large scale network need a routing that can handle a lot number of users, one of the solutions to cope with large scale network is by using a routing protocol, There are 2 types of routing protocol that is static and dynamic, Static routing is manually route input based on network admin, while dynamic routing is automatically route input formed based on existing network. Dynamic routing is efficient used to network extensively because of the input of route automatic formed, Routing Information Protocol (RIP) is one of dynamic routing that uses the bellman-ford algorithm where this algorithm will search for the best path that traversed the network by leveraging the value of each link, so with the bellman-ford algorithm owned by RIP can optimize existing networks.

  5. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  6. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  7. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  8. Portfolio Optimization

    OpenAIRE

    Issagali, Aizhan; Alshimbayeva, Damira; Zhalgas, Aidana

    2015-01-01

    In this paper Portfolio Optimization techniques were used to determine the most favorable investment portfolio. In particular, stock indices of three companies, namely Microsoft Corporation, Christian Dior Fashion House and Shevron Corporation were evaluated. Using this data the amounts invested in each asset when a portfolio is chosen on the efficient frontier were calculated. In addition, the Portfolio with minimum variance, tangency portfolio and optimal Markowitz portfolio are presented.

  9. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  10. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  11. ISS protocol for EPR tooth dosimetry

    International Nuclear Information System (INIS)

    Onori, S.; Aragno, D.; Fattibene, P.; Petetti, E.; Pressello, M.C.

    2000-01-01

    The accuracy in Electron Paramagnetic Resonance (EPR) dose reconstruction with tooth enamel is affected by sample preparation, dosimetric signal amplitude evaluation and unknown dose estimate. Worldwide efforts in the field of EPR dose reconstruction with tooth enamel are focused on the optimization of the three mentioned steps in dose assessment. In the present work, the protocol implemented at ISS in the framework of the European Community Nuclear Fission Safety project 'Dose Reconstruction' is presented. A combined mechanical-chemical procedure for ground enamel sample preparation is used. The signal intensity evaluation is carried out with powder spectra simulation program. Finally, the unknown dose is evaluated individually for each sample with the additive dose method. The unknown dose is obtained by subtracting a mean native dose from the back-extrapolated dose. As an example of the capability of the ISS protocol in unknown dose evaluation, the results obtained in the framework of the 2nd International Intercomparison on EPR tooth enamel dosimetry are reported

  12. Separable states improve protocols with finite randomness

    International Nuclear Information System (INIS)

    Bobby, Tan Kok Chuan; Paterek, Tomasz

    2014-01-01

    It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterize the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models, and separable, i.e. disentangled states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that, in particular, separable states improve the so-called random access codes, which is a class of communication problem wherein one party tries to read a portion of the data held by another distant party in the presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord. (paper)

  13. Enhanced Recovery After Surgery Protocols in Major Urologic Surgery

    Directory of Open Access Journals (Sweden)

    Natalija Vukovic

    2018-04-01

    Full Text Available The purpose of the reviewThe analysis of the components of enhanced recovery after surgery (ERAS protocols in urologic surgery.Recent findingsERAS protocols has been studied for over 20 years in different surgical procedures, mostly in colorectal surgery. The concept of improving patient care and reducing postoperative complications was also applied to major urologic surgery and especially procedure of radical cystectomy. This procedure is technically challenging, due to a major surgical resection and high postoperative complication rate that may reach 65%. Several clinical pathways were introduced to improve perioperative course and reduce the length of hospital stay. These protocols differ from ERAS modalities in other surgeries. The reasons for this are longer operative time, increased risk of perioperative transfusion and infection, and urinary diversion achieved using transposed intestinal segments. Previous studies in this area analyzed the need for mechanical bowel preparation, postoperative nasogastric tube decompression, as well as the duration of urinary drainage. Furthermore, the attention has also been drawn to perioperative fluid optimization, pain management, and bowel function.SummaryNotwithstanding partial resemblance between the pathways in major urologic surgery and other pelvic surgeries, there are still scarce guidelines for ERAS protocols in urology, which is why further studies should assess the importance of preoperative medical optimization, implementation of thoracic epidural anesthesia and analgesia, and perioperative nutritional management.

  14. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  15. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  16. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    Science.gov (United States)

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  17. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  18. Optimization of Hierarchical System for Data Acquisition

    Directory of Open Access Journals (Sweden)

    V. Novotny

    2011-04-01

    Full Text Available Television broadcasting over IP networks (IPTV is one of a number of network applications that are except of media distribution also interested in data acquisition from group of information resources of variable size. IP-TV uses Real-time Transport Protocol (RTP protocol for media streaming and RTP Control Protocol (RTCP protocol for session quality feedback. Other applications, for example sensor networks, have data acquisition as the main task. Current solutions have mostly problem with scalability - how to collect and process information from large amount of end nodes quickly and effectively? The article deals with optimization of hierarchical system of data acquisition. Problem is mathematically described, delay minima are searched and results are proved by simulations.

  19. Optimization of somatic embryogenesis procedure for commercial ...

    African Journals Online (AJOL)

    The first objective of this study was to assess and optimize somatic embryo production in a genetically diverse range of cacao genotypes. The primary and secondary somatic embryogenesis response of eight promising cacao clones and a positive control was evaluated using modified versions of standard protocols.

  20. Optimization of the quality and dose in thorax general radiology

    International Nuclear Information System (INIS)

    Hwang, Suy Ferreira

    2001-01-01

    Image quality and radiation dose at skin entrance in chest radiography were studied for three exposure protocols, denoted as 1, 2 and 3. Protocol 1 represents the most used technique in radiology services in our country. This technique consists of the following parameters: 81 kV tube voltage, anti-scatter grid and 2 m focus-film distance. Protocol 2 uses the same parameters of the Protocol 1, without grid. Protocol 3 uses I 33kV without grid and 3,5 m focus-film distance. In Protocols 2 and 3 a 30 em air gap was used between patient and film. Two samples of 50 patients were radiographed in two different facilities, herein denoted 1 and 2. Protocol 1 was used in facility I to radiograph the first patient sample, and Protocols 2 and 3 were used in facility 2 to radiograph the second patient sample. Three experts in chest radiology evaluated the obtained chest images according anatomical quality criteria for this examination. For each patient exposure the radiation dose at skin entrance was measured. In this work, a chest phantom, containing test objects to evaluate quantitatively image quality, was made. The phantom was radiographed with the three protocols herein investigated. Results of this study showed clearly that Protocol 3 presents an average dose at skin entrance about half than Protocol 2 and about one third of Protocol 1. In regard to chest radiographic images and radiation dose, it was statistically demonstrated that the Protocol 3 is better than Protocols 1 and 2, with the improvement of the image quality and patient dose reduction in order of 3 times. This work also discusses the perspective of using optimized exposure technique proposed by Protocol 3 as an alternative technique far chest radiographic examinations to those currently used in our diagnostic radiology facilities. (author)

  1. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  2. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  3. Suicide Risk Protocols: Addressing the Needs of High Risk Youths Identified through Suicide Prevention Efforts and in Clinical Settings

    Science.gov (United States)

    Heilbron, Nicole; Goldston, David; Walrath, Christine; Rodi, Michael; McKeon, Richard

    2013-01-01

    Several agencies have emphasized the importance of establishing clear protocols or procedures to address the needs of youths who are identified as suicidal through suicide prevention programs or in emergency department settings. What constitutes optimal guidelines for developing and implementing such protocols, however, is unclear. At the request…

  4. Radiological optimization

    International Nuclear Information System (INIS)

    Zeevaert, T.

    1998-01-01

    Radiological optimization is one of the basic principles in each radiation-protection system and it is a basic requirement in the safety standards for radiation protection in the European Communities. The objectives of the research, performed in this field at the Belgian Nuclear Research Centre SCK-CEN, are: (1) to implement the ALARA principles in activities with radiological consequences; (2) to develop methodologies for optimization techniques in decision-aiding; (3) to optimize radiological assessment models by validation and intercomparison; (4) to improve methods to assess in real time the radiological hazards in the environment in case of an accident; (5) to develop methods and programmes to assist decision-makers during a nuclear emergency; (6) to support the policy of radioactive waste management authorities in the field of radiation protection; (7) to investigate existing software programmes in the domain of multi criteria analysis. The main achievements for 1997 are given

  5. Optimizing detectability

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    HPLC is useful for trace and ultratrace analyses of a variety of compounds. For most applications, HPLC is useful for determinations in the nanogram-to-microgram range; however, detection limits of a picogram or less have been demonstrated in certain cases. These determinations require state-of-the-art capability; several examples of such determinations are provided in this chapter. As mentioned before, to detect and/or analyze low quantities of a given analyte at submicrogram or ultratrace levels, it is necessary to optimize the whole separation system, including the quantity and type of sample, sample preparation, HPLC equipment, chromatographic conditions (including column), choice of detector, and quantitation techniques. A limited discussion is provided here for optimization based on theoretical considerations, chromatographic conditions, detector selection, and miscellaneous approaches to detectability optimization. 59 refs

  6. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  7. Unconstrained Optimization

    DEFF Research Database (Denmark)

    Frandsen, P. E.; Jonasson, K.; Nielsen, Hans Bruun

    1999-01-01

    This lecture note is intended for use in the course 04212 Optimization and Data Fitting at the Technincal University of Denmark. It covers about 25% of the curriculum. Hopefully, the note may be useful also to interested persons not participating in that course. The aim of the note is to give...... an introduction to algorithms for unconstrained optimization. We present Conjugate Gradient, Damped Newton and Quasi Newton methods together with the relevant theoretical background. The reader is assumed to be familiar with algorithms for solving linear and nonlinear system of equations, at a level corresponding...

