WorldWideScience

Sample records for patient surveys-a key

  1. Patient surveys-A key to organizational change?

    DEFF Research Database (Denmark)

    Riiskjær, Erik; Ammentorp, Jette; Nielsen, Jørn Flohr

    2009-01-01

    OBJECTIVE: The objective was to investigate whether semi-customized patient satisfaction surveys are seen as useful by hospital management, and to explore their possible effects on quality improvement over time at a low organizational level. METHODS: Data were collected from three sources: (1......; (2) feedback is detailed on an organizational level and the units have significantly lower scores than comparable units; and (3) there are obvious actions to address the problems. PRACTICAL IMPLICATIONS: Both qualitative and quantitative results should be analyzed for small organizational units...

  2. Teamwork the key to good patient care.

    Science.gov (United States)

    Baillie, Jonathan

    2013-05-01

    In a year when, with the inception of the new Clinical Commissioning Groups, the way that healthcare is procured and delivered will see radical changes, this month's HefmA 2013 National Conference & Exhibition will have as its theme, 'Many Players, One Goal: The Patient'. As HEJ editor, Jonathan Baillie reports, among the wide-ranging estates and facilities topics set for discussion will be 'Getting the patient environment right'; 'Dementia Building for the Future'; 'Waterborne Infections; Lessons Learned'; 'Incorporating lean thinking into design', and the key challenges faced by the estates and facilities sector. The keynote address, touching on a wide range of issues common to all large organisations, will be given by one of the best known 'women in football', and will also reflect particularly on the importance of teamwork.

  3. IAEA Patient Protection Effort Reaches Key Milestone

    International Nuclear Information System (INIS)

    2012-01-01

    Full text: An International Atomic Energy Agency (IAEA) effort to help people track their radiation exposure from medical procedures achieved a significant milestone this week. The Agency received the final approval from a group of medical oversight organizations for the 'Joint Position Statement on the IAEA Patient Radiation Exposure Tracking', a set of principles to guide patient protection efforts at the sub-national, national, and international level. The joint statement endorses the IAEA's three-year-old Smart Card/SmartRadTrack project, which aims to help nations develop systems to track medical radiation procedures and radiation doses. The statement has been agreed by the World Health Organization (WHO), the U.S. Food and Drug Administration (FDA), the European Society of Radiology (ESR), the International Organization for Medical Physics (IOMP), the International Society of Radiographers and Radiological Technologists (ISRRT), and the Conference of Radiation Control Program Directors, USA (CRCPD). 'This system is critical if the medical community is going to keep patients safe when they are being referred for more and more diagnostic scans. These scans, over the years, are made using more and more powerful machines', said Madan Rehani, Radiation Safety Specialist in the IAEA's Radiation Protection of Patients Unit. 'The tracking system will draw doctors' attention to previous radiological examinations, both in terms of clinical information and radiation dose and thus help them assess whether the 11th or 20th CT scan is really appropriate, whether it will do more good than harm.' Advances in radiation-based diagnostic technologies, such as the CT scan, have led to patients receiving such procedures more frequently. The convenience of CT with the added advantage of increased information has resulted in increased usage to the point that there are instances of patients getting tens of CT scans in a few years, not all of which may be justified, or getting CT

  4. Patient safety in a service of medical physics. Key indicators

    International Nuclear Information System (INIS)

    Font Gomez, J. A.; Gandia Martinez, A.; Jimenez Albericio, F. J.; Andres Redondo, M. M.; Mengual Gil, M. A.

    2013-01-01

    The key indicators are those that endure over time to monitor the degree of compliance with the criteria in the processes that are considered key in the service. In the case of our service, define key indicators within the framework of ISO 9001 certification in the process of clinical dosimetry. All problems do not have same casuistry or not, have the same detrimental to the safety of the patient. We have prioritized some of the problems and opportunities for improvement have been found. Standard refers to the value of the indicator that we should or would like to achieve in such a way that if not achieved, action of improvement will be required. (Author)

  5. Patient-centered care: the key to cultural competence.

    Science.gov (United States)

    Epner, D E; Baile, W F

    2012-04-01

    Much of the early literature on 'cultural competence' focuses on the 'categorical' or 'multicultural' approach, in which providers learn relevant attitudes, values, beliefs, and behaviors of certain cultural groups. In essence, this involves learning key 'dos and don'ts' for each group. Literature and educational materials of this kind focus on broad ethnic, racial, religious, or national groups, such as 'African American', 'Hispanic', or 'Asian'. The problem with this categorical or 'list of traits' approach to clinical cultural competence is that culture is multidimensional and dynamic. Culture comprises multiple variables, affecting all aspects of experience. Cultural processes frequently differ within the same ethnic or social group because of differences in age cohort, gender, political association, class, religion, ethnicity, and even personality. Culture is therefore a very elusive and nebulous concept, like art. The multicultural approach to cultural competence results in stereotypical thinking rather than clinical competence. A newer, cross cultural approach to culturally competent clinical practice focuses on foundational communication skills, awareness of cross-cutting cultural and social issues, and health beliefs that are present in all cultures. We can think of these as universal human beliefs, needs, and traits. This patient centered approach relies on identifying and negotiating different styles of communication, decision-making preferences, roles of family, sexual and gender issues, and issues of mistrust, prejudice, and racism, among other factors. In the current paper, we describe 'cultural' challenges that arise in the care of four patients from disparate cultures, each of whom has advanced colon cancer that is no longer responding to chemotherapy. We then illustrate how to apply principles of patient centered care to these challenges.

  6. Bias in patient satisfaction surveys: a threat to measuring healthcare quality.

    Science.gov (United States)

    Dunsch, Felipe; Evans, David K; Macis, Mario; Wang, Qiao

    2018-01-01

    Patient satisfaction surveys are an increasingly common element of efforts to evaluate the quality of healthcare. Many patient satisfaction surveys in low/middle-income countries frame statements positively and invite patients to agree or disagree, so that positive responses may reflect either true satisfaction or bias induced by the positive framing. In an experiment with more than 2200 patients in Nigeria, we distinguish between actual satisfaction and survey biases. Patients randomly assigned to receive negatively framed statements expressed significantly lower levels of satisfaction (87%) than patients receiving the standard positively framed statements (95%-pquality of health services. Providers and policymakers wishing to gauge the quality of care will need to avoid framing that induces bias and to complement patient satisfaction measures with more objective measures of quality.

  7. Understanding Patient Experience Using Internet-based Email Surveys: A Feasibility Study at Mount Sinai Hospital.

    Science.gov (United States)

    Morgan, Matthew; Lau, Davina; Jivraj, Tanaz; Principi, Tania; Dietrich, Sandra; Bell, Chaim M

    2015-01-01

    Email is becoming a widely accepted communication tool in healthcare settings. This study sought to test the feasibility of Internet-based email surveys of patient experience in the ambulatory setting. We conducted a study of email Internet-based surveys sent to patients in selected ambulatory clinics at Mount Sinai Hospital in Toronto, Canada. Our findings suggest that email links to Internet surveys are a feasible, timely and efficient method to solicit patient feedback about their experience. Further research is required to optimally leverage Internet-based email surveys as a tool to better understand the patient experience.

  8. Checklists change communication about key elements of patient care.

    Science.gov (United States)

    Newkirk, Michelle; Pamplin, Jeremy C; Kuwamoto, Roderick; Allen, David A; Chung, Kevin K

    2012-08-01

    Combat casualty care is distributed across professions and echelons of care. Communication within it is fragmented, inconsistent, and prone to failure. Daily checklists used during intensive care unit (ICU) rounds have been shown to improve compliance with evidence-based practices, enhance communication, promote consistency of care, and improve outcomes. Checklists are criticized because it is difficult to establish a causal link between them and their effect on outcomes. We investigated how checklists used during ICU rounds affect communication. We conducted this project in two military ICUs (burn and surgical/trauma). Checklists contained up to 21 questions grouped according to patient population. We recorded which checklist items were discussed during rounds before and after implementation of a "must address" checklist and compared the frequency of discussing items before checklist prompting. Patient discussions addressed more checklist items before prompting at the end of the 2-week evaluation compared with the 2-week preimplementation period (surgical trauma ICU, 36% vs. 77%, p communication patterns. Improved communication facilitated by checklists may be one mechanism behind their effectiveness. Checklists are powerful tools that can rapidly alter patient care delivery. Implementing checklists could facilitate the rapid dissemination of clinical practice changes, improve communication between echelons of care and between individuals involved in patient care, and reduce missed information.

  9. Measuring Patient-Reported Outcomes: Key Metrics in Reconstructive Surgery.

    Science.gov (United States)

    Voineskos, Sophocles H; Nelson, Jonas A; Klassen, Anne F; Pusic, Andrea L

    2018-01-29

    Satisfaction and improved quality of life are among the most important outcomes for patients undergoing plastic and reconstructive surgery for a variety of diseases and conditions. Patient-reported outcome measures (PROMs) are essential tools for evaluating the benefits of newly developed surgical techniques. Modern PROMs are being developed with new psychometric approaches, such as Rasch Measurement Theory, and their measurement properties (validity, reliability, responsiveness) are rigorously tested. These advances have resulted in the availability of PROMs that provide clinically meaningful data and effectively measure functional as well as psychosocial outcomes. This article guides the reader through the steps of creating a PROM and highlights the potential research and clinical uses of such instruments. Limitations of PROMs and anticipated future directions in this field are discussed.

  10. Checklists Change Communication About Key Elements of Patient Care

    Science.gov (United States)

    2012-01-01

    resulted in decreased duration of use as well as related urinary tract infections .8 In addition to improving patient care, checklists have been shown to...central-line- associated bloodstream infection rates decline after bundles and checklists. Pediatrics . 2011;127:436Y444. 6. Dubose JJ, Inaba K...mechanical ventilation bun- dles, and lead to decreased infection rates.4Y7 They have also been applied to the use of indwelling Foley catheters and

  11. The key actor: a qualitative study of patient participation in the handover process in Europe

    Science.gov (United States)

    Flink, Maria; Hesselink, Gijs; Pijnenborg, Loes; Wollersheim, Hub; Vernooij-Dassen, Myrra; Dudzik-Urbaniak, Ewa; Orrego, Carola; Toccafondi, Giulio; Schoonhoven, Lisette; Gademan, Petra J; Johnson, Julie K; Öhlén, Gunnar; Hansagi, Helen; Olsson, Mariann; Barach, Paul

    2012-01-01

    Background Patient safety experts have postulated that increasing patient participation in communications during patient handovers will improve the quality of patient transitions, and that this may reduce hospital readmissions. Choosing strategies that enhance patient safety through improved handovers requires better understanding of patient experiences and preferences for participation. Objective The aim of this paper is to explore the patients’ experiences and perspectives related to the handovers between their primary care providers and the inpatient hospital. Methods A qualitative secondary analysis was performed, based on individual and focus group patient interviews with 90 patients in five European countries. Results The analysis revealed three themes: patient positioning in the handover process; prerequisites for patient participation and patient preferences for the handover process. Patients’ participation ranged from being the key actor, to sharing the responsibility with healthcare professional(s), to being passive participants. For active participation patients required both personal and social resources as well as prerequisites such as information and respect. Some patients preferred to be the key actor in charge; others preferred their healthcare professionals to be the key actors in the handover. Conclusions Patients’ participation is related to the healthcare system, the activity of healthcare professionals’ and patients’ capacity for participation. Patients prefer a handover process where the responsibility is clear and unambiguous. Healthcare organisations need a clear and well-considered system of responsibility for handover processes, that takes into account the individual patient's need of clarity, and support in relation to his/hers own recourses. PMID:23112290

  12. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  13. A qualitative study of the key factors in implementing telemedical monitoring of diabetic foot ulcer patients

    DEFF Research Database (Denmark)

    Rasmussen, B S B; Jensen, L K; Froekjaer, J

    2015-01-01

    of a telemedical intervention. We posed the following research question: What are the key organizational factors in the implementation of telemedicine in wound care? METHODS: In connection with a randomized controlled trial of telemedical intervention for patients with diabetic foot ulcers in the region...