  8. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  9. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  10. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  11. Optimal transport

    CERN Document Server

    Eckmann, B

    2008-01-01

    At the close of the 1980s, the independent contributions of Yann Brenier, Mike Cullen and John Mather launched a revolution in the venerable field of optimal transport founded by G Monge in the 18th century, which has made breathtaking forays into various other domains of mathematics ever since. The author presents a broad overview of this area.

  12. Topology optimization

    DEFF Research Database (Denmark)

    Bendsøe, Martin P.; Sigmund, Ole

    2007-01-01

    Taking as a starting point a design case for a compliant mechanism (a force inverter), the fundamental elements of topology optimization are described. The basis for the developments is a FEM format for this design problem and emphasis is given to the parameterization of design as a raster image...

  13. Massive transfusion protocols: current best practice

    Directory of Open Access Journals (Sweden)

    Hsu YM

    2016-03-01

    Full Text Available Yen-Michael S Hsu,1 Thorsten Haas,2 Melissa M Cushing1 1Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, NY, USA; 2Department of Anesthesia, University Children's Hospital Zurich, Zurich, Switzerland Abstract: Massive transfusion protocols (MTPs are established to provide rapid blood replacement in a setting of severe hemorrhage. Early optimal blood transfusion is essential to sustain organ perfusion and oxygenation. There are many variables to consider when establishing an MTP, and studies have prospectively evaluated different scenarios and patient populations to establish the best practices to attain improved patient outcomes. The establishment and utilization of an optimal MTP is challenging given the ever-changing patient status during resuscitation efforts. Much of the MTP literature comes from the trauma population, due to the fact that massive hemorrhage is the leading cause of preventable trauma-related death. As we come to further understand the positive and negative clinical impacts of transfusion-related factors, massive transfusion practice can be further refined. This article will first discuss specific MTPs targeting different patient populations and current relevant international guidelines. Then, we will examine a wide selection of therapeutic products to support MTPs, including newly available products and the most suitable of the traditional products. Lastly, we will discuss the best design for an MTP, including ratio-based MTPs and MTPs based on the use of point-of-care coagulation diagnostic tools. Keywords: hemorrhage, MTP, antifibrinolytics, coagulopathy, trauma, ratio, logistics, guidelines, hemostatic

  14. Surface characterization protocol for precision aspheric optics

    Science.gov (United States)

    Sarepaka, RamaGopal V.; Sakthibalan, Siva; Doodala, Somaiah; Panwar, Rakesh S.; Kotaria, Rajendra

    2017-10-01

    In Advanced Optical Instrumentation, Aspherics provide an effective performance alternative. The aspheric fabrication and surface metrology, followed by aspheric design are complementary iterative processes for Precision Aspheric development. As in fabrication, a holistic approach of aspheric surface characterization is adopted to evaluate actual surface error and to aim at the deliverance of aspheric optics with desired surface quality. Precision optical surfaces are characterized by profilometry or by interferometry. Aspheric profiles are characterized by contact profilometers, through linear surface scans to analyze their Form, Figure and Finish errors. One must ensure that, the surface characterization procedure does not add to the resident profile errors (generated during the aspheric surface fabrication). This presentation examines the errors introduced post-surface generation and during profilometry of aspheric profiles. This effort is to identify sources of errors and is to optimize the metrology process. The sources of error during profilometry may be due to: profilometer settings, work-piece placement on the profilometer stage, selection of zenith/nadir points of aspheric profiles, metrology protocols, clear aperture - diameter analysis, computational limitations of the profiler and the software issues etc. At OPTICA, a PGI 1200 FTS contact profilometer (Taylor-Hobson make) is used for this study. Precision Optics of various profiles are studied, with due attention to possible sources of errors during characterization, with multi-directional scan approach for uniformity and repeatability of error estimation. This study provides an insight of aspheric surface characterization and helps in optimal aspheric surface production methodology.

  15. Sigma Routing Metric for RPL Protocol

    Directory of Open Access Journals (Sweden)

    Paul Sanmartin

    2018-04-01

    Full Text Available This paper presents the adaptation of a specific metric for the RPL protocol in the objective function MRHOF. Among the functions standardized by IETF, we find OF0, which is based on the minimum hop count, as well as MRHOF, which is based on the Expected Transmission Count (ETX. However, when the network becomes denser or the number of nodes increases, both OF0 and MRHOF introduce long hops, which can generate a bottleneck that restricts the network. The adaptation is proposed to optimize both OFs through a new routing metric. To solve the above problem, the metrics of the minimum number of hops and the ETX are combined by designing a new routing metric called SIGMA-ETX, in which the best route is calculated using the standard deviation of ETX values between each node, as opposed to working with the ETX average along the route. This method ensures a better routing performance in dense sensor networks. The simulations are done through the Cooja simulator, based on the Contiki operating system. The simulations showed that the proposed optimization outperforms at a high margin in both OF0 and MRHOF, in terms of network latency, packet delivery ratio, lifetime, and power consumption.

  16. Development and implementation of the Dutch protocol for rehabilitative management in amyotrophic lateral sclerosis.

    Science.gov (United States)

    van den Berg, J P; de Groot, I J M; Joha, B C; van Haelst, J M; van Gorcom, P; Kalmijn, S

    2004-12-01

    In the Netherlands, rehabilitation care plays an important role in the symptomatic and palliative treatment of ALS patients. However, until 1999 there were no guidelines or practice parameters available for the management of ALS. Therefore, the Dutch protocol for rehabilitative management in ALS was developed. We describe the development process, the outcome and implementation of the protocol. A concept management protocol was written and the Delphi method was selected to develop the protocol further. This method comprises repetitive discussion sessions from postulates, using a combination of written questionnaires and work-conferences. Between 80 and 90 persons (rehabilitation team members of different professional backgrounds and neurologists) were involved in this process. The protocol was implemented by sending it to all consultants in rehabilitation medicine in the Netherlands; they were asked to inform all the treatment team members about the final protocol and to implement it in their treatment of ALS patients. The protocol was developed in 1999, implemented in 2000 and evaluated in 2001. Recommendations for improvement were made during the evaluation and improvements are currently being developed by an expert group. The protocol is widely used (88.9%) by consultants in rehabilitation medicine and their treatment teams in the Netherlands. The Dutch protocol for rehabilitative management was developed to provide an optimal and adequate care plan for patients with ALS. It is widely used in the Netherlands.

  17. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  18. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  19. Considerations preliminary to the application of early and immediate loading protocols in dental implantology.

    Science.gov (United States)

    Szmukler-Moncler, S; Piattelli, A; Favero, G A; Dubruille, J H

    2000-02-01

    In oral implantology, a 3-6 month stress-free healing period is presently accepted as a prerequisite to achieve bone apposition without interposition of a fibrous scar tissue. This protocol was introduced by Brånemark and co-workers in 1977. The aim of the present paper is to review the reasons that led Brånemark and collaborators to require long delayed loading periods. It is shown that the requirement for long delayed loading periods was drawn from the initiation and development periods of their original clinical trial. Demanding conditions were met involving simultaneously: 1) patients with poor bone quality and quantity, 2) non-optimized implant design, 3) short implants, 4) non-optimized surgical placement, 5) non-optimized surgical protocol and 6) biomechanically non-optimized prosthesis. Extrapolation of the requirement for long healing periods from these particular conditions to more standard situations involving refined surgical protocols and careful patient selection might be questioned. Albeit premature loading has been interpreted as inducing fibrous tissue interposition, immediate loading per se is not responsible for fibrous encapsulation. It is the excess of micromotion during the healing phase that interferes with bone repair. A threshold of tolerated micromotion exists, that is somewhere between 50 microns and 150 microns. It is suggested that loading protocols might be shortened through 2 different approaches. The first way would be to decrease stepwise the delayed loading period for free-standing implants below the presently accepted 3-6 months of healing. The second way would be to identify immediate loading protocols that are capable of keeping the amount of micromotion beneath the threshold of deleterious micromotion. Immediate loading protocols for implants-retained overdentures and fixed bridges are reviewed. It is shown that successful premature loading protocols require a careful and strict patient selection aimed to achieve the best

  20. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    Science.gov (United States)

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  1. Estandarización de un protocolo para la obtención de callos friables de borojó (Borojoa patinoi Cuatr. fase I. Optimization of a protocol to obtain friable calli of borojó (Borojoa patinoi Cuatr. phase I.

    Directory of Open Access Journals (Sweden)

    Martínez D. Mauricio

    2007-12-01

    with the addition of 1mg/L 2,4-D, as a medium for the embryogenesis initiation, 45 days later the formation of green yellow friable calli was observed. This work is a partial report of a macro project about the optimization of a protocol to obtain secondary metabolites of commercial interest trough cellular suspensions of Borojoa patinoi.

  2. Evaluation of image quality and dose in renal colic: comparison of different spiral-CT protocols

    International Nuclear Information System (INIS)

    Rimondini, A.; Mucelli, R.P.; Dalla Palma, L.; De Denaro, M.; Bregant, P.

    2001-01-01

    The aim of this study was to test different technical spiral-CT parameters to obtain optimal image quality with reduced X-ray dose. Images were acquired with a spiral-CT system Philips Tomoscan AVE1, using 250 mA, 120 kV, and 1-s rotational time. Three protocols were tested: protocol A with 5-mm thickness, pitch 1.6, slice reconstruction every 2.5 mm; protocol B with 3-mm thickness, pitch 1.6, slice reconstruction every 1.5 mm; and protocol C with 3-mm thickness, pitch 2, slice reconstruction every 1.5 mm. Two phantoms were employed to evaluate the image quality. Axial images were acquired, then sagittal and coronal images were reconstructed. Finally, the absorbed X-ray dose for each protocol was measured. Regarding image quality, 5-mm-thick images (protocol A) showed greater spatial resolution and lower noise compared with 3-mm-thick images (protocols B and C) on the axial plane; 3-mm reconstructed sagittal and coronal images (protocols B and C) showed an improved image quality compared with 5-mm reformatted images (protocol A). Concerning X-ray dose, the mean dose was: protocol A 19.6±0.8 mGy; protocol B 14.4±0.6 mGy; protocol C 12.5±1.0 mGy. Our study supports the use of thin slices (3 mm) combined with pitch of 1.6 or 2 in renal colic for X-ray dose reduction to the patient and good image quality. (orig.)

  3. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass.

    Science.gov (United States)

    Paris, Michael T; Lafleur, Benoit; Dubin, Joel A; Mourtzakis, Marina

    2017-10-01

    Ultrasound is a non-invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four-site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole-body reference methods. Our primary objectives were to (i) compare the four-site protocol's ability to predict appendicular lean tissue mass from dual-energy X-ray absorptiometry; (ii) optimize the predictability of the four-site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. This observational cross-sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole-body dual-energy X-ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine-site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four-site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. The four-site protocol was strongly associated (R 2  = 0.72) with appendicular lean tissue mass, but Bland-Altman analysis displayed wide limits of agreement (-5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four-site protocol, improved the association (R 2  = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (-3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). The four-site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass

  4. Optimal control

    CERN Document Server

    Aschepkov, Leonid T; Kim, Taekyun; Agarwal, Ravi P

    2016-01-01

    This book is based on lectures from a one-year course at the Far Eastern Federal University (Vladivostok, Russia) as well as on workshops on optimal control offered to students at various mathematical departments at the university level. The main themes of the theory of linear and nonlinear systems are considered, including the basic problem of establishing the necessary and sufficient conditions of optimal processes. In the first part of the course, the theory of linear control systems is constructed on the basis of the separation theorem and the concept of a reachability set. The authors prove the closure of a reachability set in the class of piecewise continuous controls, and the problems of controllability, observability, identification, performance and terminal control are also considered. The second part of the course is devoted to nonlinear control systems. Using the method of variations and the Lagrange multipliers rule of nonlinear problems, the authors prove the Pontryagin maximum principle for prob...

  5. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  6. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  7. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  8. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  9. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  10. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  11. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  12. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  13. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  14. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  15. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  16. Optimal control of Rydberg lattice gases

    Science.gov (United States)

    Cui, Jian; van Bijnen, Rick; Pohl, Thomas; Montangero, Simone; Calarco, Tommaso

    2017-09-01

    We present optimal control protocols to prepare different many-body quantum states of Rydberg atoms in optical lattices. Specifically, we show how to prepare highly ordered many-body ground states, GHZ states as well as some superposition of symmetric excitation number Fock states, that inherit the translational symmetry from the Hamiltonian, within sufficiently short excitation times minimising detrimental decoherence effects. For the GHZ states, we propose a two-step detection protocol to experimentally verify the optimised preparation of the target state based only on standard measurement techniques. Realistic experimental constraints and imperfections are taken into account by our optimisation procedure making it applicable to ongoing experiments.

  17. Optimal control of Rydberg lattice gases

    DEFF Research Database (Denmark)

    Cui, Jian; Bijnen, Rick van; Pohl, Thomas

    2017-01-01

    the translational symmetry from the Hamiltonian, within sufficiently short excitation times minimising detrimental decoherence effects. For the GHZ states, we propose a two-step detection protocol to experimentally verify the optimised preparation of the target state based only on standard measurement techniques....... Realistic experimental constraints and imperfections are taken into account by our optimisation procedure making it applicable to ongoing experiments.......We present optimal control protocols to prepare different many-body quantum states of Rydberg atoms in optical lattices. Specifically, we show how to prepare highly ordered many-body ground states, GHZ states as well as some superposition of symmetric excitation number Fock states, that inherit...

  18. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  19. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  20. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  1. Discrete optimization

    CERN Document Server

    Parker, R Gary

    1988-01-01

    This book treats the fundamental issues and algorithmic strategies emerging as the core of the discipline of discrete optimization in a comprehensive and rigorous fashion. Following an introductory chapter on computational complexity, the basic algorithmic results for the two major models of polynomial algorithms are introduced--models using matroids and linear programming. Further chapters treat the major non-polynomial algorithms: branch-and-bound and cutting planes. The text concludes with a chapter on heuristic algorithms.Several appendixes are included which review the fundamental ideas o

  2. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair

    Science.gov (United States)

    Lightsey, Harry M.; Kantrowitz, David E.; Swindell, Hasani W.; Trofa, David P.; Ahmad, Christopher S.; Lynch, T. Sean

    2018-01-01

    Background: The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. Purpose: To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Study Design: Cross-sectional study. Methods: Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Results: Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises

  3. What is the best contrast injection protocol for 64-row multi-detector cardiac computed tomography?

    International Nuclear Information System (INIS)

    Lu Jinguo; Lv Bin; Chen Xiongbiao; Tang Xiang; Jiang Shiliang; Dai Ruping

    2010-01-01

    Objective: To determine the optimal contrast injection protocol for 64-MDCT coronary angiography. Materials and methods: One hundred and fifty consecutive patients scheduled to undergo retrospectively electrocardiographically gated 64-MDCT. Each 30 patients were assigned to use a different contrast protocol: group 1: uniphasic protocol (contrast injection without saline flush); group 2: biphasic protocol (contrast injection with saline flush); group 3A, 3B and 3C: triphasic protocol (contrast media + different saline diluted contrast media + saline flush). Image quality scores and artifacts were compared and evaluated on both transaxial and three-dimensional coronary artery images among each contrast protocol. Results: Among the triphasic protocol groups, group 3A (30%:70% contrast media-saline mixture was used in second phase) used the least contrast media and had the least frequency of streak artifacts, but there were no significant differences in coronary artery attenuation, image quality, visualization right and left heart structures. Among the uniphasic protocol group (group 1), biphasic protocol group (group 2) and triphasic protocol subgroup (group 3A), there were no significant differences in image quality scores of coronary artery (P = 0.18); uniphasic protocol group had the highest frequency of streak artifacts (20 cases) (P < 0.05) and had the most amount contrast media (67.0 ± 5.3 ml); biphasic protocol group had the least amount of contrast media (59.9 ± 4.9 ml) (P < 0.05) and had the highest attenuation of left main coronary artery and right coronary artery (P < 0.01), but had the least amount of clear visualization right heart structure (6 cases); triphasic protocol group (group 3A) had the most amount of clear visualization right heart structures (29 cases) were the most among the three groups (P < 0.05). Conclusion: Biphasic protocol are superior to the traditional uniphasic protocols for using the least total contrast media, having the least

  4. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair.

    Science.gov (United States)

    Lightsey, Harry M; Kantrowitz, David E; Swindell, Hasani W; Trofa, David P; Ahmad, Christopher S; Lynch, T Sean

    2018-02-01

    The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Cross-sectional study. Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises. Fifteen protocols (43%) required completion of

  5. What is the best contrast injection protocol for 64-row multi-detector cardiac computed tomography?

    Energy Technology Data Exchange (ETDEWEB)

    Lu Jinguo [Department of Radiology, Cardiovascular Institute and Fuwai Hospital, Peking Union Medical College and Chinese Academy of Medical Sciences, 167 Beilishi Road, Beijing (China); Lv Bin, E-mail: blu@vip.sina.co [Department of Radiology, Cardiovascular Institute and Fuwai Hospital, Peking Union Medical College and Chinese Academy of Medical Sciences, 167 Beilishi Road, Beijing (China); Chen Xiongbiao; Tang Xiang; Jiang Shiliang; Dai Ruping [Department of Radiology, Cardiovascular Institute and Fuwai Hospital, Peking Union Medical College and Chinese Academy of Medical Sciences, 167 Beilishi Road, Beijing (China)

    2010-08-15

    Objective: To determine the optimal contrast injection protocol for 64-MDCT coronary angiography. Materials and methods: One hundred and fifty consecutive patients scheduled to undergo retrospectively electrocardiographically gated 64-MDCT. Each 30 patients were assigned to use a different contrast protocol: group 1: uniphasic protocol (contrast injection without saline flush); group 2: biphasic protocol (contrast injection with saline flush); group 3A, 3B and 3C: triphasic protocol (contrast media + different saline diluted contrast media + saline flush). Image quality scores and artifacts were compared and evaluated on both transaxial and three-dimensional coronary artery images among each contrast protocol. Results: Among the triphasic protocol groups, group 3A (30%:70% contrast media-saline mixture was used in second phase) used the least contrast media and had the least frequency of streak artifacts, but there were no significant differences in coronary artery attenuation, image quality, visualization right and left heart structures. Among the uniphasic protocol group (group 1), biphasic protocol group (group 2) and triphasic protocol subgroup (group 3A), there were no significant differences in image quality scores of coronary artery (P = 0.18); uniphasic protocol group had the highest frequency of streak artifacts (20 cases) (P < 0.05) and had the most amount contrast media (67.0 {+-} 5.3 ml); biphasic protocol group had the least amount of contrast media (59.9 {+-} 4.9 ml) (P < 0.05) and had the highest attenuation of left main coronary artery and right coronary artery (P < 0.01), but had the least amount of clear visualization right heart structure (6 cases); triphasic protocol group (group 3A) had the most amount of clear visualization right heart structures (29 cases) were the most among the three groups (P < 0.05). Conclusion: Biphasic protocol are superior to the traditional uniphasic protocols for using the least total contrast media, having the least