  14. Patient Views on Three Key Service Areas within Hospital COPD Care

    Science.gov (United States)

    Roberts, C. Michael; Seiger, Anil; Ingham, Jane

    2009-01-01

    Objective: The views of patients with Chronic Obstructive Pulmonary Disease (COPD) about three key services (non-invasive ventilation [NIV], early discharge schemes and rehabilitation) were sought in order to inform recommendations for the delivery of optimum care within a national programme of hospital COPD service development. Design: Four focus…

  15. Evaluating the use of key performance indicators to evidence the patient experience.

    Science.gov (United States)

    McCance, Tanya; Hastings, Jack; Dowler, Hilda

    2015-11-01

    To test eight person-centred key performance indicators and the feasibility of an appropriate measurement framework as an approach to evidencing the patient experience. The value of measuring the quality of patient care is undisputed in the international literature, however, the type of measures that can be used to generate data that is meaningful for practice continues to be debated. This paper offers a different perspective to the 'measurement' of the nursing and midwifery contribution to the patient experience. Fourth generation evaluation was the methodological approach used to evaluate the implementation of the key performance indicators and measurement framework across three participating organisations involving nine practice settings. Data were collected by repeated use of claims, concerns and issues with staff working across nine participating sites (n = 18) and the senior executives from the three partner organisations (n = 12). Data were collected during the facilitated sessions with stakeholders and analysed in conjunction with the data generated from the measurement framework. The data reveal the inherent value placed on the evidence generated from the implementation of the key performance indicators as reflected in the following themes: measuring what matters; evidencing the patient experience; engaging staff; a focus for improving practice; and articulating and demonstrating the positive contribution of nursing and midwifery. The implementation of the key performance indicators and the measurement framework has been effective in generating evidence that demonstrates the patient experience. The nature of the data generated not only privileges the patient voice but also offers feedback to nurses and midwives that can inform the development of person-centred cultures. The use of these indicators will produce evidence of patient experience that can be used by nurse and midwives to celebrate and further inform person-centred practice. © 2015 John

  16. Patient-Centred Care in Canada: Key Components and the Path Forward.

    Science.gov (United States)

    Montague, Terrence; Gogovor, Amédé; Aylen, John; Ashley, Lisa; Ahmed, Sara; Martin, Lesli; Cochrane, Bonnie; Adams, Owen; Nemis-White, Joanna

    2017-01-01

    Canadians' health and its care continue to evolve. Chronic diseases affect more than 50% of our aging population, but the majority of public and professional stakeholders retain a sense of care quality. An emergent issue, however, is generating an increasingly wide debate. It is the concept of patient-centred care, including its definition of key components, and efficacy. To advance the evidence base, the 2013-2014 and 2016 Health Care in Canada (HCIC) surveys measured pan-stakeholder levels of support and implementation priorities for frequently proposed components of patient centricity in healthcare. The public's highest rated component was timely access to care, followed by perceived respect and caring in its delivery, with decisions made in partnership among patients and professional providers, and within a basic belief that care should be based on patients' needs versus their ability to pay. Health professionals' levels of support for key components largely overlapped the public's levels of support for key components, with an additional accent on care influenced by an evidence base and expert opinion. In terms of priority to actually implement enhanced patient-centred care options, timely access was universally dominant among all stakeholders. Caring, respectful care, also retained high implementation priority among both the public and professionals, as did care decisions made in partnership, and, among professionals, care driven by research and expert opinion. Low priorities, for both the public and professionals, were the actual measurements of patient-centred care delivery and its impact on outcomes. In summary, there is remarkable concordance among all stakeholders in terms of favoured interventions to enhance patient-centred care, namely, timely access, caring, partnering and communicative delivery of evidence-based care. Unfortunately, the lack of contemporary imperative around the value of measuring and reporting actual use and outcomes of favoured

  17. Measuring Patients' Experience of Rehabilitation Services Across the Care Continuum. Part II: Key Dimensions.

    Science.gov (United States)

    McMurray, Josephine; McNeil, Heather; Lafortune, Claire; Black, Samantha; Prorok, Jeanette; Stolee, Paul

    2016-01-01

    To identify key dimensions of patients' experience across the rehabilitative care system and to recommend a framework to develop survey items that measure the rehabilitative care experience. Data were sourced from a literature review that searched MEDLINE (PubMed), CINAHL (Ebsco), and PsycINFO (APA PsycNET) databases from 2004 to 2014, the reference lists of the final accepted articles, and hand searches of relevant journals. Four reviewers performed the screening process on 2472 articles; 33 were included for analysis. Interrater reliability was confirmed through 2 rounds of title review and 1 round of abstract review, with an average κ score of .69. The final sample of 33 accepted articles was imported into a qualitative data analysis software application. Multiple levels of coding and a constant comparative methodology generated 6 themes. There were 502 discreet survey questions measuring patient experience that were categorized using the following dimensions: rehabilitative care ecosystem, client and informal caregiver engagement, patient and health care provider relation, pain and functional status, group and individual identity, and open ended. The most common survey questions examine the care delivery ecosystem (37%), the engagement of clients and their informal caregivers (24.9%), and the quality of relations between providers and patients (21.7%). Examination of patient's functional status and management of pain yielded (15.3%) of the instruments' questions. Currently available instruments and questions that measure patients' experience in rehabilitative care are unable to assess the performance of rehabilitative delivery systems that aspire to integrate care across the continuum. However, question panels derived from our 6 key themes may measure the key concepts that define rehabilitative care and facilitate measurement of patient experience at the system level. Copyright © 2016 American Congress of Rehabilitation Medicine. Published by Elsevier Inc

  18. What are the keys to successful adrenal venous sampling (AVS) in patients with primary aldosteronism?

    Science.gov (United States)

    Young, William F; Stanson, Anthony W

    2009-01-01

    Adrenal venous sampling (AVS) is the criterion standard to distinguish between unilateral and bilateral adrenal disease in patients with primary aldosteronism. The keys to successful AVS include appropriate patient selection, careful patient preparation, focused technical expertise, defined protocol, and accurate data interpretation. The use of AVS should be based on patient preferences, patient age, clinical comorbidities, and the clinical probability of finding an aldosterone-producing adenoma. AVS is optimally performed in the fasting state in the morning. AVS is an intricate procedure because the right adrenal vein is small and may be difficult to locate - the success rate depends on the proficiency of the angiographer. The key factors that determine the successful catheterization of both adrenal veins are experience, dedication and repetition. With experience, and focusing the expertise to 1 or 2 radiologists at a referral centre, the AVS success rate can be as high as 96%. A centre-specific, written protocol is mandatory. The protocol should be developed by an interested group of endocrinologists, radiologists and laboratory personnel. Safeguards should be in place to prevent mislabelling of the blood tubes in the radiology suite and to prevent sample mix-up in the laboratory.

  19. [Full attention to several key issues in surgical treatment for the elderly patients with gastrointestinal cancer].

    Science.gov (United States)

    Zhu, Zhenggang

    2016-05-01

    With the development of population aging in our country, the incidence of gastrointestinal cancer is increasing. The risk of developing gastrointestinal cancer in elderly over 75 years was 5-6 times and the risk of death of gastrointestinal cancer was 7-8 times of the general population. As compared to non-elderly, the incidence of gastric cancer was not decreased obviously but the total incidence of colorectal cancer was increased more quickly. Therefore, screening of gastrointestinal cancer should be performed in the elderly for early discovery, diagnosis and treatment. Because of the insidious onset of the illness in elderly patients, gastrointestinal cancers are mostly diagnosed at advanced or late stage (stage III or IV). Well differentiated cancer is more common, such as papillary or tubular adenocarcinoma. Lauren type, Borrmann II or III are more common in gastric cancer, which are relatively favorable. Compared with non-elderly patients, many elderly patients also suffer from comorbid diseases with higher operation risk and postoperative complication rates. Therefore, we must pay great attention to the perioperative management and the surgical operation for the elderly patients. In this paper, several key issues involved the development trend of incidence and mortality of gastrointestinal cancer, the clinicopathological characteristics, the comorbidity and surgical treatment in the elderly patients with gastrointestinal cancer will be elaborated, aiming at promoting further attention to the clinical therapeutic strategies, management measures and prognostic factors for the elderly patients with gastrointestinal cancer.

  20. Overall scores as an alternative to global ratings in patient experience surveys : A comparison of four methods

    NARCIS (Netherlands)

    Krol, M.W.; de Boer, D.; Rademakers, J.J.D.J.M.; Delnoij, D.

    2013-01-01

    Background Global ratings of healthcare by patients are a popular way of summarizing patients’ experiences. Summary scores can be used for comparing healthcare provider performance and provider rankings. As an alternative, overall scores from actual patient experiences can be constructed as summary

  1. Development of key performance indicators to evaluate centralized intake for patients with osteoarthritis and rheumatoid arthritis.

    Science.gov (United States)

    Barber, Claire E; Patel, Jatin N; Woodhouse, Linda; Smith, Christopher; Weiss, Stephen; Homik, Joanne; LeClercq, Sharon; Mosher, Dianne; Christiansen, Tanya; Howden, Jane Squire; Wasylak, Tracy; Greenwood-Lee, James; Emrick, Andrea; Suter, Esther; Kathol, Barb; Khodyakov, Dmitry; Grant, Sean; Campbell-Scherer, Denise; Phillips, Leah; Hendricks, Jennifer; Marshall, Deborah A

    2015-11-14

    Centralized intake is integral to healthcare systems to support timely access to appropriate health services. The aim of this study was to develop key performance indicators (KPIs) to evaluate centralized intake systems for patients with osteoarthritis (OA) and rheumatoid arthritis (RA). Phase 1 involved stakeholder meetings including healthcare providers, managers, researchers and patients to obtain input on candidate KPIs, aligned along six quality dimensions: appropriateness, accessibility, acceptability, efficiency, effectiveness, and safety. Phase 2 involved literature reviews to ensure KPIs were based on best practices and harmonized with existing measures. Phase 3 involved a three-round, online modified Delphi panel to finalize the KPIs. The panel consisted of two rounds of rating and a round of online and in-person discussions. KPIs rated as valid and important (≥7 on a 9-point Likert scale) were included in the final set. Twenty-five KPIs identified and substantiated during Phases 1 and 2 were submitted to 27 panellists including healthcare providers, managers, researchers, and patients in Phase 3. After the in-person meeting, three KPIs were removed and six were suggested. The final set includes 9 OA KPIs, 10 RA KPIs and 9 relating to centralized intake processes for both conditions. All 28 KPIs were rated as valid and important. Arthritis stakeholders have proposed 28 KPIs that should be used in quality improvement efforts when evaluating centralized intake for OA and RA. The KPIs measure five of the six dimensions of quality and are relevant to patients, practitioners and health systems.

  2. Development and validation of the BRIGHTLIGHT Survey, a patient-reported experience measure for young people with cancer.

    Science.gov (United States)

    Taylor, Rachel M; Fern, Lorna A; Solanki, Anita; Hooker, Louise; Carluccio, Anna; Pye, Julia; Jeans, David; Frere-Smith, Tom; Gibson, Faith; Barber, Julie; Raine, Rosalind; Stark, Dan; Feltbower, Richard; Pearce, Susie; Whelan, Jeremy S

    2015-07-28

    Patient experience is increasingly used as an indicator of high quality care in addition to more traditional clinical end-points. Surveys are generally accepted as appropriate methodology to capture patient experience. No validated patient experience surveys exist specifically for adolescents and young adults (AYA) aged 13-24 years at diagnosis with cancer. This paper describes early work undertaken to develop and validate a descriptive patient experience survey for AYA with cancer that encompasses both their cancer experience and age-related issues. We aimed to develop, with young people, an experience survey meaningful and relevant to AYA to be used in a longitudinal cohort study (BRIGHTLIGHT), ensuring high levels of acceptability to maximise study retention. A three-stage approach was employed: Stage 1 involved developing a conceptual framework, conducting literature/Internet searches and establishing content validity of the survey; Stage 2 confirmed the acceptability of methods of administration and consisted of four focus groups involving 11 young people (14-25 years), three parents and two siblings; and Stage 3 established survey comprehension through telephone-administered cognitive interviews with a convenience sample of 23 young people aged 14-24 years. Stage 1: Two-hundred and thirty eight questions were developed from qualitative reports of young people's cancer and treatment-related experience. Stage 2: The focus groups identified three core themes: (i) issues directly affecting young people, e.g. impact of treatment-related fatigue on ability to complete survey; (ii) issues relevant to the actual survey, e.g. ability to answer questions anonymously; (iii) administration issues, e.g. confusing format in some supporting documents. Stage 3: Cognitive interviews indicated high levels of comprehension requiring minor survey amendments. Collaborating with young people with cancer has enabled a survey of to be developed that is both meaningful to young

  3. Umbilical KeyPort bilateral laparoscopic orchiectomy in patient with complete androgen insensitivity syndrome

    Directory of Open Access Journals (Sweden)

    Felipe P. Andrade

    2012-10-01

    Full Text Available MAIN FINDINGS: A 22-year-old woman with complete androgen insensitivity syndrome (CAIS presenting with primary amenorrhea and normal female external genitalia was referred for laparoscopic gonadectomy. She had been diagnosed several years earlier but was reluctant to undergo surgery. CASE HYPOTHESIS: Diagnosis of this X-linked recessive inherited syndrome characterizes by disturbance of virilization in males with an AR mutation, XY karyotipe, female genitalia and severely undescended testis with risk of malignization. The optimal time to orchidectomy is not settled; neither the real risk of malignancy in these patients. Early surgery impacts development of a complete female phenotype, with enlargement of the breasts. Based on modern diagnostic imaging using DCE-MRI and surgical technology with single port laparoscopic access we hypothesize that the optimum time for gonadectomy is not at the time of diagnosis, but once feminization has completed. PROMISING FUTURE IMPLICATIONS: An umbilical laparoendoscopic single-site access for bilateral gonadectomy appears to be the first choice approach as leaves no visible incision and diminishes the psychological impact of surgery in a patient with CAIS absolutely reassured as female. KeyPort, a single port access with duo-rotate instruments developed by Richard Wolf facilitates this surgery and allows excellent cosmetic results.

  4. Role of key-regulator genes in melanoma susceptibility and pathogenesis among patients from South Italy

    International Nuclear Information System (INIS)

    Casula, Milena; Sini, MariaCristina; Palomba, Grazia; The Italian Melanoma Intergroup; Palmieri, Giuseppe; Muggiano, Antonio; Cossu, Antonio; Budroni, Mario; Caracò, Corrado; Ascierto, Paolo A; Pagani, Elena; Stanganelli, Ignazio; Canzanella, Sergio

    2009-01-01

    Several genetic alterations have been demonstrated to contribute to the development and progression of melanoma. In this study, we further investigated the impact of key-regulator genes in susceptibility and pathogenesis of such a disease. A large series (N = 846) of sporadic and familial cases originating from South Italy was screened for germline mutations in p16 CDKN2A , BRCA2, and MC1R genes by DHPLC analysis and automated DNA sequencing. Paired primary melanomas and lymph node metastases from same patients (N = 35) as well as melanoma cell lines (N = 18) were analyzed for somatic mutations in NRAS, BRAF, and p16 CDKN2A genes. For melanoma susceptibility, investigations at germline level indicated that p16 CDKN2A was exclusively mutated in 16/545 (2.9%) non-Sardinian patients, whereas BRCA2 germline mutations were observed in 4/91 (4.4%) patients from North Sardinia only. Two MC1R germline variants, Arg151Cys and Asp294His, were significantly associated with melanoma in Sardinia. Regarding genetic events involved in melanoma pathogenesis at somatic level, mutually-exclusive mutations of NRAS and BRAF genes were observed at quite same rate (about two thirds) in cultured and in vivo melanomas (either primary or metastatic lesions). Conversely, p16 CDKN2A gene alterations were observed at increased rates moving from primary to metastatic melanomas and melanoma cell lines. Activation of the ERK gene product was demonstrated to be consistently induced by a combination of molecular alterations (NRAS/BRAF mutations and p16 CDKN2A silencing). Our findings further clarified that: a) mutation prevalence in melanoma susceptibility genes may vary within each specific geographical area; b) multiple molecular events are accumulating during melanomagenesis

  5. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O

    2011-01-01

    for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about......Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used...... the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials....