  6. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  7. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  8. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  9. Application of low-dose radiation protocols in survey CT scans

    International Nuclear Information System (INIS)

    Fu Qiang; Liu Ting; Lu Tao; Xu Ke; Zhang Lin

    2009-01-01

    Objective: To characterize the protocols with low-dose radiation in survey CT scans for localization. Methods: Eighty standard adult patients, head and body phantoms were recruited. Default protocols provided by operator's manual setting were that all the tube voltage for head, chest, abdomen and lumbar was 120 kV; the tube currents were 20,10,20 and 40 mA, respectively. Values of kV and mA in the low-dose experiments were optimized according to the device options. For chest and abdomen, the tube position were compared between default (0 degree) and 180 degree. Phantoms were scanned with above protocols, and the radiation doses were measured respectively. Paired t-test were used for comparisons of standard deviation in CT value, noise and exposure surface dose (ESD) between group with default protocols and group with optimized protocols. Results: The optimized protocols in low-dose CT survey scans were 80 kV, 10 mA for head, 80 kV, 10 mA for chest, 80 kV, 10 mA for abdomen and 100 kV, 10 mA for lumbar. The values of ESD for phantom scan in default and optimized protocols were 0.38 mGy/0.16 mGy in head, 0.30 mGy/0.20 mGy in chest, 0.74 mGy/0.30 mGy in abdomen and 0.81 mGy/0.44 mGy in lumbar, respectively. Compared with default protocols, the optimized protocols reduced the radiation doses 59%, 33%, 59% and 46% in head, chest, abdomen and lumbar. When tube position changed from 0 degree to 180 degree, the ESD were 0.24 mGy/0.20 mGy for chest; 0.37 mGy/0.30 mGy for abdomen, and the radiation doses were reduced 20% and 17%. Conclusion: A certain amount of image noise is increased in low-dose protocols, but image quality is still acceptable without problem in CT localization. The reduction of radiation dose and the radiation harm to patients are the superiority. (authors)

  10. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  11. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  12. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  13. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  14. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  15. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  16. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  17. Direct Cellular Lysis/Protein Extraction Protocol for Soil Metaproteomics

    Energy Technology Data Exchange (ETDEWEB)

    Chourey, Karuna [ORNL; Jansson, Janet [Lawrence Berkeley National Laboratory (LBNL); Verberkmoes, Nathan C [ORNL; Shah, Manesh B [ORNL; Chavarria, Krystle L. [Lawrence Berkeley National Laboratory (LBNL); Tom, Lauren M [Lawrence Berkeley National Laboratory (LBNL); Brodie, Eoin L. [Lawrence Berkeley National Laboratory (LBNL); Hettich, Robert {Bob} L [ORNL

    2010-01-01

    We present a novel direct protocol for deep proteome characterization of microorganisms in soil. The method employs thermally assisted detergent-based cellular lysis (SDS) of soil samples, followed by TCA precipitation for proteome extraction/cleanup prior to liquid chromatography-mass spectrometric characterization. This approach was developed and optimized using different soils inoculated with genome-sequenced bacteria (Gram-negative Pseudomonas putida or Gram-positive Arthrobacter chlorophenolicus). Direct soil protein extraction was compared to protein extraction from cells isolated from the soil matrix prior to lysis (indirect method). Each approach resulted in identification of greater than 500 unique proteins, with a wide range in molecular mass and functional categories. To our knowledge, this SDS-TCA approach enables the deepest proteome characterizations of microbes in soil to date, without significant biases in protein size, localization, or functional category compared to pure cultures. This protocol should provide a powerful tool for ecological studies of soil microbial communities.

  18. In situ protocol for butterfly pupal wings using riboprobes.

    Science.gov (United States)

    Ramos, Diane; Monteiro, Antonia

    2007-01-01

    Here we present, in video format, a protocol for in situ hybridizations in pupal wings of the butterfly Bicyclus anynana using riboprobes. In situ hybridizations, a mainstay of developmental biology, are useful to study the spatial and temporal patterns of gene expression in developing tissues at the level of transcription. If antibodies that target the protein products of gene transcription have not yet been developed, and/or there are multiple gene copies of a particular protein in the genome that cannot be differentiated using available antibodies, in situs can be used instead. While an in situ technique for larval wing discs has been available to the butterfly community for several years, the current protocol has been optimized for the larger and more fragile pupal wings.

  19. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  20. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  1. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  2. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  3. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  4. Automatic CT simulation optimization for radiation therapy: A general strategy.

    Science.gov (United States)

    Li, Hua; Yu, Lifeng; Anastasio, Mark A; Chen, Hsin-Chen; Tan, Jun; Gay, Hiram; Michalski, Jeff M; Low, Daniel A; Mutic, Sasa

    2014-03-01

    In radiation therapy, x-ray computed tomography (CT) simulation protocol specifications should be driven by the treatment planning requirements in lieu of duplicating diagnostic CT screening protocols. The purpose of this study was to develop a general strategy that allows for automatically, prospectively, and objectively determining the optimal patient-specific CT simulation protocols based on radiation-therapy goals, namely, maintenance of contouring quality and integrity while minimizing patient CT simulation dose. The authors proposed a general prediction strategy that provides automatic optimal CT simulation protocol selection as a function of patient size and treatment planning task. The optimal protocol is the one that delivers the minimum dose required to provide a CT simulation scan that yields accurate contours. Accurate treatment plans depend on accurate contours in order to conform the dose to actual tumor and normal organ positions. An image quality index, defined to characterize how simulation scan quality affects contour delineation, was developed and used to benchmark the contouring accuracy and treatment plan quality within the predication strategy. A clinical workflow was developed to select the optimal CT simulation protocols incorporating patient size, target delineation, and radiation dose efficiency. An experimental study using an anthropomorphic pelvis phantom with added-bolus layers was used to demonstrate how the proposed prediction strategy could be implemented and how the optimal CT simulation protocols could be selected for prostate cancer patients based on patient size and treatment planning task. Clinical IMRT prostate treatment plans for seven CT scans with varied image quality indices were separately optimized and compared to verify the trace of target and organ dosimetry coverage. Based on the phantom study, the optimal image quality index for accurate manual prostate contouring was 4.4. The optimal tube potentials for patient sizes

  5. Automatic CT simulation optimization for radiation therapy: A general strategy

    Energy Technology Data Exchange (ETDEWEB)

    Li, Hua, E-mail: huli@radonc.wustl.edu; Chen, Hsin-Chen; Tan, Jun; Gay, Hiram; Michalski, Jeff M.; Mutic, Sasa [Department of Radiation Oncology, Washington University, St. Louis, Missouri 63110 (United States); Yu, Lifeng [Department of Radiology, Mayo Clinic, Rochester, Minnesota 55905 (United States); Anastasio, Mark A. [Department of Biomedical Engineering, Washington University, St. Louis, Missouri 63110 (United States); Low, Daniel A. [Department of Radiation Oncology, University of California Los Angeles, Los Angeles, California 90095 (United States)

    2014-03-15

    Purpose: In radiation therapy, x-ray computed tomography (CT) simulation protocol specifications should be driven by the treatment planning requirements in lieu of duplicating diagnostic CT screening protocols. The purpose of this study was to develop a general strategy that allows for automatically, prospectively, and objectively determining the optimal patient-specific CT simulation protocols based on radiation-therapy goals, namely, maintenance of contouring quality and integrity while minimizing patient CT simulation dose. Methods: The authors proposed a general prediction strategy that provides automatic optimal CT simulation protocol selection as a function of patient size and treatment planning task. The optimal protocol is the one that delivers the minimum dose required to provide a CT simulation scan that yields accurate contours. Accurate treatment plans depend on accurate contours in order to conform the dose to actual tumor and normal organ positions. An image quality index, defined to characterize how simulation scan quality affects contour delineation, was developed and used to benchmark the contouring accuracy and treatment plan quality within the predication strategy. A clinical workflow was developed to select the optimal CT simulation protocols incorporating patient size, target delineation, and radiation dose efficiency. An experimental study using an anthropomorphic pelvis phantom with added-bolus layers was used to demonstrate how the proposed prediction strategy could be implemented and how the optimal CT simulation protocols could be selected for prostate cancer patients based on patient size and treatment planning task. Clinical IMRT prostate treatment plans for seven CT scans with varied image quality indices were separately optimized and compared to verify the trace of target and organ dosimetry coverage. Results: Based on the phantom study, the optimal image quality index for accurate manual prostate contouring was 4.4. The optimal tube

  6. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  7. DRUG: An Energy-Efficient Data-Centric Routing Protocol for Wireless Sensor Networks

    OpenAIRE

    Sahoo, B. P. S.; Puthal, Deepak

    2014-01-01

    In general, sensor nodes are deployed in left unattended area. In such situation feeding energy to the batteries or replacing the batteries is difficult or even sometimes impossible too. Therefore, prolonging the network lifetime is an important optimization goal in this aspect. In this paper, we propose a new Energy-efficient Datacentric RoUtinG protocol called DRUG. In this paper, we propose an adaptive Data centric approach to find an optimal routing path from source to sink when the senso...