  6. Improvements in Key Cardiopulmonary Exercise Testing Variables Following Cardiac Rehabilitation in Patients With Coronary Artery Disease.

    Science.gov (United States)

    Popovic, Dejana; Kumar, Nikhil; Chaudhry, Sundeep; Bagai, Akshay; Arena, Ross; Kumar, Naresh

    2018-05-11

    Improvements in cardiorespiratory fitness (VO2peak) post-cardiac rehabilitation (post-CR) are used to gauge therapeutic efficacy. The aim of the present study was to assess the effect of supervised CR on other cardiopulmonary exercise testing (CPX) variables, specifically those that reflect ventilatory efficiency and VO2 changes in relation to changes in work rate (WR). Patients (n = 142; mean age 63 ± 9 y; 23% female) with coronary artery disease (CAD) participated in supervised CR for 3 to 6 mo completing 60 ± 17 sessions (range: 32-96 sessions), with intensity derived from the baseline CPX. CPX was completed at baseline and post-CR on a cycle ergometer. The minimum heart rate (HR) during cycling was set 5 to 10 beats/min above the HR at ventilatory anaerobic threshold (VAT) while the maximum HR remained below the ischemic threshold observed during CPX, and this intensity was maintained for 25 min. VO2peak, peak O2 pulse, the minute ventilation/carbon dioxide production (VE/VCO2) slope, the oxygen uptake efficiency slope (OUES), and the ΔVO2/ΔWR slope were determined at baseline and post-CR. Following CR, there were significant improvements (all P < .001) in VO2peak (17.7 ± 4.7 mL/kg/min vs 20.9 ± 5.4 mL/kg/min), peak O2 pulse (11.6 ± 3.2 mL/beat vs 13.4 ± 3.6 mL/beat), VE/VCO2 slope (28.4 ± 5.3 vs 27.5 ± 4.7), OUES (1.8 ± 0.5 vs 2.0 ± 0.6), and ΔVO2/ΔWR slope (9.1 ± 1.2 mL/min/W vs 9.6 ± 1.1 mL/min/W). Key markers of ventilatory efficiency and VO2 kinetics during CPX significantly improve following CR. Expanding the list of variables assessed via CPX may provide better resolution in validation of CR therapeutic efficacy in patients with CAD.

  7. Key performance outcomes of patient safety curricula: root cause analysis, failure mode and effects analysis, and structured communications skills.

    Science.gov (United States)

    Fassett, William E

    2011-10-10

    As colleges and schools of pharmacy develop core courses related to patient safety, course-level outcomes will need to include both knowledge and performance measures. Three key performance outcomes for patient safety coursework, measured at the course level, are the ability to perform root cause analyses and healthcare failure mode effects analyses, and the ability to generate effective safety communications using structured formats such as the Situation-Background-Assessment-Recommendation (SBAR) situational briefing model. Each of these skills is widely used in patient safety work and competence in their use is essential for a pharmacist's ability to contribute as a member of a patient safety team.

  8. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates.

    Science.gov (United States)

    Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C

    2011-07-01

    Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.

  9. Electronic game: A key effective technology to promote behavioral change in cancer patients

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2016-01-01

    Full Text Available Cancer diagnosis is a very unpleasant and unbelievable experience. Appropriate management and treatment of these diseases require a high degree of patient engagement. Interactive health electronic games are engaging, fun, challenging, and experiential and have the potential to change the attitude and behavior, which can improve the player's health. The use of these digital tools, as one of the most attractive and entertaining modern technologies, canem power patients, provide suitable palliative care, promote health behavior change strategies, increase patient engagement, enhance healthy lifestyle habits, improve self.management, and finally improve the quality of life of the patients. Finally, the aim of this article was to describe electronic games and their effects on the promotion of behavior change in cancer patients. In addition, this article describes categories, characteristic features, and benefits of this digital media in the lifestyle modification of cancer patients.

  10. Is pacemaker therapy the right key to patients with vasovagal syncope?

    Science.gov (United States)

    Radovanović, Nikola N; Kirćanski, Bratislav; Raspopović, Srdjan; Pavlović, Siniša U; Jovanović, Velibor; Milašinović, Goran

    2016-01-01

    Vasovagal syncope is the most common type of reflex syncope. Efficacy of cardiac pacing in this indication has not been the subject of many studies and pacemaker therapy in patients with vasovagal syncope is still controversial. This study aimed to assess the efficacy and safety of pacing therapy in treatment of patients with vasovagal syncope, to determine contribution of new therapeutic models in increasing its success, and to identify risk factors associated with a higher rate of symptoms after pacemaker implantation. A retrospective study included 30 patients with pacemaker implanted due to vasovagal syncope in the Pacemaker Center, Clinical Center of Serbia, between November 2003 and June 2014. Head-up tilt test was performed to diagnose vasovagal syncope. Patients with cardioinhibitory and mixed type of disease were enrolled in the study. Mean age was 48.1 ± 11.1 years and 18 (60%) patients were men. Mean follow-up period was 5.9 ± 3.0 years. Primarily, implantable loop recorder was implanted in 10 (33.3%) patients. Twenty (66.7%) patients presented cardioinhibitory and 10 (33.3%) mixed type of vasovagal syncope. After pacemaker implantation, 11 (36.7%) patients had syncope. In multiple logistic regression analysis we showed that syncope is statistically more likely to occur after pacemaker implantation in patients with mixed type of vasovagal syncope (p = 0.018). There were two (6.7%) perioperative surgical complications. Pacemaker therapy is a safe treatment for patients with vasovagal syncope, whose efficacy can be improved by strict selection of patients. We showed that symptoms occur statistically more often in patients with mixed type of disease after pacemaker implantation.

  11. Sperm banking is of key importance in patients with prostate cancer.

    Science.gov (United States)

    Salonia, Andrea; Capogrosso, Paolo; Castiglione, Fabio; Russo, Andrea; Gallina, Andrea; Ferrari, Matteo; Clementi, Maria Chiara; Castagna, Giulia; Briganti, Alberto; Cantiello, Francesco; Damiano, Rocco; Montorsi, Francesco

    2013-08-01

    To assess the need for sperm banking among patients with prostate cancer (PCa) who are candidates for radical prostatectomy (RP). Cross-sectional study. Urologic department. Cohort of 510 Caucasian-European candidates for RP. A 10-item self-administered questionnaire to assess opinions on sperm banking before RP, to which descriptive statistics and logistic regression models were applied. PCa patients' wishes for preoperative sperm banking. Data collection was completed for 495 patients (97.1%). Ninety-nine (20%) expressed a wish for preoperative sperm banking. Men who wanted to bank sperm were younger (mean 62.2 vs. 65.1 years), were more frequently childless (21.2% vs. 8.8%), and more frequently had a more intense desire for fatherhood (64.7% vs. 9.3%) than the patients not interested in banking sperm. Willingness to bank sperm was not affected by the patient's educational or relationship status. Moreover, the interest for sperm banking was maintained regardless of cost issues. Overall, 84% of the patients considered it necessary to have a dedicated service of preoperative sperm cryopreservation. One out of five PCa patients would bank sperm before RP. Most patients considered it necessary to establish a dedicated service for preoperative sperm cryopreservation, regardless of their own motivation to bank sperm. Copyright © 2013 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  12. [The key role of patient in the antipsychotic therapy: shared decision making, adherence and research].

    Science.gov (United States)

    Gallingani, Francesca; Piccinni, Carlo; Simeoni, Angela; Poluzzi, Elisabetta; Menchetti, Marco; Berardi, Domenico

    2015-11-01

    A large number of currently available antipsychotic drugs are included into two main classes: traditional (or first-generation), and atypical (or second-generation) antipsychotics. This wide availability of medicinal products allows, at least in part, to address the need to identify the most appropriate treatment for the individual patient. A precondition for the effectiveness of antipsychotic treatment is the adherence, a multi-determined phenomenon that depends on factors related to the pharmacological properties of each agent and on factors independent from the therapy: among them, therapeutic alliance between patients and medical team, patient's belief in benefits and risks of medicines, and patient's relationship with the family and social environment are the most clearly recognized. The collection of data from patient helps the management of the individual clinical case, but this information could also become a source of data for research. In both cases, data must be collected in a ordered and well-coded way, therefore numerous instruments (like questionnaires and registers) are developing. This approach permits to make a recognition of patient's perception of his health condition, as well as the positive and negative outcomes of his pharmacological treatment. These tools are known in the literature by the name of PROMs (patient-reported outcome measures). From the clinical point of view, the PROMs can reduce the gap between patient and clinician in different therapeutic areas. They also enables the physician to identify the most suitable treatment to the individual patient, to meet his needs and preferences, and to adapt the therapy over time to the changes of his medical condition. About the research, the effects reported by the patient, in terms of both benefits and adverse reactions, represent important information useful to conduct observational studies that better define the benefit-risk profile of drug therapies, especially in psychiatry.

  13. Validated biomarkers: The key to precision treatment in patients with breast cancer.

    Science.gov (United States)

    Duffy, Michael J; O'Donovan, Norma; McDermott, Enda; Crown, John

    2016-10-01

    Recent DNA sequencing and gene expression studies have shown that at a molecular level, almost every case of breast cancer is unique and different from other breast cancers. For optimum management therefore, every patient should receive treatment that is guided by the molecular composition of their tumor, i.e., precision treatment. While such a scenario is still some distance into the future, biomarkers are beginning to play an important role in preparing the way for precision treatment. In particular, biomarkers are increasingly being used for predicting patient outcome and informing as to the most appropriate type of systemic therapy to be administered. Mandatory biomarkers for every newly diagnosed case of breast cancer are estrogen receptors and progesterone receptors in selecting patients for endocrine treatment and HER2 for identifying patients likely to benefit from anti-HER2 therapy. Amongst the best validated prognostic biomarker tests are uPA/PAI-1, MammaPrint and Oncotype DX. Although currently, there are no biomarkers available for predicting response to specific forms of chemotherapy, uPA/PAI-1 and Oncotype DX can aid the identification of lymph node-negative patients that are most likely to benefit from adjuvant chemotherapy, in general. In order to accelerate progress towards precision treatment for women with breast cancer, we need additional predictive biomarkers, especially for enhancing the positive predictive value for endocrine and anti-HER2 therapies, as well as biomarkers for predicting response to specific forms of chemotherapy. The ultimate biomarker test for achieving the goal of precision treatment for patients with breast cancer will likely require a combination of gene sequencing and transcriptomic analysis of every patient's tumor. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Patients' experiences of dental implant treatment: A literature review of key qualitative studies.

    Science.gov (United States)

    Kashbour, W A; Rousseau, N S; Ellis, J S; Thomason, J M

    2015-07-01

    To identify and summarise the findings of previous qualitative studies relating to patients' experience of dental implant treatment (DIT) at various stages of their implant treatment, by means of textual narrative synthesis. Original articles reporting patients' experience with dental implant were included. A two-stage search of the literature, electronic and hand search identified relevant qualitative studies up to July 2014. An extensive electronic search was conducted of databases including PubMed, Embase, Scopus, Web of Knowledge, Cochrane Database and Google Scholar. Included primary studies (n=10) used qualitative research methods and qualitative analysis to investigate patients' experiences with dental implants treatment. While the growing interest in implant treatment for the replacement of missing dentition is evident, it is essential to investigate patients' perceptions of different aspects of implant treatment. This textual narrative synthesis conducted to review qualitative studies which provided insight into patients' experience of two types of implant prostheses namely ISOD (implant-supported overdenture) and FISP (fixed implant supported prostheses). Primary reviewed studies tended to include samples of older patients with more extensive tooth loss, and to focus on experiences prior to and post-treatment rather than on the treatment period itself. Findings across reviewed studies (n=10) suggested that patients with FISP thought of implant treatment as a process of 'normalisation'(1) and believed that such implant restorations could be similar to natural teeth, whereas patients with ISOD focused more on the functional and social advantages of their implant treatment. The growing interest in qualitative research is evident in several branches of clinical dentistry and dental implantology is not an exception. Qualitative studies concerning the patients account of their experience of dental implants is however limited. The aim of this review is to

  15. Authoritarian physicians and patients' fear of being labeled 'difficult' among key obstacles to shared decision making.

    Science.gov (United States)

    Frosch, Dominick L; May, Suepattra G; Rendle, Katharine A S; Tietbohl, Caroline; Elwyn, Glyn

    2012-05-01

    Relatively little is known about why some patients are reluctant to engage in a collaborative discussion with physicians about their choices in health care. To explore this issue further, we conducted six focus-group sessions with forty-eight people in the San Francisco Bay Area. In the focus groups, we found that participants voiced a strong desire to engage in shared decision making about treatment options with their physicians. However, several obstacles inhibit those discussions. These include the fact that even relatively affluent and well-educated patients feel compelled to conform to socially sanctioned roles and defer to physicians during clinical consultations; that physicians can be authoritarian; and that the fear of being categorized as "difficult" prevents patients from participating more fully in their own health care. We argue that physicians may not be aware of a need to create a safe environment for open communication to facilitate shared decision making. Rigorous measures of patient engagement, and of the degree to which health care decisions truly reflect patient preferences, are needed to advance shared decision making in clinical practice.