  8. Construction of an Anthropomorphic Phantom for Use in Evaluating Pediatric Airway Digital Tomosynthesis Protocols

    Directory of Open Access Journals (Sweden)

    Nima Kasraie

    2018-01-01

    Full Text Available Interpretation of radiolucent foreign bodies (FBs is a common task charged to pediatric radiologists. The use of a motion compensated technique to decrease breathing motion on images would greatly decrease overall exposure to ionizing radiation and increase access to treatment yielding a great impact on clinical care. This study reports on the methodology and materials used to construct an in-house anthropomorphic phantom for investigating image quality in digital tomosynthesis protocols for volumetric imaging of the pediatric airway. Availability and cost of possible substitute materials were considered and simplifying assumptions were made. Two different modular phantoms were assembled in coronal slab layers using materials designed to approximate a one- and three-year-old thorax at diagnostic photon energies for use with digital tomosynthesis protocols such as those offered on GE’s VolumeRAD application. Exposures were made using both phantoms with inserted food particles inside an oscillating airway. The goal of the phantom is to help evaluate (1 whether the currently used protocol is sufficient to image the airway despite breathing motion and (2 whether it is not, to find the optimal protocol by testing various commercially available protocols using this phantom. The affordable construction of the pediatric sized phantom aimed at optimizing GE’s VolumeRAD protocol for airway foreign body imaging is demonstrated in this study which can be used to test VolumeRAD’s ability to image the airways with and without a low-density foreign body within the airways.

  9. Comparison of diagnostic protocols and the equivalent effective dose in renal cancer and herniated lumbar disc

    International Nuclear Information System (INIS)

    Ruiz Perez de Villar, M.J.; Vano Carruana, E.; Lanzos Gonbzalez, E.; Perez Torrubia, A.

    1994-01-01

    Renal cancer (RC) and herniated lumbar disc (HLD) were the two pathologies selected for the study of the diagnostic protocols applied in different centers to determine how their variability is reflected in the effective equivalent dose (EED) and establish the optimal radiological protocol for diagnostic purposes, while using the lowest possible dose. On the basis of 222 case histories, it was observed that the EED resulting from the diagnosis of HLD can vary as much as a factor of 3(6.2-18.9 mSv). Likewise, the EED related to the diagnosis of RC can be modified by a factor of 1.5(32.6-48.3 mSv), depending on the diagnostic protocol employed. It can be considered that the optimal protocol to reach a diagnosis of HLD includes chest x-ray, lumbar spine x-ray and lumbar CT scan, while that required for the diagnosis of RC involves chest x-ray, IVU, abdominal CT scan and digital subtraction angiography. The optimization of the study protocols-especially the reduction of the number of exposures, modernization and quality control of the equipment, among other aspects, can reduce the EED by a factor of 2. (Author)

  10. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  11. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  12. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  13. [SIAM conference on optimization

    Energy Technology Data Exchange (ETDEWEB)

    1992-05-10

    Abstracts are presented of 63 papers on the following topics: large-scale optimization, interior-point methods, algorithms for optimization, problems in control, network optimization methods, and parallel algorithms for optimization problems.

  14. Ad-Hoc vs. Standardized and Optimized Arthropod Diversity Sampling

    Directory of Open Access Journals (Sweden)

    Pedro Cardoso

    2009-09-01

    Full Text Available The use of standardized and optimized protocols has been recently advocated for different arthropod taxa instead of ad-hoc sampling or sampling with protocols defined on a case-by-case basis. We present a comparison of both sampling approaches applied for spiders in a natural area of Portugal. Tests were made to their efficiency, over-collection of common species, singletons proportions, species abundance distributions, average specimen size, average taxonomic distinctness and behavior of richness estimators. The standardized protocol revealed three main advantages: (1 higher efficiency; (2 more reliable estimations of true richness; and (3 meaningful comparisons between undersampled areas.

  15. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  16. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  17. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  18. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  19. Time-optimal control with finite bandwidth

    Science.gov (United States)

    Hirose, M.; Cappellaro, P.

    2018-04-01

    Time-optimal control theory provides recipes to achieve quantum operations with high fidelity and speed, as required in quantum technologies such as quantum sensing and computation. While technical advances have achieved the ultrastrong driving regime in many physical systems, these capabilities have yet to be fully exploited for the precise control of quantum systems, as other limitations, such as the generation of higher harmonics or the finite response time of the control apparatus, prevent the implementation of theoretical time-optimal control. Here we present a method to achieve time-optimal control of qubit systems that can take advantage of fast driving beyond the rotating wave approximation. We exploit results from time-optimal control theory to design driving protocols that can be implemented with realistic, finite-bandwidth control fields, and we find a relationship between bandwidth limitations and achievable control fidelity.

  20. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  1. INTEGRATED DATA CAPTURING REQUIREMENTS FOR 3D SEMANTIC MODELLING OF CULTURAL HERITAGE: THE INCEPTION PROTOCOL

    Directory of Open Access Journals (Sweden)

    R. Di Giulio

    2017-02-01

    In order to face these challenges and to start solving the issue of the large amount of captured data and time-consuming processes in the production of 3D digital models, an Optimized Data Acquisition Protocol (DAP has been set up. The purpose is to guide the processes of digitization of cultural heritage, respecting needs, requirements and specificities of cultural assets.

  2. Pulmonary CT angiography protocol adapted to the hemodynamic effects of pregnancy.

    LENUS (Irish Health Repository)

    Ridge, Carole A

    2012-02-01

    OBJECTIVE: The purpose of this study was to compare the image quality of a standard pulmonary CT angiography (CTA) protocol with a pulmonary CTA protocol optimized for use in pregnant patients with suspected pulmonary embolism (PE). MATERIALS AND METHODS: Forty-five consecutive pregnant patients with suspected PE were retrospectively included in the study: 25 patients (group A) underwent standard-protocol pulmonary CTA and 20 patients (group B) were imaged using a protocol modified for pregnancy. The modified protocol used a shallow inspiration breath-hold and a high concentration, high rate of injection, and high volume of contrast material. Objective image quality and subjective image quality were evaluated by measuring pulmonary arterial enhancement, determining whether there was transient interruption of the contrast bolus by unopacified blood from the inferior vena cava (IVC), and assessing diagnostic adequacy. RESULTS: Objective and subjective image quality were significantly better for group B-that is, for the group who underwent the CTA protocol optimized for pregnancy. Mean pulmonary arterial enhancement and the percentage of studies characterized as adequate for diagnosis were higher in group B than in group A: 321 +\\/- 148 HU (SD) versus 178 +\\/- 67 HU (p = 0.0001) and 90% versus 64% (p = 0.05), respectively. Transient interruption of contrast material by unopacified blood from the IVC was observed more frequently in group A (39%) than in group B (10%) (p = 0.05). CONCLUSION: A pulmonary CTA protocol optimized for pregnancy significantly improved image quality by increasing pulmonary arterial opacification, improving diagnostic adequacy, and decreasing transient interruption of the contrast bolus by unopacified blood from the IVC.

  3. A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Comparison of Routing Protocol for WSNs: Redundancy Based Approach

    Directory of Open Access Journals (Sweden)

    Anand Prakash

    2014-03-01

    Full Text Available Wireless Sensor Networks (WSNs with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network localization as much as one could, for efficient and optimal utilization of resources. Different approaches based upon redundancy are proposed for optimum functionality. Localization is always related with redundancy of sensor nodes deployed at remote areas for constant and fault tolerant monitoring. In this work, we propose a comparison of classic flooding and the gossip protocol for homogenous networks which enhances stability and throughput quiet significantly.  

  4. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  5. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  6. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  7. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  8. Optimizing UF Cleaning in UF-SWRO System Using Red Sea Water

    KAUST Repository

    Bahshwan, Mohanad

    2012-01-01

    in the production cost. This research focused on increasing the plant's efficiency through optimizing the cleaning protocol without jeopardizing the effectiveness of the cleaning process. For that purpose, the design of experiment (DOE) focused on testing

  9. PlayNCool: Opportunistic Network Coding for Local Optimization of Routing in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk

    2013-01-01

    This paper introduces PlayNCool, an opportunistic protocol with local optimization based on network coding to increase the throughput of a wireless mesh network (WMN). PlayNCool aims to enhance current routing protocols by (i) allowing random linear network coding transmissions end-to-end, (ii) r...

  10. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  11. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  12. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  13. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  14. Development of a Competent and Trouble Free DNA Isolation Protocol for Downstream Genetic Analyses in Glycine Species

    Directory of Open Access Journals (Sweden)

    Muhammad Amjad Nawaz

    2016-08-01

    Full Text Available Extraction of deoxyribose nucleic acid (DNA from plants is preliminary step in molecular biology. Fast and cost effective genomic DNA isolation from Glycine species for downstream application is a major bottleneck. Here we report a high throughput and trouble free method for genomic DNA extraction from leaf and seeds of Glycine species with high quality and quantity. Protocol reports the optimization by employing different concentrations of CTAB and PVP in extraction buffer. Efficiency of optimized protocol was compared with frequently used DNA extraction methods. Wide adoptability and utility of this protocol was confirmed by DNA extraction from leaves as well as seeds of G. max, G. soja, G. tomentella and G. latifolia. Extracted DNA was successfully subjected to PCR amplification of five microsatellite markers and four putative glycosyltransferase genes. DNA extraction protocol is reproducible, trouble free, rapid and can be adopted for plant molecular biology applications.