  16. Key considerations on nebulization of antimicrobial agents to mechanically ventilated patients.

    Science.gov (United States)

    Rello, J; Rouby, J J; Sole-Lleonart, C; Chastre, J; Blot, S; Luyt, C E; Riera, J; Vos, M C; Monsel, A; Dhanani, J; Roberts, J A

    2017-09-01

    Nebulized antibiotics have an established role in patients with cystic fibrosis or bronchiectasis. Their potential benefit to treat respiratory infections in mechanically ventilated patients is receiving increasing interest. In this consensus statement of the European Society of Clinical Microbiology and Infectious Diseases, the body of evidence of the therapeutic utility of aerosolized antibiotics in mechanically ventilated patients was reviewed and resulted in the following recommendations: Vibrating-mesh nebulizers should be preferred to jet or ultrasonic nebulizers. To decrease turbulence and limit circuit and tracheobronchial deposition, we recommend: (a) the use of specifically designed respiratory circuits avoiding sharp angles and characterized by smooth inner surfaces, (b) the use of specific ventilator settings during nebulization including use of a volume controlled mode using constant inspiratory flow, tidal volume 8 mL/kg, respiratory frequency 12 to 15 bpm, inspiratory:expiratory ratio 50%, inspiratory pause 20% and positive end-expiratory pressure 5 to 10 cm H 2 O and (c) the administration of a short-acting sedative agent if coordination between the patient and the ventilator is not obtained, to avoid patient's flow triggering and episodes of peak decelerating inspiratory flow. A filter should be inserted on the expiratory limb to protect the ventilator flow device and changed between each nebulization to avoid expiratory flow obstruction. A heat and moisture exchanger and/or conventional heated humidifier should be stopped during the nebulization period to avoid a massive loss of aerosolized particles through trapping and condensation. If these technical requirements are not followed, there is a high risk of treatment failure and adverse events in mechanically ventilated patients receiving nebulized antibiotics for pneumonia. Copyright © 2017 European Society of Clinical Microbiology and Infectious Diseases. Published by Elsevier Ltd. All rights

  17. Role of Key TYMS Polymorphisms on Methotrexate Therapeutic Outcome in Portuguese Rheumatoid Arthritis Patients

    Science.gov (United States)

    Lima, Aurea; Seabra, Vítor; Bernardes, Miguel; Azevedo, Rita; Sousa, Hugo; Medeiros, Rui

    2014-01-01

    Background Therapeutic outcome of rheumatoid arthritis (RA) patients treated with methotrexate (MTX) can be modulated by thymidylate synthase (TS) levels, which may be altered by genetic polymorphisms in TS gene (TYMS). This study aims to elucidate the influence of TYMS polymorphisms in MTX therapeutic outcome (regarding both clinical response and toxicity) in Portuguese RA patients. Methods Clinicopathological data from 233 Caucasian RA patients treated with MTX were collected, outcomes were defined and patients were genotyped for the following TYMS polymorphisms: 1) 28 base pairs (bp) variable number tandem repeat (rs34743033); 2) single nucleotide polymorphism C>G (rs2853542); and 3) 6 bp sequence deletion (1494del6, rs34489327). Chi-square and binary logistic regression analyses were performed, using genotype and haplotype-based approaches. Results Considering TYMS genotypes, 3R3R (p = 0.005, OR = 2.34), 3RC3RG (p = 0.016, OR = 3.52) and 6bp− carriers (p = 0.011, OR = 1.96) were associated with non-response to MTX. Multivariate analysis confirmed the increased risk for non-response to MTX in 6bp− carriers (p = 0.016, OR = 2.74). Data demonstrated that TYMS polymorphisms were in linkage disequilibrium (p<0.00001). Haplotype multivariate analysis revealed that haplotypes harboring both 3R and 6bp− alleles were associated with non-response to MTX. Regarding MTX-related toxicity, no statistically significant differences were observed in relation to TYMS genotypes and haplotypes. Conclusion Our study reveals that TYMS polymorphisms could be important to help predicting clinical response to MTX in RA patients. Despite the potential of these findings, translation into clinical practice needs larger studies to confirm these evidences. PMID:25279663

  18. Characteristic face: a key indicator for direct diagnosis of 22q11.2 deletions in Chinese velocardiofacial syndrome patients.

    Science.gov (United States)

    Wu, Dandan; Chen, Yang; Xu, Chen; Wang, Ke; Wang, Huijun; Zheng, Fengyun; Ma, Duan; Wang, Guomin

    2013-01-01

    Velocardiofacial syndrome (VCFS) is a disease in human with an expansive phenotypic spectrum and diverse genetic mechanisms mainly associated with copy number variations (CNVs) on 22q11.2 or other chromosomes. However, the correlations between CNVs and phenotypes remain ambiguous. This study aims to analyze the types and sizes of CNVs in VCFS patients, to define whether correlations exist between CNVs and clinical manifestations in Chinese VCFS patients. In total, 55 clinically suspected Chinese VCFS patients and 100 normal controls were detected by multiplex ligation-dependent probe amplification (MLPA). The data from MLPA and all the detailed clinical features of the objects were documented and analyzed. A total of 44 patients (80.0%) were diagnosed with CNVs on 22q11.2. Among them, 43 (78.2%) presented with 22q11.2 heterozygous deletions, of whom 40 (93.0%) had typical 3-Mb deletion, and 3 (7.0%) exhibited proximal 1.5-Mb deletion; no patient was found with atypical deletion on 22q11.2. One patient (1.8%) presented with a 3-Mb duplication mapping to the typical 3-Mb region on 22q11.2, while none of the chromosomal abnormalities in the MLPA kit were found in the other 11 patients and 100 normal controls. All the 43 patients with 22q11.2 deletions displayed characteristic face and palatal anomalies; 37 of them (86.0%) had cognitive or behavioral disorders, and 23 (53.5%) suffered from immune deficiencies; 10 patients (23.3%) manifested congenital heart diseases. Interestingly, all patients with the characteristic face had 22q11.2 heterozygous deletions, but no difference in phenotypic spectrum was observed between 3-Mb and 1.5-Mb deletions. Our data suggest that the characteristic face can be used as a key indicator for direct diagnosis of 22q11.2 deletions in Chinese VCFS patients.

  19. Does the patient's hand hold the key to preventing secondary generalization in mesial temporal lobe epilepsy?

    Science.gov (United States)

    Uchida, Carina Gonçalves Pedroso; Barsottini, Orlando Graziani Povoas; Caboclo, Luís Otávio Sales Ferreira; de Araújo Filho, Gerardo Maria; Centeno, Ricardo Silva; Carrete, Henrique; Yacubian, Elza Márcia Targas

    2013-07-01

    This study aimed to analyze the impact of ictal dystonic posturing (DP) in postoperative seizure outcome and to assess the influence of DP in generalized tonic-clonic seizure (GTCS) occurrence during video-EEG monitoring of patients with temporal lobe epilepsy with mesial temporal sclerosis. The impact of DP on surgical outcome remains controversial. Moreover, DP has been recently associated with brain networks avoiding GTCS occurrence. Five hundred twenty-seven seizures of 171 patients who were submitted to standard anterior temporal lobectomy (ATL) between 2002 and 2010, with at least one year of post-surgical follow-up, were retrospectively analyzed and classified as with or without DP and as evolving or not to GTCS. The ictal semiologic correlates of DP, timing elapsed since precedent seizure and antiepileptic drug (AED) intake before each seizure were evaluated. Seizure outcome after ATL was assessed according to Engel's scale. Fifty-eight out of 171 patients (34%) exhibited ictal DP, of which 91.5% were always unilateral and contralateral to the operated side. DP was related to shorter seizures (p=0.007) and a much lower likelihood of the seizure evolving to GTCS (p=0.001), even during AED withdrawal (p=0.002). There was no association between DP and prognosis regarding seizure control as the result of the surgical resection, either in patients with shorter or in those with longer period of follow-up. Our data support the hypothesis that DP reflects a brain network activation that helps avoid GTCS, even during AED withdrawal. Copyright © 2013 Elsevier B.V. All rights reserved.

  20. The keys to successful TIPS in patients with portal vein thrombosis and cavernous transformation.

    Science.gov (United States)

    Lombardo, S; Espejo, J J; Pérez-Montilla, M E; Zurera, L J; González-Galilea, Á

    Portal vein thrombosis is a common complication in patients with cirrhosis. Anticoagulation involves a high risk of bleeding secondary to portal hypertension, so placing transjugular intrahepatic portosystemic shunts (TIPS) has become an alternative treatment for portal vein thrombosis. Three strategies for TIPS placement have been reported: 1) portal recanalization and conventional implantation of the TIPS through the jugular vein; 2) portal recanalization through percutaneous transhepatic/transsplenic) access; and (3) insertion of the TIPS between the suprahepatic vein and a periportal collateral vessel without portal recanalization. We describe different materials that can be used as fluoroscopic targets for the TIPS needle and for portal recanalization. This article aims to show the success of TIPS implantation using different combinations of the techniques listed above, which is a good treatment alternative in these patients whose clinical condition makes them difficult to manage, and to show that portal vein thrombosis/cavernous transformation should not be considered a contraindication for TIPS. Copyright © 2017 SERAM. Publicado por Elsevier España, S.L.U. All rights reserved.

  1. Key elements of successful intensive therapy in patients with type 1 diabetes

    Directory of Open Access Journals (Sweden)

    Banshi Saboo

    2015-01-01

    Full Text Available An intensified diabetes management approach (including increased education, monitoring, and contact with diabetes team should be used for adolescents and also for younger children if glycaemic control is not achieved by insulin therapy. Treatment options may include increased frequency of injections (e.g. the patients on 2 bolus may require 3 or 4 bolus injections, change in the type of basal and/or bolus insulin depending on multiple times monitoring for adolescents and for younger children, and change to continuous subcutaneous insulin infusion pump therapy. Results of epidemiology of diabetes interventions and complications (EDIC Research Group, where the Diabetes Control and Complications Trial patients were further followed up almost for a period of 7 years or more showed that intensive therapy significantly reduced and maintained glycated hemoglobin with relative risk reduction of microvascular complications in the intensive therapy group. In addition, intensive treatment reduced the risk of any cardiovascular disease (CVD event by 42% and the risk of nonfatal myocardial infarction, stroke, or death from CVD by 57%. The reduction of microvascular and macrovascular events in the intensively-treated group persisted due to the "legacy effect" or "metabolic memory" of early intensive glycemic control. The main advantage of intensive insulin therapy is that it reduces the rate of diabetes complications, in the long run. Furthermore, it offers flexibility as the doses can be adjusted according to the activity and food consumed. The main disadvantage of intensive insulin therapy is the risk of hypoglycemia especially in type 1 diabetes mellitus and weight gain.

  2. Evaluation of the first seizure patient: Key points in the history and physical examination.

    Science.gov (United States)

    Nowacki, Tomasz A; Jirsch, Jeffrey D

    2017-07-01

    This review will present the history and physical examination as the launching point of the first seizure evaluation, from the initial characterization of the event, to the exclusion of alternative diagnoses, and then to the determination of specific acute or remote causes. Clinical features that may distinguish seizures from alternative diagnoses are discussed in detail, followed by a discussion of acute and remote first seizure etiologies. This review article is based on a discretionary selection of English language articles retrieved by a literature search in the PubMed database, and the authors' clinical experience. The first seizure is a dramatic event with often profound implications for patients and family members. The initial clinical evaluation focuses on an accurate description of the spell to confirm the diagnosis, along with careful scrutiny for previously unrecognized seizures that would change the diagnosis more definitively to one of epilepsy. The first seizure evaluation rests primarily on the clinical history, and to a lesser extent, the physical examination. Even in the era of digital EEG recording and neuroimaging, the initial clinical evaluation remains essential for the diagnosis, treatment, and prognostication of the first seizure. Copyright © 2016. Published by Elsevier Ltd.

  3. Key European guidelines for the diagnosis and management of patients with phenylketonuria

    DEFF Research Database (Denmark)

    van Spronsen, Francjan J; van Wegberg, Annemiek Mj; Ahring, Kirsten

    2017-01-01

    was available. From the 70 recommendations formulated, in this Review we describe ten that we deem as having the highest priority. Diet is the cornerstone of treatment, although some patients can benefit from tetrahydrobiopterin (BH4). Untreated blood phenylalanine concentrations determine management of people...... with PKU. No intervention is required if the blood phenylalanine concentration is less than 360 μmol/L. Treatment is recommended up to the age of 12 years if the phenylalanine blood concentration is between 360 μmol/L and 600 μmol/L, and lifelong treatment is recommended if the concentration is more than...... 600 μmol/L. For women trying to conceive and during pregnancy (maternal PKU), untreated phenylalanine blood concentrations of more than 360 μmol/L need to be reduced. Treatment target concentrations are as follows: 120-360 μmol/L for individuals aged 0-12 years and for maternal PKU, and 120-600 μmol...

  4. Procuring, maintaining and using equipment: the key issues in controlling exposure to patients

    International Nuclear Information System (INIS)

    Hendra, I.R.F.

    1989-01-01

    Radiological equipment is not purpose-built for each individual application. Thus, not only are acceptance criteria directly related to the design of equipment and the quality assurance exercised during its manufacture, but also the performance, safety and reliability of equipment must feature in the requirements for procuring new equipment. In the UK this issue is dealt with under the Department of Health and Social Security Manufacturer Registration Scheme for Medical Equipment in its application to radiological equipment. Similarly the continuing reliability of equipment in service is directly related to the quality of maintenance services. This is determined largely by the manner in which such services are procured. In the UK this issue has been considered by one of four Working Parties commissioned by the South-East Thames Regional Health Authority who are the ''Centre of Responsibility'' for diagnostic imaging equipment. The report prepared from the first phase of activity of this working group describes features of a procurement specification for maintenance services and prescribes the complementary duties of contractors and customers. The use in X-ray departments of the kind of manufacturing quality system that is used by most reputable equipment manufacturers has the potential for a dramatic reduction in exposure to patients. (author)

  5. Key elements of successful care process of patients with heart symptoms in an emergency care - could an ERP system help?

    Science.gov (United States)

    Kontio, Elina; Korvenranta, Heikki; Lundgren-Laine, Heljä; Salanterä, Sanna

    2009-01-01

    The aim of the study was to identify key elements of successful care process of patients with heart symptoms from the nursing management viewpoint in an emergency care. Through these descriptions, we aimed at identifying possibilities for using enterprise resource planning (ERP) systems to support decision making in emergency care. Hospitals are increasingly moving to process-based workings and at the same time new information system in healthcare are developed and therefore it is essential to understand the strengths and weaknesses of current processes better. A qualitative descriptive design using critical incident technique was employed. Critical Incidents were collected with an open-ended questionnaire. The sample (n=50), 13 head nurses and 37 registered nurses, was purposeful selected from three acute hospitals in southern Finland. The process of patients with heart symptoms in emergency care was described. We identified three competence categories where special focus should be placed to achieve successful process of patients with heart symptoms: process-oriented competencies, personal/management competencies and logistics oriented competencies. Improvement of decision making requires that the care processes are defined and modeled. The research showed that there are several happenings in emergency care where an ERP system could help and support decision making. These happenings can be categorized in two groups: 1) administrative related happenings and 2) patient processes related happenings.

  6. Key ingredients for implementing intensive outpatient programs within patient-centered medical homes: A literature review and qualitative analysis.

    Science.gov (United States)

    Breland, Jessica Y; Asch, Steven M; Slightam, Cindie; Wong, Ava; Zulman, Donna M

    2016-03-01

    Intensive outpatient programs aim to transform care while conserving resources for high-need, high-cost patients, but little is known about factors that influence their implementation within patient-centered medical homes (PCMHs). In this mixed-methods study, we reviewed the literature to identify factors affecting intensive outpatient program implementation, then used semi-structured interviews to determine how these factors influenced the implementation of an intensive outpatient program within the Veterans Affairs' (VA) PCMH. Interviewees included facility leadership and clinical staff who were involved in a pilot Intensive Management Patient Aligned Care Team (ImPACT) intervention for high-need, high-cost VA PCMH patents. We classified implementation factors in the literature review and qualitative analysis using the Consolidated Framework for Implementation Research (CFIR). The literature review (n=9 studies) and analyses of interviews (n=15) revealed key implementation factors in three CFIR domains. First, the Inner Setting (i.e., the organizational and PCMH environment), mostly enabled implementation through a culture of innovation, good networks and communication, and positive tension for change. Second, Characteristics of Individuals, including creativity, flexibility, and interpersonal skills, allowed program staff to augment existing PCMH services. Finally, certain Intervention Characteristics (e.g., adaptability) enabled implementation, while others (e.g., complexity) generated implementation barriers. Resources and structural features common to PCMHs can facilitate implementation of intensive outpatient programs, but program success is also dependent on staff creativity and flexibility, and intervention adaptations to meet patient and organizational needs. Established PCMHs likely provide resources and environments that permit accelerated implementation of intensive outpatient programs. V. Published by Elsevier Inc.

  7. Psychometric Analysis and Qualitative Review of an Outpatient Radiology-Specific Patient Satisfaction Survey: A Call for Collaboration in Validating a Survey Instrument.

    Science.gov (United States)

    Dibble, Elizabeth H; Baird, Grayson L; Swenson, David W; Healey, Terrance T

    2017-10-01

    The aim of this study was to perform a psychometric analysis of the constructs and reliability of an outpatient radiology-specific patient satisfaction survey and identify factors that drive patient experience so that radiology practices can improve the quality of their diagnostic imaging services. This retrospective study examined responses to eight patient satisfaction questions from a survey originally developed by a nascent marketing team and then administered at five outpatient imaging centers from January 7, 2013, to November 11, 2015. Patients' responses were reviewed to identify factors that affected patient experience, and a psychometric analysis of the survey instrument itself was performed, including exploratory factor analyses and reliability testing. Patient responses were compared among sites, examination types, and questions. Free-text comments were qualitatively categorized and compared by examination type. In total, 6,512 surveys were completed among 137,059 patient encounters. Using exploratory factor analyses of the eight survey questions, three relevant patient experience constructs were derived: (1) front office experience, (2) intake experience, and (3) examination experience. Overall, good scale reliability was observed. Perceived quality of care had the most positive ratings; wait time had the most nonpositive ratings. Of 2,024 free-text comments, 1,859 were positive (most pertaining to staff), and 155 were negative (most pertaining to convenience). MRI patients were most likely to share negative comments, typically regarding the examination experience itself. Psychometric analysis of a patient survey derived three core patient experience constructs: front office experience, intake experience, and examination experience. The survey indicates the need to decrease wait times, streamline the registration process, and improve patient comfort during MRI examinations. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All

  8. Transcultural adaptation and validation of the Celiac Disease Quality of Life (CD-QOL survey, a specific questionnaire to measure quality of life in patients with celiac disease

    Directory of Open Access Journals (Sweden)

    Francesc Casellas

    2013-12-01

    Full Text Available Introduction: celiac disease is a chronic condition that requires continued treatment, with the resultant impact on health-related quality of life (HRQOL of people who suffer it. Most studies in this field have used generic questionnaires to measure HRQOL in celiac patients. It was therefore decided to conduct a study to translate into Spanish and validate a specific questionnaire for celiac disease, the Celiac Disease Quality Of Life Survey (CD-QOL. Objectives: to translate and validate in Spanish the specific celiac disease questionnaire CD-QOL. Methods: a multicenter, prospective, observational study was designed consisting of two phases: In the first phase, the questionnaire was translated and adapted into Spanish using the translation/back translation procedure and an understandability study. In the second phase, internal consistency of the translated questionnaire was analyzed. For this, results of the CD-QOL were compared to those of EuroQol and the Daily Fatigue Impact Scale (D-FIS. Understandability of the translated and adapted questionnaire was tested in six patients, and the validation study was done in 298 celiac patients (201 treated with a gluten-free diet and 97 at diagnosis. Results: in both celiac groups, Cronbach's alpha coefficient was high (0.90, feasibility was excellent (99.2 % of patients completed all questions, and there were no ceiling and floor effects. Spearman correlation to EuroQol and D-FIS was statistically significant (p < 0.05. CD-QOL score was different depending on whether state of health was good, fair, or poor based on the EuroQol score. Conclusion: the Spanish version of the CD-QOL is a valid tool for measuring HRQOL in celiac patients.

  9. Smoking cessation in European patients with coronary heart disease. Results from the EUROASPIRE IV survey: A registry from the European Society of Cardiology.

    Science.gov (United States)

    Snaterse, M; Deckers, J W; Lenzen, M J; Jorstad, H T; De Bacquer, D; Peters, R J G; Jennings, C; Kotseva, K; Scholte Op Reimer, W J M

    2018-05-01

    We investigated smoking cessation rates in coronary heart disease (CHD) patients throughout Europe; current and as compared to earlier EUROASPIRE surveys, and we studied characteristics of successful quitters. Analyses were done on 7998 patients from the EUROASPIRE-IV survey admitted for myocardial infarction, unstable angina and coronary revascularisation. Self-reported smoking status was validated by measuring carbon monoxide in exhaled air. Thirty-one percent of the patients reported being a smoker in the month preceding hospital admission for the recruiting event, varying from 15% in centres from Finland to 57% from centres in Cyprus. Smoking rates at the interview were also highly variable, ranging from 7% to 28%. The proportion of successful quitters was relatively low in centres with a low number of pre- event smokers. Overall, successful smoking cessation was associated with increasing age (OR 1.50; 95% CI 1.09-2.06) and higher levels of education (OR 1.38; 95% CI 1.08-1.75). Successful quitters more frequently reported that they had been advised (56% vs. 47%, p < .001) and to attend (81% vs. 75%, p < .01) a cardiac rehabilitation programme. Our study shows wide variation in cessation rates in a large contemporary European survey of CHD patients. Therefore, smoking cessation rates in patients with a CHD event should be interpreted in the light of pre-event smoking prevalence, and caution is needed when comparing cessation rates across Europe. Furthermore, we found that successful quitters reported more actions to make healthy lifestyle changes, including participating in a cardiac rehabilitation programme, as compared with persistent smokers. Copyright © 2018 Elsevier B.V. All rights reserved.

  10. National surveys: a way to manage treatment strategies in Parkinson's disease? Pharmaceutical prescribing patterns and patient experiences of symptom control and their impact on disease

    Directory of Open Access Journals (Sweden)

    Skogar Ö

    2013-07-01

    Full Text Available Örjan Skogar,1,2 Mats Nilsson,1 Carl-Johan Törnhage,3 Johan Lökk2 1Futurum Health Care Academy, Jönköping, 2Institution of Neurobiology, Care Sciences and Society, Karolinska Institutet, Karolinska University Hospital Huddinge, Stockholm, 3Department of Pediatrics, Skaraborg Hospital, Skövde, Sweden Background: The purpose of this study was to draw conclusions from patient-reported experiences in two national surveys from Scandinavia with the intention of comparing treatment strategies and increasing our knowledge of factors that affect the experiences of patients with Parkinson's disease (PD. Methods: A total of 2000 individuals in Sweden and 1300 in Norway were invited to complete postal surveys covering PD-related issues. Patient experiences of diagnostic procedures, symptom control, and follow-up in PD and the effects on symptom-related quality of life were collected. Pharmaceutical prescription data on anti-PD drugs and administrative data were collected from national registries. Results: The surveys were completed by 1553 (78% of the Swedish cohort and 1244 (96% of the Norwegian cohort. Only small differences were seen in disease duration and age distribution. Statistically as well as clinically significant differences in symptom control, diagnostic, and follow-up procedures, as well as in pharmacological treatment and impact on quality of life, were found between the national cohorts independent of disease duration. Conclusion: Information from separate national surveys has the potential to increase our knowledge of patient experiences in PD and can be used to compare, evaluate, educate, and guide health care staff and administrators in optimizing health care for patients with the disease. Keywords: parkinson's disease, diagnosis, follow-up, pharmaceutical prescription, quality of life, survey

  11. Targeting improved patient outcomes using innovative product listing agreements: a survey of Canadian and international key opinion leaders

    Directory of Open Access Journals (Sweden)

    Thompson M

    2016-08-01

    Canadian PLAs are financial-based rather than outcomes-based. They indicated that IPLAs offer important benefits to patients, payers, and manufacturers; however, several challenges limit their use (eg, administrative burden, lack of agreed-upon endpoint. They noted that IPLAs are useful in rapidly evolving therapeutic areas and those associated with high unmet need, a quantifiable endpoint, and/or robust data systems. The Canadian Agency for Drugs and Technologies in Health, the pan-Canadian Pharmaceutical Alliance, and other arms-length organizations could play important roles in identifying uncertainty and endpoints and brokering pan-Canadian PLAs. Industry should work collaboratively with payers to identify uncertainty and develop innovative mechanisms to address it. Conclusion: The survey results indicated that while challenging, use of IPLAs may be associated with various benefits. Collaboration among stakeholders remains key: Canadian agencies could play an important role in the success of these agreements, while industry should be proactive in offering solutions that will help improve outcomes across the entire health care system. Keywords: product listing agreement, survey, innovative, Canada, CADTH, pCPA

  12. Is quality of care a key predictor of perinatal health care utilization and patient satisfaction in Malawi?

    Science.gov (United States)

    Creanga, Andreea A; Gullo, Sara; Kuhlmann, Anne K Sebert; Msiska, Thumbiko W; Galavotti, Christine

    2017-05-22

    services received. Quality of care is a key predictor of perinatal health service utilization and complete patient satisfaction with such services in Malawi. The current heightened attention toward perinatal health services and outcomes should be coupled with efforts to improve the actual quality of care offered to women in this country.

  13. Factors associated with patient recall of key information in ambulatory specialty care visits: Results of an innovative methodology.

    Science.gov (United States)

    Laws, M Barton; Lee, Yoojin; Taubin, Tatiana; Rogers, William H; Wilson, Ira B

    2018-01-01

    While some studies have assessed patient recall of important information from ambulatory care visits, none has done so recently. Furthermore, little is known about features of clinical interactions which are associated with patient understanding and recall, without which shared decision making, a widely shared ideal for patient care, cannot occur. Our objective was to evaluate characteristics of patients and outpatient encounters associated with patient recall of information after one week, along with observation of elements of shared decision making. This was an observational study based on coded transcripts of 189 outpatient encounters, and post-visit interviews with patients 1 week later. Coding used three previously validated systems, adopted for this study. Forty-nine percent of decisions and recommendations were recalled accurately without prompting; 36% recalled with a prompt; 15% recalled erroneously or not at all. Provider behaviors hypothesized to be associated with patient recall, such as open-questioning and "teach back," were rare. Patients with less than high school education recalled 38% of items freely and accurately, while patients with a college degree recalled 65% (p total number of items to be recalled per visit, and percentage of utterances in decision-making processes by the provider ("verbal dominance"), were significant predictors of poorer recall. The item count was associated with poorer recall for lower, but not higher, educated patients.