  15. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  16. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  17. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  18. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  19. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  20. Optimization of coronary attenuation in coronary computed tomography angiography using diluted contrast material.

    Science.gov (United States)

    Kawaguchi, Naoto; Kurata, Akira; Kido, Teruhito; Nishiyama, Yoshiko; Kido, Tomoyuki; Miyagawa, Masao; Ogimoto, Akiyoshi; Mochizuki, Teruhito

    2014-01-01

    The purpose of this study was to evaluate a personalized protocol with diluted contrast material (CM) for coronary computed tomography angiography (CTA). One hundred patients with suspected coronary artery disease underwent retrospective electrocardiogram-gated coronary CTA on a 256-slice multidetector-row CT scanner. In the diluted CM protocol (n=50), the optimal scan timing and CM dilution rate were determined by the timing bolus scan, with 20% CM dilution (5ml/s during 10s) being considered suitable to achieve the target arterial attenuation of 350 Hounsfield units (HU). In the body weight (BW)-adjusted protocol (n=50, 222mg iodine/kg), only the optimal scan timing was determined by the timing bolus scan. The injection rate and volume in the timing bolus scan and real scan were identical between the 2 protocols. We compared the means and variations in coronary attenuation between the 2 protocols. Coronary attenuation (mean±SD) in the diluted CM and BW-adjusted protocols was 346.1±23.9 HU and 298.8±45.2 HU, respectively. The diluted CM protocol provided significantly higher coronary attenuation and lower variance than did the BW-adjusted protocol (P<0.05, in each). The diluted CM protocol facilitates more uniform attenuation on coronary CTA in comparison with the BW-adjusted protocol.  

  1. Generation of insulin-producing cells from human bone marrow-derived mesenchymal stem cells: comparison of three differentiation protocols.

    Science.gov (United States)

    Gabr, Mahmoud M; Zakaria, Mahmoud M; Refaie, Ayman F; Khater, Sherry M; Ashamallah, Sylvia A; Ismail, Amani M; El-Badri, Nagwa; Ghoneim, Mohamed A

    2014-01-01

    Many protocols were utilized for directed differentiation of mesenchymal stem cells (MSCs) to form insulin-producing cells (IPCs). We compared the relative efficiency of three differentiation protocols. Human bone marrow-derived MSCs (HBM-MSCs) were obtained from three insulin-dependent type 2 diabetic patients. Differentiation into IPCs was carried out by three protocols: conophylline-based (one-step protocol), trichostatin-A-based (two-step protocol), and β -mercaptoethanol-based (three-step protocol). At the end of differentiation, cells were evaluated by immunolabeling for insulin production, expression of pancreatic endocrine genes, and release of insulin and c-peptide in response to increasing glucose concentrations. By immunolabeling, the proportion of generated IPCs was modest ( ≃ 3%) in all the three protocols. All relevant pancreatic endocrine genes, insulin, glucagon, and somatostatin, were expressed. There was a stepwise increase in insulin and c-peptide release in response to glucose challenge, but the released amounts were low when compared with those of pancreatic islets. The yield of functional IPCs following directed differentiation of HBM-MSCs was modest and was comparable among the three tested protocols. Protocols for directed differentiation of MSCs need further optimization in order to be clinically meaningful. To this end, addition of an extracellular matrix and/or a suitable template should be attempted.

  2. Generation of Insulin-Producing Cells from Human Bone Marrow-Derived Mesenchymal Stem Cells: Comparison of Three Differentiation Protocols

    Directory of Open Access Journals (Sweden)

    Mahmoud M. Gabr

    2014-01-01

    Full Text Available Introduction. Many protocols were utilized for directed differentiation of mesenchymal stem cells (MSCs to form insulin-producing cells (IPCs. We compared the relative efficiency of three differentiation protocols. Methods. Human bone marrow-derived MSCs (HBM-MSCs were obtained from three insulin-dependent type 2 diabetic patients. Differentiation into IPCs was carried out by three protocols: conophylline-based (one-step protocol, trichostatin-A-based (two-step protocol, and β-mercaptoethanol-based (three-step protocol. At the end of differentiation, cells were evaluated by immunolabeling for insulin production, expression of pancreatic endocrine genes, and release of insulin and c-peptide in response to increasing glucose concentrations. Results. By immunolabeling, the proportion of generated IPCs was modest (≃3% in all the three protocols. All relevant pancreatic endocrine genes, insulin, glucagon, and somatostatin, were expressed. There was a stepwise increase in insulin and c-peptide release in response to glucose challenge, but the released amounts were low when compared with those of pancreatic islets. Conclusion. The yield of functional IPCs following directed differentiation of HBM-MSCs was modest and was comparable among the three tested protocols. Protocols for directed differentiation of MSCs need further optimization in order to be clinically meaningful. To this end, addition of an extracellular matrix and/or a suitable template should be attempted.

  3. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  4. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  5. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  6. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  7. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  8. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  9. Experimental protocol for packaging and encrypting multiple data

    International Nuclear Information System (INIS)

    Barrera, John Fredy; Trejos, Sorayda; Tebaldi, Myrian; Torroba, Roberto

    2013-01-01

    We present a novel single optical packaging and encryption (SOPE) procedure for multiple inputs. This procedure is based on a merging of a 2f scheme with a digital holographic technique to achieve efficient handling of multiple data. Through the 2f system with a random phase mask attached in its input plane, and the holographic technique, we obtain each processed input. A posteriori filtering and repositioning protocol on each hologram followed by an addition of all processed data, allows storing these data to form a single package. The final package is digitally multiplied by a second random phase mask acting as an encryption mask. In this way, the final user receives only one encrypted information unit and a single key, instead of a conventional multiple-image collecting method and several keys. Processing of individual images is cast into an optimization problem. The proposed optimization aims to simplify the handling and recovery of images while packing all of them into a single unit. The decoding process does not have the usual cross-talk or noise problems involved in other methods, as filtering and repositioning precedes the encryption step. All data are recovered in just one step at the same time by applying a simple Fourier transform operation and the decoding key. The proposed protocol takes advantage of optical processing and the versatility of the digital format. Experiments have been conducted using a Mach–Zehnder interferometer. An application is subsequently demonstrated to illustrate the feasibility of the SOPE procedure. (paper)

  10. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  11. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  12. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  13. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  14. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  15. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  16. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  17. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    International Nuclear Information System (INIS)

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-01-01

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds

  18. Neuroimaging in dementia and Alzheimer's disease: Current protocols and practice in the Republic of Ireland

    International Nuclear Information System (INIS)

    Kelly, I.; Butler, M.-L.; Ciblis, A.; McNulty, J.P.

    2016-01-01

    Introduction: Neuroimaging plays an essential supportive role in the diagnosis of dementia, assisting in establishing the dementia subtype(s). This has significant value in both treatment and care decisions and has important implications for prognosis. This study aims to explore the development and nature of neuroimaging protocols currently used in the assessment of dementia and Alzheimer's disease (AD). Methods: An online questionnaire was designed and distributed to lead radiography personnel working in computed tomography (CT), magnetic resonance imaging (MRI) and positron emission tomography (PET) departments (n = 94) in both hospital-based and out-patient imaging centres in the Republic of Ireland. Results: Response rates for each modality ranged from 42 to 44%. CT, MRI, and PET were used to specifically diagnose dementia or AD by 43%, 40% and 50% of responding centres respectively. Of these, dementia-specific neuroimaging protocols were utilised in 33%, 50% and 100% of CT, MRI and PET centres respectively, with the remainder using either standard or other non-specific protocols. Both radiologists and clinical specialist radiographers participated in the development of the majority of protocols. The Royal College of Radiologists (RCR) guidelines were most commonly referenced as informing protocol development, however, none of the MRI respondents were able to identify any guidelines used to inform MR protocol development. Conclusion: Currently there is no consensus in Ireland on optimal dementia/AD neuroimaging protocols, particularly for PET and MRI. Similarly the use of validated and published guidelines to inform protocols is not universal. - Highlights: • We examined the nature of neuroimaging protocols for dementia and Alzheimer's disease in Ireland. • Dementia or Alzheimer's disease-specific protocols were used by between 33 and 100% of centres depending on modality. • Stated dementia-specific protocols were identical for CT whereas

  19. Gain maximization in a probabilistic entanglement protocol

    Science.gov (United States)

    di Lorenzo, Antonio; Esteves de Queiroz, Johnny Hebert

    Entanglement is a resource. We can therefore define gain as a monotonic function of entanglement G (E) . If a pair with entanglement E is produced with probability P, the net gain is N = PG (E) - (1 - P) C , where C is the cost of a failed attempt. We study a protocol where a pair of quantum systems is produced in a maximally entangled state ρm with probability Pm, while it is produced in a partially entangled state ρp with the complementary probability 1 -Pm . We mix a fraction w of the partially entangled pairs with the maximally entangled ones, i.e. we take the state to be ρ = (ρm + wUlocρpUloc+) / (1 + w) , where Uloc is an appropriate unitary local operation designed to maximize the entanglement of ρ. This procedure on one hand reduces the entanglement E, and hence the gain, but on the other hand it increases the probability of success to P =Pm + w (1 -Pm) , therefore the net gain N may increase. There may be hence, a priori, an optimal value for w, the fraction of failed attempts that we mix in. We show that, in the hypothesis of a linear gain G (E) = E , even assuming a vanishing cost C -> 0 , the net gain N is increasing with w, therefore the best strategy is to always mix the partially entangled states. Work supported by CNPq, Conselho Nacional de Desenvolvimento Científico e Tecnológico, proc. 311288/2014-6, and by FAPEMIG, Fundação de Amparo à Pesquisa de Minas Gerais, proc. IC-FAPEMIG2016-0269 and PPM-00607-16.

  20. Developing an optimum protocol for thermoluminescence dosimetry with gr-200 chips using Taguchi method

    International Nuclear Information System (INIS)

    Sadeghi, Maryam; Faghihi, Reza; Sina, Sedigheh

    2017-01-01

    Thermoluminescence dosimetry (TLD) is a powerful technique with wide applications in personal, environmental and clinical dosimetry. The optimum annealing, storage and reading protocols are very effective in accuracy of TLD response. The purpose of this study is to obtain an optimum protocol for GR-200; LiF: Mg, Cu, P, by optimizing the effective parameters, to increase the reliability of the TLD response using Taguchi method. Taguchi method has been used in this study for optimization of annealing, storage and reading protocols of the TLDs. A number of 108 GR-200 chips were divided into 27 groups, each containing four chips. The TLDs were exposed to three different doses, and stored, annealed and read out by different procedures as suggested by Taguchi Method. By comparing the signal-to-noise ratios the optimum dosimetry procedure was obtained. According to the results, the optimum values for annealing temperature (de.C), Annealing Time (s), Annealing to Exposure time (d), Exposure to Readout time (d), Pre-heat Temperature (de.C), Pre-heat Time (s), Heating Rate (de.C/s), Maximum Temperature of Readout (de.C), readout time (s) and Storage Temperature (de.C) are 240, 90, 1, 2, 50, 0, 15, 240, 13 and -20, respectively. Using the optimum protocol, an efficient glow curve with low residual signals can be achieved. Using optimum protocol obtained by Taguchi method, the dosimetry can be effectively performed with great accuracy. (authors)

  1. Linear transceiver design for nonorthogonal amplify-and-forward protocol using a bit error rate criterion

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2014-04-01

    The ever growing demand of higher data rates can now be addressed by exploiting cooperative diversity. This form of diversity has become a fundamental technique for achieving spatial diversity by exploiting the presence of idle users in the network. This has led to new challenges in terms of designing new protocols and detectors for cooperative communications. Among various amplify-and-forward (AF) protocols, the half duplex non-orthogonal amplify-and-forward (NAF) protocol is superior to other AF schemes in terms of error performance and capacity. However, this superiority is achieved at the cost of higher receiver complexity. Furthermore, in order to exploit the full diversity of the system an optimal precoder is required. In this paper, an optimal joint linear transceiver is proposed for the NAF protocol. This transceiver operates on the principles of minimum bit error rate (BER), and is referred as joint bit error rate (JBER) detector. The BER performance of JBER detector is superior to all the proposed linear detectors such as channel inversion, the maximal ratio combining, the biased maximum likelihood detectors, and the minimum mean square error. The proposed transceiver also outperforms previous precoders designed for the NAF protocol. © 2002-2012 IEEE.

  2. A Robust PCR Protocol for HIV Drug Resistance Testing on Low-Level Viremia Samples

    Directory of Open Access Journals (Sweden)

    Shivani Gupta

    2017-01-01

    Full Text Available The prevalence of drug resistance (DR mutations in people with HIV-1 infection, particularly those with low-level viremia (LLV, supports the need to improve the sensitivity of amplification methods for HIV DR genotyping in order to optimize antiretroviral regimen and facilitate HIV-1 DR surveillance and relevant research. Here we report on a fully validated PCR-based protocol that achieves consistent amplification of the protease (PR and reverse transcriptase (RT regions of HIV-1 pol gene across many HIV-1 subtypes from LLV plasma samples. HIV-spiked plasma samples from the External Quality Assurance Program Oversight Laboratory (EQAPOL, covering various HIV-1 subtypes, as well as clinical specimens were used to optimize and validate the protocol. Our results demonstrate that this protocol has a broad HIV-1 subtype coverage and viral load span with high sensitivity and reproducibility. Moreover, the protocol is robust even when plasma sample volumes are limited, the HIV viral load is unknown, and/or the HIV subtype is undetermined. Thus, the protocol is applicable for the initial amplification of the HIV-1 PR and RT genes required for subsequent genotypic DR assays.

  3. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  4. Doses from pediatric CT examinations in Norway: are pediatric scan protocols developed and in daily use?

    International Nuclear Information System (INIS)

    Friberg, Eva G.

    2008-01-01

    Doses to pediatric patients from CT examinations are known to be unnecessarily high if scan protocols developed for adult patients are adopted. This overexposure is most often not recognized by the operating radiographer, due to the digital behavior of the imaging system. Use of optimized size-specific pediatric scan protocols is therefore essential to keep the doses at an appropriate level. The aim of this study was to investigate the doses to pediatric patients from CT examinations and to evaluate the level of optimization of the scan protocols. Patient data, applied scan parameters together with the dose parameters volume computed tomography dose index (CTD vol ) and dose length product (DLP) for examinations of the head, chest and abdomen were collected by means of a questionnaire from five university hospitals. The effective dose was estimated from the total DLP by use of region-specific conversion coefficients (E DLP ). Totally 136, 108 and 82 questionnaires were received for examinations of the head, chest and abdomen, respectively. Large variations in patient doses between the hospitals were observed, addressing the need for optimization of the scan protocols in general. Most of the hospitals applied successive lower mAs with decreasing patient age for all scan areas, while the use of lower tube voltage for small patients and a higher tube voltage for large patients were more rarely. This indicates the presence, to a certain level, of size specific scan protocols at some Norwegian hospitals. Focus on developing size-specific scan protocols for pediatric patients are important to reduce the doses and risks associated with pediatric CT examinations. (author)

  5. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  6. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  7. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  8. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  9. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  10. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  11. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  12. Optimization modeling with spreadsheets

    CERN Document Server

    Baker, Kenneth R

    2015-01-01

    An accessible introduction to optimization analysis using spreadsheets Updated and revised, Optimization Modeling with Spreadsheets, Third Edition emphasizes model building skills in optimization analysis. By emphasizing both spreadsheet modeling and optimization tools in the freely available Microsoft® Office Excel® Solver, the book illustrates how to find solutions to real-world optimization problems without needing additional specialized software. The Third Edition includes many practical applications of optimization models as well as a systematic framework that il

  13. ENERGY OPTIMIZATION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    T. SHANKAR

    2014-04-01

    Full Text Available Wireless sensor networks (WSN are made up of sensor nodes which are usually battery-operated devices, and hence energy saving of sensor nodes is a major design issue. To prolong the networks lifetime, minimization of energy consumption should be implemented at all layers of the network protocol stack starting from the physical to the application layer including cross-layer optimization. Optimizing energy consumption is the main concern for designing and planning the operation of the WSN. Clustering technique is one of the methods utilized to extend lifetime of the network by applying data aggregation and balancing energy consumption among sensor nodes of the network. This paper proposed new version of Low Energy Adaptive Clustering Hierarchy (LEACH, protocols called Advanced Optimized Low Energy Adaptive Clustering Hierarchy (AOLEACH, Optimal Deterministic Low Energy Adaptive Clustering Hierarchy (ODLEACH, and Varying Probability Distance Low Energy Adaptive Clustering Hierarchy (VPDL combination with Shuffled Frog Leap Algorithm (SFLA that enables selecting best optimal adaptive cluster heads using improved threshold energy distribution compared to LEACH protocol and rotating cluster head position for uniform energy dissipation based on energy levels. The proposed algorithm optimizing the life time of the network by increasing the first node death (FND time and number of alive nodes, thereby increasing the life time of the network.

  14. Dynamic Hierarchical Energy-Efficient Method Based on Combinatorial Optimization for Wireless Sensor Networks.

    Science.gov (United States)

    Chang, Yuchao; Tang, Hongying; Cheng, Yongbo; Zhao, Qin; Yuan, Baoqing Li andXiaobing

    2017-07-19

    Routing protocols based on topology control are significantly important for improving network longevity in wireless sensor networks (WSNs). Traditionally, some WSN routing protocols distribute uneven network traffic load to sensor nodes, which is not optimal for improving network longevity. Differently to conventional WSN routing protocols, we propose a dynamic hierarchical protocol based on combinatorial optimization (DHCO) to balance energy consumption of sensor nodes and to improve WSN longevity. For each sensor node, the DHCO algorithm obtains the optimal route by establishing a feasible routing set instead of selecting the cluster head or the next hop node. The process of obtaining the optimal route can be formulated as a combinatorial optimization problem. Specifically, the DHCO algorithm is carried out by the following procedures. It employs a hierarchy-based connection mechanism to construct a hierarchical network structure in which each sensor node is assigned to a special hierarchical subset; it utilizes the combinatorial optimization theory to establish the feasible routing set for each sensor node, and takes advantage of the maximum-minimum criterion to obtain their optimal routes to the base station. Various results of simulation experiments show effectiveness and superiority of the DHCO algorithm in comparison with state-of-the-art WSN routing algorithms, including low-energy adaptive clustering hierarchy (LEACH), hybrid energy-efficient distributed clustering (HEED), genetic protocol-based self-organizing network clustering (GASONeC), and double cost function-based routing (DCFR) algorithms.