  14. Molecular key to understand the gastric cancer biology in elderly patients-The role of microsatellite instability.

    Science.gov (United States)

    Polom, Karol; Marrelli, Daniele; Roviello, Giandomenico; Pascale, Valeria; Voglino, Costantino; Rho, Henry; Marini, Mario; Macchiarelli, Raffaele; Roviello, Franco

    2017-03-01

    Microsatellite instability (MSI) in gastric cancer (GC) is associated with older age. We present the clinicopathological results of younger and older patients with MSI GC. We analyzed 472 patients with GC. MSI analysis was done on fresh frozen tissue using five quasimonomorphic mononucleotide repeats: NR-21, NR-24, NR-27, BAT-25, and BAR-26. Clinical and pathological analysis was performed for different age groups. We observed better survival in elderly MSI GC patients compared to younger patients. The percentage of MSI GC increases gradually with increasing age, accounting for 48% of patients over the age of 85 years. A difference in survival was seen between MSI and MSS groups of patients older than 65 years, while no statistical difference was seen for younger groups. Multivariate analysis revealed that MSI status has a significant prognostic factor in patients aged over 70 years (MSS vs. MSI; HR 1.82, P = 0.013). MSI is an important prognostic factor above all in elderly GC patients. It is associated with favorable prognosis and may help in planning different approaches to treatment in this subgroup. J. Surg. Oncol. 2017;115:344-350. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  15. Intra-Hospital Transport of Patients on Non-Invasive Ventilation: Review, Analysis, and Key Practical Recommendations by the International NIV Committee

    Directory of Open Access Journals (Sweden)

    Annia Schreiber

    2017-12-01

    Full Text Available Intra-hospital transport is often needed for diagnostic and therapeutic procedures that cannot be performed at the bedside. However, moving patients from the safe environment of an Intensive Care Unit (ICU can lead to a variety of complications and adverse events, the risk is even higher in ventilated patients. This review is intended as a guide on how to prevent and avoid these adverse events during intra-hospital transport of patients on non-invasive ventilation (NIV. Greater attention should be paid to NIV indications and the selection of the patients to be transported. Detailed planning, preparation, and communication between the ward of origin and destination site, appropriate equipment, skilled staff, and continuous monitoring are the key major determinants of success in transporting critically ill patients on NIV. These points are discussed and analyzed in detail.

  16. Diabetes Self-Management: A Key for Better Health-related Quality of Life in Patients with Diabetes.

    Science.gov (United States)

    Badr, Hanan E; Al-Khaledi, Maha; Al-Dousari, Hussah; Al-Dhufairi, Shaikhah; Al-Mousawi, Taiba; Al-Azemi, Rehab; Al-Azimi, Farah

    2018-04-17

    This study was aimed at assessing health-related quality of life (HRQOL) among adult patients with diabetes attending primary health care diabetes clinics in Kuwait and to examine the factors associated with patients with the HRQOL of patients with diabetes. This cross-sectional study was conducted among 503 patients with diabetes attending 26 primary healthcare diabetes clinics in Kuwait. A self-administered questionnaire on participants' socio-demographic and clinical characteristics, in addition to the Diabetes Self-Management Questionnaire (DSMQ) to assess patients' DSM was used. SF12 was employed to assess the HRQOL, producing two outcomes: Physical health composite and Mental health composite. The mean age of participants was 52. ± 0.8 years, 53.1% were males, and 49.0% were Kuwaitis. The median DSM sum score was 6.5. Male patients with diabetes showed significantly better median DSM sum score than female patients with diabetes. The overall median score of HRQOL was 61.7/100 with a better median score of PHC than MHC of quality of life (66.7/100 and 56.7/100, respectively). Multivariate analysis revealed a significant direct association between DSM and better primary health composite and mental health composite. It also showed that female gender, and reporting two or more diabetic complications were significantly associated with poor PHC. Kuwaiti patients with diabetes showed a modest level of HRQOL. Patients' DSM, gender, and diabetes complications were significant independent correlates to HRQOL. Appraisal of patients with diabetes' HRQOL as an essential component of diabetes management in clinical settings is suggested. Further studies to examine the impact of good diabetes self-management on HRQOL improvement are needed. . ©2018The Author(s). Published by S. Karger AG, Basel.

  17. Patient safety in a service of medical physics. Key indicators; Seguridad del paciente en un servicio de fisica medica. Indicadores clave

    Energy Technology Data Exchange (ETDEWEB)

    Font Gomez, J. A.; Gandia Martinez, A.; Jimenez Albericio, F. J.; Andres Redondo, M. M.; Mengual Gil, M. A.

    2013-07-01

    The key indicators are those that endure over time to monitor the degree of compliance with the criteria in the processes that are considered key in the service. In the case of our service, define key indicators within the framework of ISO 9001 certification in the process of clinical dosimetry. All problems do not have same casuistry or not, have the same detrimental to the safety of the patient. We have prioritized some of the problems and opportunities for improvement have been found. Standard refers to the value of the indicator that we should or would like to achieve in such a way that if not achieved, action of improvement will be required. (Author)

  18. Patients' perception of their involvement in shared treatment decision making: Key factors in the treatment of inflammatory bowel disease.

    Science.gov (United States)

    Veilleux, Sophie; Noiseux, Isabelle; Lachapelle, Nathalie; Kohen, Rita; Vachon, Luc; Guay, Brian White; Bitton, Alain; Rioux, John D

    2018-02-01

    This study aims to characterize the relationships between the quality of the information given by the physician, the involvement of the patient in shared decision making (SDM), and outcomes in terms of satisfaction and anxiety pertaining to the treatment of inflammatory bowel disease (IBD). A Web survey was conducted among 200 Canadian patients affected with IBD. The theoretical model of SDM was adjusted using path analysis. SAS software was used for all statistical analyses. The quality of the knowledge transfer between the physician and the patient is significantly associated with the components of SDM: information comprehension, patient involvement and decision certainty about the chosen treatment. In return, patient involvement in SDM is significantly associated with higher satisfaction and, as a result, lower anxiety as regards treatment selection. This study demonstrates the importance of involving patients in shared treatment decision making in the context of IBD. Understanding shared decision making may motivate patients to be more active in understanding the relevant information for treatment selection, as it is related to their level of satisfaction, anxiety and adherence to treatment. This relationship should encourage physicians to promote shared decision making. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O

    2011-01-01

    in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions...

  20. Efficacy and safety of tofacitinib in patients with active rheumatoid arthritis: review of key Phase 2 studies

    OpenAIRE

    Fleischmann, Roy; Kremer, Joel; Tanaka, Yoshiya; Gruben, David; Kanik, Keith; Koncz, Tamas; Krishnaswami, Sriram; Wallenstein, Gene; Wilkinson, Bethanie; Zwillich, Samuel H.; Keystone, Edward

    2016-01-01

    Abstract Tofacitinib is an oral Janus kinase inhibitor for the treatment of rheumatoid arthritis (RA). Here, the safety and efficacy data from five Phase 2 studies of tofacitinib in patients with RA are summarized. Tofacitinib 1?30 mg twice daily was investigated, as monotherapy and in combination with methotrexate, in patients with RA. Tofacitinib 20 mg once daily was investigated in one study. Tofacitinib 5 and 10 mg twice daily were selected for investigation in Phase 3 studies; therefore,...

  1. Quality of life of chronic myeloid leukemia patients in Brazil: ability to work as a key factor.

    Science.gov (United States)

    Hamerschlak, Nelson; de Souza, Carmino; Cornacchioni, Ana Lúcia; Pasquini, Ricardo; Tabak, Daniel; Spector, Nelson; Steagall, Merula

    2014-08-01

    The purpose of this study was to evaluate the quality of life (QOL) of patients receiving treatment by the public health system in Brazil for chronic myeloid leukemia (CML), a disease requiring daily and strict compliance to oral medication and regular blood and bone marrow controls, which are invasive exams. Between 2008 and 2010, patients with CML were surveyed by telephone. Quality of life was evaluated by the functional assessment of chronic illness therapy (FACIT) tool. The mean QOL among CML patients was 92.53 (out of 124 total points) in the trial outcome index, 78.50 (out of 108) in the general total score, and 130.43 (out of 176) in the leukemia total score. Patients who had the prescriptions recently changed anyway had better QOL general score (p = 0.012) and leukemia-specific score (p = 0.043) than those who remained with the same treatment. Imatinib was not associated with this change in QOL (p > 0.797). The more the patient felt able to work, the higher the scores in all three FACIT scales (p work, while chemotherapy (p = 0.017) and the use of hydroxyurea (p = 0.001) were inversely associated with work capability. A recent change in medication can improve quality of life. The ability to work is an important component of quality of life of patients with CML. Ability to work should be specifically considered in CML treatment.

  2. Key pharmacovigilance stakeholders' experiences of direct patient reporting of adverse drug reactions and their prospects of future development in the European Union.

    Science.gov (United States)

    Inácio, P; Cavaco, A; Allan, E; Airaksinen, M

    2018-02-01

    In the European Union (EU), legislation allows patients to directly report adverse drug reactions (ADRs) to competent authorities. Five years after its implementation, patient reporting is not equal in all countries. This study aimed to explore key stakeholders' perceptions of patient reporting in four EU countries. Qualitative study design. Twelve representatives from national pharmacovigilance centres and/or authorities as well as national pharmaceutical industry bodies in four EU countries participated in the study. Supranational organizations were also included. Data collection was via face-semi-structured interviews. Inductive content analysis was performed thereafter, applying principles of risk management as a theoretical framework. Four themes (attitudes and beliefs, system maturation factors, regulatory improvements, and cultural shifts) emerged, conceptually interconnected. Participants from countries introducing patient reporting recently expressed a negative attitude. Participants highlighted the need for additional resources, both human and financial, to address patient reporting and associated advantages. The findings identified perceived barriers and facilitators of patient reporting. The involvement of patients, use of information, and dissemination of patient reporting are far from optimal. A better integration of the work by EU regulatory authorities is recommended. Copyright © 2017 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  3. Key findings: a qualitative assessment of provider and patient perceptions of HIV/AIDS in South Africa.

    Science.gov (United States)

    Ransom, James; Johnson, Anton F

    2009-01-01

    In 1997, at the Davos International Economic Forum, Nelson Mandela stated that "the poor, the vulnerable, the unschooled, the socially marginalized, the women, and the children, those who bear the burden of colonial legacy-these are the sectors of society which bear the burden of AIDS" (Richter, 2001). Nearly a decade later, that statement still holds true, especially in Mr. Mandela's home country. South Africa continues to have one of the world's highest prevalence ratios of HIV infection (UNAIDS, 2002). This paper explores the significance of perceptions, knowledge, practices, and attitudes toward HIV/AIDS in two important groups in South Africa: health care providers based in public health clinics and their patients. This paper will assess the provider-patient interaction from the perspective of members of the South African HIV/AIDS treatment and prevention community. The analysis will examine the results of in-depth interviews and focus group discussions with providers and patients, respectively, in two of South Africa's nine provinces. Between December 2002 and April 2003 in Guateng and KwaZulu-Natal provinces, we conducted (1) in-depth interviews of a spectrum of health care providers at five local public health clinics and (2) focus groups of patients who patronize those clinics. The results show that there are gaps in the HIV/AIDS knowledge of some of the health care providers and that the participants' health beliefs and practices are embedded in the social conditions in which they live and work, which has a ripple effect on their risk behaviors and trumps any intervention messages from their health care providers and larger public health intervention messages.

  4. Gene expression profiles reveal key pathways and genes associated with neuropathic pain in patients with spinal cord injury.

    Science.gov (United States)

    He, Xijing; Fan, Liying; Wu, Zhongheng; He, Jiaxuan; Cheng, Bin

    2017-04-01

    Previous gene expression profiling studies of neuropathic pain (NP) following spinal cord injury (SCI) have predominantly been performed in animal models. The present study aimed to investigate gene alterations in patients with spinal cord injury and to further examine the mechanisms underlying NP following SCI. The GSE69901 gene expression profile was downloaded from the public Gene Expression Omnibus database. Samples of peripheral blood mononuclear cells (PBMCs) derived from 12 patients with intractable NP and 13 control patients without pain were analyzed to identify the differentially expressed genes (DEGs), followed by functional enrichment analysis and protein‑protein interaction (PPI) network construction. In addition, a transcriptional regulation network was constructed and functional gene clustering was performed. A total of 70 upregulated and 61 downregulated DEGs were identified in the PBMC samples from patients with NP. The upregulated and downregulated genes were significantly involved in different Gene Ontology terms and pathways, including focal adhesion, T cell receptor signaling pathway and mitochondrial function. Glycogen synthase kinase 3 β (GSK3B) was identified as a hub protein in the PPI network. In addition, ornithine decarboxylase 1 (ODC1) and ornithine aminotransferase (OAT) were regulated by additional transcription factors in the regulation network. GSK3B, OAT and ODC1 were significantly enriched in two functional gene clusters, the function of mitochondrial membrane and DNA binding. Focal adhesion and the T cell receptor signaling pathway may be significantly linked with NP, and GSK3B, OAT and ODC1 may be potential targets for the treatment of NP.

  5. If patient-reported outcome measures are considered key health-care quality indicators, who is excluded from participation?

    Science.gov (United States)

    Kroll, Thilo; Wyke, Sally; Jahagirdar, Deepa; Ritchie, Karen

    2014-10-01

    Patient-reported outcome measures have received increasing attention with regard to ensuring quality improvement across the health service. However, there is a risk that people with disabilities and low literacy are systematically excluded from the development of these measures as well as their application in clinical practice. This editorial highlights some of these risks and the potential consequences of exclusion for these groups. © 2012 John Wiley & Sons Ltd.

  6. PATIENT-REPORTED OUTCOMES IN RARE LYSOSOMAL STORAGE DISEASES: KEY INFORMANT INTERVIEWS AND A SYSTEMATIC REVIEW PROTOCOL.

    Science.gov (United States)

    Miller, Patricia A; Mulla, Sohail M; Adams-Webber, Thomasin; Sivji, Yasmin; Guyatt, Gordon H; Johnston, Bradley C

    2016-01-01

    To investigate the use, challenges and opportunities associated with using patient-reported outcomes (PROs) in studies with patients with rare lysosomal storage diseases (LSDs), we conducted interviews with researchers and health technology assessment (HTA) experts, and developed the methods for a systematic review of the literature. The purpose of the review is to identify the psychometrically sound generic and disease-specific PROs used in studies with patients with five LSDs of interest: Fabry, Gaucher (Type I), Niemann-Pick (Type B) and Pompe diseases, and mucopolysaccharidosis (Types I and II). Researchers and HTA experts who responded to an email invitation participated in a telephone interview. We used qualitative content analysis to analyze the anonymized transcripts. We conducted a comprehensive literature search for studies that used PROs to investigate burden of disease or to assess the impact of interventions across the five LSDs of interest. Interviews with seven researchers and six HTA experts representing eight countries revealed five themes. These were: (i) the importance of using psychometrically sound PROs in studies with rare diseases, (ii) the paucity of disease-specific PROs, (iii) the importance of having PRO data for economic analyses, (iv) practical and psychometric limitations of existing PROs, and (v) suggestions for new PROs. The systematic review has been completed. The interviews highlight current challenges and opportunities experienced by researchers and HTA experts involved in work with rare LSDs. The ongoing systematic review will highlight the experience, opportunities, and limitations of PROs in LSDs and provide suggestions for future research.