  15. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  16. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  17. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  18. Protocol: methodology for chromatin immunoprecipitation (ChIP in Chlamydomonas reinhardtii

    Directory of Open Access Journals (Sweden)

    Strenkert Daniela

    2011-11-01

    Full Text Available Abstract We report on a detailed chromatin immunoprecipitation (ChIP protocol for the unicellular green alga Chlamydomonas reinhardtii. The protocol is suitable for the analysis of nucleosome occupancy, histone modifications and transcription factor binding sites at the level of mononucleosomes for targeted and genome-wide studies. We describe the optimization of conditions for crosslinking, chromatin fragmentation and antibody titer determination and provide recommendations and an example for the normalization of ChIP results as determined by real-time PCR.

  19. Performance Evaluation of User Selection Protocols in Random Networks with Energy Harvesting and Hardware Impairments

    Directory of Open Access Journals (Sweden)

    Tan Nhat Nguyen

    2016-01-01

    Full Text Available In this paper, we evaluate performances of various user selection protocols under impact of hardware impairments. In the considered protocols, a Base Station (BS selects one of available Users (US to serve, while the remaining USs harvest the energy from the Radio Frequency (RF transmitted by the BS. We assume that all of the US randomly appear around the BS. In the Random Selection Protocol (RAN, the BS randomly selects a US to transmit the data. In the second proposed protocol, named Minimum Distance Protocol (MIND, the US that is nearest to the BS will be chosen. In the Optimal Selection Protocol (OPT, the US providing the highest channel gain between itself and the BS will be served. For performance evaluation, we derive exact and asymptotic closed-form expressions of average Outage Probability (OP over Rayleigh fading channels. We also consider average harvested energy per a US. Finally, Monte-Carlo simulations are then performed to verify the theoretical results.

  20. A Distributed Snapshot Protocol for Efficient Artificial Intelligence Computation in Cloud Computing Environments

    Directory of Open Access Journals (Sweden)

    JongBeom Lim

    2018-01-01

    Full Text Available Many artificial intelligence applications often require a huge amount of computing resources. As a result, cloud computing adoption rates are increasing in the artificial intelligence field. To support the demand for artificial intelligence applications and guarantee the service level agreement, cloud computing should provide not only computing resources but also fundamental mechanisms for efficient computing. In this regard, a snapshot protocol has been used to create a consistent snapshot of the global state in cloud computing environments. However, the existing snapshot protocols are not optimized in the context of artificial intelligence applications, where large-scale iterative computation is the norm. In this paper, we present a distributed snapshot protocol for efficient artificial intelligence computation in cloud computing environments. The proposed snapshot protocol is based on a distributed algorithm to run interconnected multiple nodes in a scalable fashion. Our snapshot protocol is able to deal with artificial intelligence applications, in which a large number of computing nodes are running. We reveal that our distributed snapshot protocol guarantees the correctness, safety, and liveness conditions.

  1. Optimal resource states for local state discrimination

    Science.gov (United States)

    Bandyopadhyay, Somshubhro; Halder, Saronath; Nathanson, Michael

    2018-02-01

    We study the problem of locally distinguishing pure quantum states using shared entanglement as a resource. For a given set of locally indistinguishable states, we define a resource state to be useful if it can enhance local distinguishability and optimal if it can distinguish the states as well as global measurements and is also minimal with respect to a partial ordering defined by entanglement and dimension. We present examples of useful resources and show that an entangled state need not be useful for distinguishing a given set of states. We obtain optimal resources with explicit local protocols to distinguish multipartite Greenberger-Horne-Zeilinger and graph states and also show that a maximally entangled state is an optimal resource under one-way local operations and classical communication to distinguish any bipartite orthonormal basis which contains at least one entangled state of full Schmidt rank.

  2. Intravenous Ketamine Infusions for Neuropathic Pain Management: A Promising Therapy in Need of Optimization.

    Science.gov (United States)

    Maher, Dermot P; Chen, Lucy; Mao, Jianren

    2017-02-01

    Intravenous ketamine infusions have been used extensively to treat often-intractable neuropathic pain conditions. Because there are many widely divergent ketamine infusion protocols described in the literature, the variation in these protocols presents a challenge for direct comparison of one protocol with another and in discerning an optimal protocol. Careful examination of the published literature suggests that ketamine infusions can be useful to treat neuropathic pain and that certain characteristics of ketamine infusions may be associated with better clinical outcomes. Increased duration of relief from neuropathic pain is associated with (1) higher total infused doses of ketamine; (2) prolonged infusion durations, although the rate of infusion does not appear to be a factor; and (3) coadministration of adjunct medications such as midazolam and/or clonidine that mitigate some of the unpleasant psychomimetic side effects. However, there are few studies designed to optimize ketamine infusion protocols by defining what an effective infusion protocol entails with regard to a respective neuropathic pain condition. Therefore, despite common clinical practice, the current state of the literature leaves the use of ketamine infusions without meaningful guidance from high-quality comparative evidence. The objectives of this topical review are to (1) analyze the available clinical evidence related to ketamine infusion protocols and (2) call for clinical studies to identify optimal ketamine infusion protocols tailored for individual neuropathic pain conditions. The Oxford Center for Evidence-Based Medicine classification for levels of evidence was used to stratify the grades of clinical recommendation for each infusion variable studied.

  3. Optimality of Gaussian attacks in continuous-variable quantum cryptography.

    Science.gov (United States)

    Navascués, Miguel; Grosshans, Frédéric; Acín, Antonio

    2006-11-10

    We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.

  4. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  5. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  6. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  7. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  8. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  9. Genomic DNA extraction protocols from ovine hair

    Directory of Open Access Journals (Sweden)

    Jennifer Nonato da Silva Prate

    2013-12-01

    Full Text Available Genomic DNA extracted from animal cells can be used for several purposes, for example, to know genetic variability and genetic relationships between individuals, breeds and/or species, paternity tests, to describe the genetic profile for registration of the animal at association of breeders, detect genetic polymorphisms (SNP related to characteristics of commercial interest, disease diagnose, assess resistance or susceptibility to pathogens, etc. For such evaluations, in general, DNA is amplified by PCR (polymerase chain reaction, and then subjected to various techniques as RFLP (restriction fragments length polymorphism, SSCP (single strand conformation polymorphism, and sequencing. The DNA may be obtained from blood, buccal swabs, meat, cartilage or hair bulb. Among all, the last biological material has been preferred by farmers for its ease acquisition. Several methods for extracting DNA from hair bulb were reported without any consensus for its implementation. This study aimed to optimize a protocol for efficient DNA extraction for use in PCR-RFLP analysis of the Prion gene. For this study, were collected hair samples containing hair bulb from 131 Santa Inês sheep belonging to the Institute of Zootechny, Nova Odessa - SP. Two DNA extraction protocols were evaluated. The first, called phenol-chloroform-isoamyl alcohol (PCIA has long been used by Animal Genetic Laboratories, whose procedures are described below: in each microtube (1.5 mL containing 500 µL of TE-Tween solution (Tris-HCl 50 mM, EDTA 1 mM and 0.5% Tween 20 were added to approximately 30 hair bulb per animal which was incubated at 65°C with shaking at 170 rpm for 2 hours. Then was added 15 µL of proteinase K [10 mg mL-1] and incubated at 55°C at 170 rpm for 6-12 hours. At the end of digestion was added 1 volume of solution phenol-chloroform-isoamyl alcohol (25:24:1 followed by vigorous shaking for 10 seconds and centrifuged at 8000 rpm and 4°C for 10 minutes. The upper phase

  10. Evaluation of a new system for chest tomosynthesis: aspects of image quality of different protocols determined using an anthropomorphic phantom

    Science.gov (United States)

    Sundin, A; Aspelin, P; Båth, M; Nyrén, S

    2015-01-01

    Objective: To compare the image quality obtained with the different protocols in a new chest digital tomosynthesis (DTS) system. Methods: A chest phantom was imaged with chest X-ray equipment with DTS. 10 protocols were used, and for each protocol, nine acquisitions were performed. Four observers visually rated the quality of the reconstructed section images according to pre-defined quality criteria in four different classes. The data were analysed with visual grading characteristics (VGC) analysis, using the vendor-recommended protocol [12-s acquisition time, source-to-image distance (SID) 180 cm] as reference, and the area under the VGC curve (AUCVGC) was determined for each protocol and class of criteria. Results: Protocols with a smaller swing angle resulted in a lower image quality for the classes of criteria “disturbance” and “homogeneity in nodule” but a higher image quality for the class “structure”. The class “demarcation” showed little dependency on the swing angle. All protocols but one (6.3 s, SID 130 cm) obtained an AUCVGC significantly <0.5 (indicating lower quality than reference) for at least one class of criteria. Conclusion: The study indicates that the DTS protocol with 6.3 s yields image quality similar to that obtained with the vendor-recommended protocol (12 s) but with the clinically important advantage for patients with respiratory impairment of a shorter acquisition time. Advances in knowledge: The study demonstrates that the image quality may be strongly affected by the choice of protocol and that the vendor-recommended protocol may not be optimal. PMID:26118300

  11. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  12. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  13. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  14. Optimal Pollution, Optimal Population, and Sustainability

    OpenAIRE

    Ulla Lehmijoki

    2012-01-01

    This paper develops a long-run consumer optimization model with endogenous pollution and endogenous population. The positive check increases mortality if pollution increases. The optimal path is sustainable if it provides non-decreasing consumption for a non-decreasing population. As usually, optimality and sustainability may conflict; with population endogenous to pollution, this conflict may ultimately lead the human species toward self-imposed extinction. Not even technical progress can wa...

  15. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  16. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  17. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  18. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  19. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  20. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...