  7. Efficacy and safety of tofacitinib in patients with active rheumatoid arthritis: review of key Phase 2 studies.

    Science.gov (United States)

    Fleischmann, Roy; Kremer, Joel; Tanaka, Yoshiya; Gruben, David; Kanik, Keith; Koncz, Tamas; Krishnaswami, Sriram; Wallenstein, Gene; Wilkinson, Bethanie; Zwillich, Samuel H; Keystone, Edward

    2016-12-01

    Tofacitinib is an oral Janus kinase inhibitor for the treatment of rheumatoid arthritis (RA). Here, the safety and efficacy data from five Phase 2 studies of tofacitinib in patients with RA are summarized. Tofacitinib 1-30 mg twice daily was investigated, as monotherapy and in combination with methotrexate, in patients with RA. Tofacitinib 20 mg once daily was investigated in one study. Tofacitinib 5 and 10 mg twice daily were selected for investigation in Phase 3 studies; therefore, the efficacy and safety of tofacitinib 5 and 10 mg twice daily in Phase 2 studies are the focus of this review. Tofacitinib ≥ 5 mg twice daily was efficacious in a dose-dependent manner, with statistically significant and clinically meaningful reductions in the signs and symptoms of RA and patient-reported outcomes. The safety profile was consistent across studies. The efficacy and safety profile of tofacitinib in Phase 2 studies supported its further investigation and the selection of tofacitinib 5 mg twice daily and tofacitinib 10 mg twice daily for evaluation in Phase 3 studies. © 2016 The Authors. International Journal of Rheumatic Diseases published by Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  8. Patient radiation doses in therapeutic endoscopic retrograde cholangiopancreatography in Patras and the key role of the operator

    International Nuclear Information System (INIS)

    Hadjiconstanti, Anastasia C.; Messaris, Gerasimos A. T.; Panayiotakis, George S.; Thomopoulos, Konstantinos C.

    2017-01-01

    The patient radiation doses, in conjunction with the operator experience, in therapeutic endoscopic retrograde cholangiopancreatography (ERCP) procedures, performed in our hospital, were obtained. Ninety-six patients participated in the study and were divided into 3 groups, based on the operator experience. The dosimetric indices, fluoroscopy time (FT), cumulative dose (K a,r ) and air kerma-area product (P KA ), were collected. For the total and weight banding group the third quartile values of the distribution of FT, K a,r and P KA were 2.90 and 2.92 min, 6.89 and 6.93 mGy and 1.84 and 1.85 Gycm 2 , respectively, and were comparative or significantly lower than the corresponding values previously reported. Taking as a criterion the operator, the differences in the patient radiation doses were statistically significant, with the highest dose recorded for the operator of the lowest experience degree. The values obtained could contribute in establishing local and national diagnostic reference levels and in optimising ERCP procedure. (authors)

  9. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  10. Fat metaplasia and backfill are key intermediaries in the development of sacroiliac joint ankylosis in patients with ankylosing spondylitis

    DEFF Research Database (Denmark)

    Maksymowych, Walter P; Wichuk, Stephanie; Chiowchanwisawakit, Praveena

    2014-01-01

    step in this pathway. METHODS: We used the Spondyloarthritis Research Consortium of Canada (SPARCC) SI structural lesion score (SSS) method to assess fat metaplasia, erosions, backfill, and ankylosis on MRIs of the SI joints in 147 patients with AS monitored for 2 years. Univariate and multivariate...... regression analyses focused first on identifying significant MRI predictors of new backfill and fat metaplasia. We then assessed the role of backfill and fat metaplasia in the development of new ankylosis. All analyses were adjusted for demographic features, treatment, and baseline and 2-year change in SSS...

  11. Searching for a Role of Nursing Personnel in Developing Landscape of Ehealth: Factors Determining Attitudes toward Key Patient Empowering Applications.

    Science.gov (United States)

    Duplaga, Mariusz

    2016-01-01

    Nurses may play an important role in the delivery of medical services based on the use of ehealth tools. Nevertheless, their taking an active role in an ehealth environment depends on their possessing the appropriate skills and mindset. The main objective of this paper was to assess nurses' opinions and to analyze the predictors of their acceptance of ehealth features relevant to patient empowerment with a strong focus on chronic care. A survey was conducted among nurses from hospital centers of south-eastern Poland based on a questionnaire designed to assess their attitudes toward the ehealth domain. The predictors of the nurses' acceptance of ehealth usage within specific contexts were assessed with uni- and multivariate logistic regression. An analysis was performed on data from 648 questionnaires retained after a quality check. The duration of Internet use was consistently related to higher acceptance of ehealth applications and more certainty regarding the reliability of health-related information available on the Internet. Nurses from urban medical centers were more skeptical about the use of specific ehealth solutions. Previous experience in using information technologies is the main factor influencing the acceptance of specific ehealth solutions relevant for care provided to patients suffering from chronic conditions.

  12. Social Support: a Key Variable for Health Promotion and Chronic Disease Management in Hispanic Patients with Rheumatic Diseases

    Directory of Open Access Journals (Sweden)

    Alyssa T. Brooks

    2014-01-01

    Full Text Available Chronic diseases, including rheumatic diseases, can cause immense physical and psychosocial burden for patients. Many Hispanics suffering with arthritis face activity limitations. Social support, or the functional content of relationships, may be important to consider when examining treatment and outcomes for Hispanic individuals. Participants were recruited from an urban community health center (CHC as part of a larger health behavior study. A cross-sectional, descriptive, mixed methods analysis was conducted to explore the role of social support in the sample. Only Hispanic/Latino patients (n = 46 were included in this analysis. Interviews were conducted in both English and Spanish. The majority of the sample (87% perceived some presence of social support in their lives. The two most commonly cited types of social support were emotional and instrumental. The two most common sources of social support were family members other than spouses (52.2% and spouses (32.6%. Body mass index (BMI was significantly correlated with the number of perceived sources of support. The presence or absence and the role of social support in supporting optimal health outcomes should be considered for Hispanics with chronic rheumatic diseases. Involving family members and spouses in the plan of care for this population could facilitate health promotion and chronic disease management.

  13. Sleep disturbances and severe stress as glial activators: key targets for treating central sensitization in chronic pain patients?

    Science.gov (United States)

    Nijs, Jo; Loggia, Marco L; Polli, Andrea; Moens, Maarten; Huysmans, Eva; Goudman, Lisa; Meeus, Mira; Vanderweeën, Luc; Ickmans, Kelly; Clauw, Daniel

    2017-08-01

    The mechanism of sensitization of the central nervous system partly explains the chronic pain experience in many patients, but the etiological mechanisms of this central nervous system dysfunction are poorly understood. Recently, an increasing number of studies suggest that aberrant glial activation takes part in the establishment and/or maintenance of central sensitization. Areas covered: This review focused on preclinical work and mostly on the neurobiochemistry studied in animals, with limited human studies available. Glial overactivation results in a low-grade neuroinflammatory state, characterized by high levels of BDNF, IL-1β, TNF-α, which in turn increases the excitability of the central nervous system neurons through mechanisms like long-term potentiation and increased synaptic efficiency. Aberrant glial activity in chronic pain might have been triggered by severe stress exposure, and/or sleeping disturbances, each of which are established initiating factors for chronic pain development. Expert opinion: Potential treatment avenues include several pharmacological options for diminishing glial activity, as well as conservative interventions like sleep management, stress management and exercise therapy. Pharmacological options include propentofylline, minocycline, β -adrenergic receptor antagonists, and cannabidiol. Before translating these findings from basic science to clinical settings, more human studies exploring the outlined mechanisms in chronic pain patients are needed.

  14. Development and Monitoring the Key Performance Indicators of the Quality of Care for Patients with Cleft Lips/Palates at Srinagarind Hospital.

    Science.gov (United States)

    Mongkhonthawornchai, Siriporn; Pradubwong, Suteera; Augsornwan, Darawan; Pathumwiwatana, Pornpen; Sroyhin, Waranya; Pongpagatip, Sumalee; Wongkham, Jamras; Wachirapakorn, Jantira; Lao-unka, Kesorn; Mucnamporn, Tippawan; Chowchuen, Bowornsilp

    2015-08-01

    Congenital deformities, such as cleft lips and/or cleft palates (CLP), have high incidences in the Northeast of Thailand. These birth defects can affect patient's quality of life. CLP patients need crucial and long-term treatments by a multidisciplinary team starting from prenatal stage to late adulthood. Patients and their families should involve in their own care, and their care objectives should correspond with healthcare providers. Besides the clinical outcome of interdisciplinary team, key performance indicators (KPIs) need to be developed in the hospital service unit in order to improve quality of care and treatment outcomes. 1) to establish KPIs in hospital service units, and 2) to develop the information system to collect, analysis and improve the quality of CLP care. A nurse coordinator was appointed in the Tawanchai Center to coordinate care. The three periods were conducted for the nurse coordinator to work with nine service units in Srinagarind Hospital for consensus on both qualitative and quantitative data to be used as service unit quality measurement. Thirty one KPIs from nine service units were established, collected and analyzed during a four-month period in 2014. The 20 KPIs achieved the unit targets. Two PKIs of the rates of complication with anesthesia during/after surgery in the first 24 hours and the rates of patient/caregiver's satisfaction in acquiring information from the officer were improving. There were 11 KPIs that did not achieve the targets. The coordinator nurse of the Tawanchai Center discussed with the service unit for the cause and how to improve the outcome. The monitoring KPIs will lead to improvement of outcome for better patient quality as well as benchmarking with other hospitals of Cleft Center. The KPIs from hospital service units with the monitoring and analysis of information by the nurse coordinator will enhance and lead to improvement of the quality of the patients and family centered care process.

  15. Comparative Analysis of Interval, Skipped, and Key-vertebral Pedicle Screw Strategies for Correction in Patients With Lenke Type 1 Adolescent Idiopathic Scoliosis.

    Science.gov (United States)

    Wang, Fei; Xu, Xi-Ming; Lu, Yanghu; Wei, Xian-Zhao; Zhu, Xiao-Dong; Li, Ming

    2016-03-01

    Pedicle screw constructs have become the mainstay for surgical correction in patients with spinal deformities. To reduce or avoid the risk of pedicle screw-based complications and to decrease the costs associated with pedicle screw instrumentation, some authors have introduced interval, skipped, and key-vertebral pedicle screw strategies for correction. However, there have been no comparisons of outcomes among these 3 pedicle screw-placement strategies.The aim of this study was to compare the correlative clinical outcomes of posterior correction and fusion with pedicle screw fixation using these 3 surgical strategies.Fifty-six consecutive patients with Lenke type 1 adolescent idiopathic scoliosis were included in this study. Twenty patients were treated with the interval pedicle screw strategy (IPSS), 20 with the skipped pedicle screw strategy (SPSS), and 16 with the key-vertebral pedicle screw strategy (KVPSS). Coronal and sagittal radiographs were analyzed before surgery, at 1 week after surgery, and at the last follow-up after surgery.There were no significant differences among the 3 groups regarding preoperative radiographic parameters. No significant difference was found between the IPSS and SPSS groups in correction of the main thoracic curve (70.8% vs 70.0%; P = 0.524). However, there were statistically significant differences between the IPSS and KVPSS groups (70.8% vs 64.9%) and between the SPSS and KVPSS groups (70.0% vs 64.9%) in correction of the main thoracic curve (P SPSS group was significantly higher than those in the IPSS (P SPSS and KVPSS groups (P SPSS, it can achieve a satisfactory clinical outcome and is more cost-effective.

  16. A theory-based decision aid for patients with cancer: results of feasibility and acceptability testing of DecisionKEYS for cancer.

    Science.gov (United States)

    Hollen, Patricia J; Gralla, Richard J; Jones, Randy A; Thomas, Christopher Y; Brenin, David R; Weiss, Geoffrey R; Schroen, Anneke T; Petroni, Gina R

    2013-03-01

    Appropriate utilization of treatment is a goal for all patients undergoing cancer treatment. Proper treatment maximizes benefit and limits exposure to unnecessary measures. This report describes findings of the feasibility and acceptability of implementing a short, clinic-based decision aid and presents an in-depth clinical profile of the participants. This descriptive study used a prospective, quantitative approach to obtain the feasibility and acceptability of a decision aid (DecisionKEYS for Balancing Choices) for use in clinical settings. It combined results of trials of patients with three different common malignancies. All groups used the same decision aid series. Participants included 80 patients with solid tumors (22 with newly diagnosed breast cancer, 19 with advanced prostate cancer, and 39 with advanced lung cancer) and their 80 supporters as well as their physicians and nurses, for a total of 160 participants and 10 health professionals. The decision aid was highly acceptable to patient and supporter participants in all diagnostic groups. It was feasible for use in clinic settings; the overall value was rated highly. Of six physicians, all found the interactive format with the help of the nurse as feasible and acceptable. Nurses also rated the decision aid favorably. This intervention provides the opportunity to enhance decision making about cancer treatment and warrants further study including larger and more diverse groups. Strengths of the study included a theoretical grounding, feasibility testing of a practical clinic-based intervention, and summative evaluation of acceptability of the intervention by patient and supporter pairs. Further research also is needed to test the effectiveness of the decision aid in diverse clinical settings and to determine if this intervention can decrease overall costs.

  17. Six key topics informal carers of patients with breathlessness in advanced disease want to learn about and why: MRC phase I study to inform an educational intervention.

    Directory of Open Access Journals (Sweden)

    Morag Farquhar

    Full Text Available Breathlessness is a common symptom of advanced disease placing a huge burden on patients, health systems and informal carers (families and friends providing daily help and support. It causes distress and isolation. Carers provide complex personal, practical and emotional support yet often feel ill-prepared to care. They lack knowledge and confidence in their caring role. The need to educate carers and families about breathlessness is established, yet we lack robustly developed carer-targeted educational interventions to meet their needs.We conducted a qualitative interview study with twenty five purposively-sampled patient-carer dyads living with breathlessness in advanced disease (half living with advanced cancer and half with advanced chronic obstructive pulmonary disease (COPD. We sought to identify carers' educational needs (including what they wanted to learn about and explore differences by diagnostic group in order to inform an educational intervention for carers of patients with breathlessness in advanced disease.There was a strong desire among carers for an educational intervention on breathlessness. Six key topics emerged as salient for them: 1 understanding breathlessness, 2 managing anxiety, panic and breathlessness, 3 managing infections, 4 keeping active, 5 living positively and 6 knowing what to expect in the future. A cross-cutting theme was relationship management: there were tensions within dyads resulting from mismatched expectations related to most topics. Carers felt that knowledge-gains would not only help them to support the patient better, but also help them to manage their own frustrations, anxieties, and quality of life. Different drivers for education need were identified by diagnostic group, possibly related to differences in caring role duration and resulting impacts.Meeting the educational needs of carers requires robustly developed and evaluated interventions. This study provides the evidence-base for the content

  18. Dermatoglyphics and Cheiloscopy as Key Tools in Resolving the Genetic Correlation of Inheritance Patterns in Cleft Lip and Palate Patients: An Assessment of 160 Patients.

    Science.gov (United States)

    Singh, Priyankar; Nathani, Dipesh B

    2017-09-01

      The objective of this study was to correlate dermatoglyphics and cheiloscopy with genetic inheritance in cleft lip and cleft palate patients.   This was a case-control study to look for asymmetry in finger and lip print patterns. All of the participants were divided into two equal groups (40 mothers and 40 fathers in each group). The data were analyzed by three evaluators who were blind to the study to avoid any chances of error.   A sample of 160 sporadic participants were identified and evaluated. Group A was composed of 80 healthy parents not affected by cleft lip and cleft palate but had at least one child born with nonsyndromic cleft. Group B consisted of 80 healthy parents not affected by cleft lip and cleft palate and had healthy children without cleft lip and cleft palate.   Main outcome measures were marked dermatoglyphic asymmetry and specific lip print pattern in the study group.   We found marked asymmetry in various fingerprints and specific type II and type III lip print in the study group when compared with the control group. It was observed that groove count on the lip was significantly more frequent in study group parents.   Our study determined that there is a significant correlation between increased dermatoglyphic asymmetry and specific type II and type III lip print pattern in parents of children born with cleft. This could act as an important screening marker for the prediction of cleft lip and cleft palate inheritance.

  19. Ten key points for the appropriate use of antibiotics in hospitalised patients: a consensus from the Antimicrobial Stewardship and Resistance Working Groups of the International Society of Chemotherapy.

    Science.gov (United States)

    Levy Hara, Gabriel; Kanj, Souha S; Pagani, Leonardo; Abbo, Lilian; Endimiani, Andrea; Wertheim, Heiman F L; Amábile-Cuevas, Carlos; Tattevin, Pierre; Mehtar, Shaheen; Lopes Cardoso, Fernando; Unal, Serhat; Gould, Ian

    2016-09-01

    The Antibiotic Stewardship and Resistance Working Groups of the International Society for Chemotherapy propose ten key points for the appropriate use of antibiotics in hospital settings. (i) Get appropriate microbiological samples before antibiotic administration and carefully interpret the results: in the absence of clinical signs of infection, colonisation rarely requires antimicrobial treatment. (ii) Avoid the use of antibiotics to 'treat' fever: use them to treat infections, and investigate the root cause of fever prior to starting treatment. (iii) Start empirical antibiotic treatment after taking cultures, tailoring it to the site of infection, risk factors for multidrug-resistant bacteria, and the local microbiology and susceptibility patterns. (iv) Prescribe drugs at their optimal dosing and for an appropriate duration, adapted to each clinical situation and patient characteristics. (v) Use antibiotic combinations only where the current evidence suggests some benefit. (vi) When possible, avoid antibiotics with a higher likelihood of promoting drug resistance or hospital-acquired infections, or use them only as a last resort. (vii) Drain the infected foci quickly and remove all potentially or proven infected devices: control the infection source. (viii) Always try to de-escalate/streamline antibiotic treatment according to the clinical situation and the microbiological results. (ix) Stop unnecessarily prescribed antibiotics once the absence of infection is likely. And (x) Do not work alone: set up local teams with an infectious diseases specialist, clinical microbiologist, hospital pharmacist, infection control practitioner or hospital epidemiologist, and comply with hospital antibiotic policies and guidelines. Copyright © 2016. Published by Elsevier B.V.

  20. Ten key points for the appropriate use of antibiotics in hospitalised patients: a consensus from the Antimicrobial Stewardship and Resistance Working Groups of the International Society of Chemotherapy

    NARCIS (Netherlands)

    Hara, G. Levy; Kanj, S.S.; Pagani, L.; Abbo, L.; Endimiani, A.; Wertheim, H.F.L.; Amabile-Cuevas, C.; Tattevin, P.; Mehtar, S.; Cardoso, F.; Unal, S.; Gould, I.

    2016-01-01

    The Antibiotic Stewardship and Resistance Working Groups of the International Society for Chemotherapy propose ten key points for the appropriate use of antibiotics in hospital settings. (i) Get appropriate microbiological samples before antibiotic administration and carefully interpret the results:

  1. Perspectives of key stakeholders regarding task shifting of care for HIV patients in Mozambique: a qualitative interview-based study with Ministry of Health leaders, clinicians, and donors.

    Science.gov (United States)

    Rustagi, Alison S; Manjate, Rosa Marlene; Gloyd, Stephen; John-Stewart, Grace; Micek, Mark; Gimbel, Sarah; Sherr, Kenneth

    2015-04-01

    Task shifting is a common strategy to deliver antiretroviral therapy (ART) in resource-limited settings and is safe and effective if implemented appropriately. Consensus among stakeholders is necessary to formulate clear national policies that maintain high-quality care. We sought to understand key stakeholders' opinions regarding task shifting of HIV care in Mozambique and to characterize which specific tasks stakeholders considered appropriate for specific cadres of health workers. National and provincial Ministry of Health leaders, representatives from donor and non-governmental organizations (NGOs), and clinicians providing HIV care were intentionally selected to represent diverse viewpoints. Using open- and closed-ended questions, interviewees were asked about their general support of task shifting, its potential advantages and disadvantages, and whether each of seven cadres of non-physician health workers should perform each of eight tasks related to ART provision. Responses were tallied overall and stratified by current job category. Interviews were conducted between November 2007 and June 2008. Of 62 stakeholders interviewed, 44% held leadership positions in the Ministry of Health, 44% were clinicians providing HIV care, and 13% were donors or employed by NGOs; 89% held a medical degree. Stakeholders were highly supportive of physician assistants performing simple ART-related tasks and unanimous in opposing community health workers providing any ART-related services. The most commonly cited motives to implement task shifting were to increase ART access, decrease physician workload, and decrease patient wait time, whereas chief concerns included reduced quality of care and poor training and supervision. Support for task shifting was higher among clinicians than policy and programme leaders for three specific task/cadre combinations: general mid-level nurses to initiate ART in adults (supported by 75% of clinicians vs. 41% of non-clinicians) and in pregnant

  2. The key role of proinflammatory cytokines, matrix proteins, RANKL/OPG and Wnt/β-catenin in bone healing of hip arthroplasty patients.

    Science.gov (United States)

    Cassuto, Jean; Folestad, Agnetha; Göthlin, Jan; Malchau, Henrik; Kärrholm, Johan

    2018-02-01

    We still lack understanding of why some implants fail while most remain stable after decades of use. Proinflammatory cytokines, matrix proteins and bone regulating cytokines of the RANKL/OPG (receptor activator of nuclear factor kappa B ligand/osteoprotegerin) and Wnt/β-catenin pathways are mandatory for normal bone repair but their spatial and temporal role in the healing of primary total hip arthroplasties (THA) has not been previously shown. Twenty-four osteoarthritis patients with one-sided well-fixed primary THA were prospectively monitored during 18years (18Y) with repeated blood samples, clinical variables and radiographs. Eighty-one healthy donors divided in three age- and gender-matched groups and twenty osteoarthritis patients awaiting THA and serving as control of the validity of stored plasma in THA patients, were included. Plasma was analyzed for C-reactive protein (CRP), interleukin (IL)-6, IL-8, IL-1β, tumor necrosis factor (TNF)-α, osteopontin (OPN), secreted protein acidic and rich in cysteine (SPARC/osteonectin), osteocalcin (OC), bone specific alkaline phosphatase (BALP), N-terminal propeptide of collagen type I (P1NP), RANKL, OPG, the Wnt agonistic ligands (Wnt)-1 and Wnt-3a, and the Wnt antagonists sclerostin, Dickkopf (Dkk)-1, Dkk-3, Dkk-4, secreted frizzled related protein (sFRP)-1, sFRP-3 and Wnt inhibitory factor-1 (Wif-1). Inflammatory mediators in arthroplasty patients (CRP, IL-6, OPN) increased significantly on day one after surgery vs preoperative value (PR) and healthy subjects and returned to baseline at 6W. TNF-α did not change relative preoperative level or healthy subjects. SPARC and OC increased in a biphasic fashion with the primary phase beginning shortly after surgery and lasting 3M (SPARC) and 2Y (OC) while the secondary phase peaked at 1Y (SPARC) and 13Y (OC), with both returning to basal level at 15Y. BALP peaked at 3M after surgery with a return to basal level at 2Y followed by a continuous increase from 5Y until 18Y. P

  3. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  4. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  5. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  6. Initiation of antiretroviral therapy in patients with a CD4 count of less than 350 cells: a retrospective audit against key indicators from the CQUIN payment framework.

    Science.gov (United States)

    Mercer, R M; Olarinde, O; Ryan, C; Greig, J; Yeeles, H; Walker, A; Walker, H; Meardon, N C

    2011-12-01

    A proportion of funding for the South Yorkshire HIV Network is dependant on meeting the targets of the Commissioning for Quality and Innovation (CQUIN) payment framework. This states that 85% of patients with a CD4 count below 350 should be on antiretroviral therapy (ART). We also audited how many patients we started on treatment within six weeks. We found 88% of the 243 patients were on ART at the end of the audit, but significantly less had been started on treatment within six weeks of their CD4 count falling below 350. Although the target was achieved, there were patients who should be excluded as shown by other clinical guidelines, for example patients on treatment for tuberculosis. If these patients were excluded and the threshold level increased, it would help emphasize the at-risk patient group and lead to a fairer allocation of funding.

  7. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  8. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  9. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  10. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  11. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  12. Keys to successful diabetes self-management for uninsured patients: social support, observational learning, and turning points: a safety net providers' strategic alliance study.

    Science.gov (United States)

    Madden, Melissa Hanahan; Tomsik, Philip; Terchek, Joshua; Navracruz, Lisa; Reichsman, Ann; Clark, Terri Clemons; Cella, Peggi; Weirich, Stephen A; Munson, Michelle R; Werner, James J

    2011-03-01

    To examine how medically uninsured patients who receive health care at federally qualified health centers and free clinics are able to successfully self-manage diabetes compared to patients who are less successful. Two distinct groups of patients with diabetes for 6 months or longer were enrolled: (1) successful, defined as those with glycated hemoglobin (HbA1c) of 7% or less or a recent improvement of at least 2% (n=17); and (2) unsuccessful, defined as patients with HbAlc of at least 9% (n=9) and without recent improvement. Patients were interviewed about enabling factors, motivators, resources, and barriers to diabetes self-management. Data from interviews, chart reviews, and clinician surveys were analyzed using qualitative methods and statistical techniques. African Americans comprised 57.7% of the sample and whites 38.5% (N=26). No significant differences were detected between successful and unsuccessful groups in age, race, education, or employment status. Clinicians rated unsuccessful patients as having more severe diabetes and significantly lower levels of control than successful patients. Compared to unsuccessful patients, successful patients more often reported having friends or family with diabetes, more frequently sought information about the disease, used evidence-based self-management strategies, held more accurate perceptions of their own diabetes control, and experienced "turning point" events that motivated increased efforts in disease management. Patients who successfully managed diabetes learned from diabetic family members and interpreted disease-related events as motivational turning points. It may be beneficial to incorporate social learning and motivational enhancement into diabetes interventions to increase patients' motivation for improved levels of self-management.

  13. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  14. Network analysis of patient flow in two UK acute care hospitals identifies key sub-networks for A&E performance.

    Science.gov (United States)

    Bean, Daniel M; Stringer, Clive; Beeknoo, Neeraj; Teo, James; Dobson, Richard J B

    2017-01-01

    The topology of the patient flow network in a hospital is complex, comprising hundreds of overlapping patient journeys, and is a determinant of operational efficiency. To understand the network architecture of patient flow, we performed a data-driven network analysis of patient flow through two acute hospital sites of King's College Hospital NHS Foundation Trust. Administration databases were queried for all intra-hospital patient transfers in an 18-month period and modelled as a dynamic weighted directed graph. A 'core' subnetwork containing only 13-17% of all edges channelled 83-90% of the patient flow, while an 'ephemeral' network constituted the remainder. Unsupervised cluster analysis and differential network analysis identified sub-networks where traffic is most associated with A&E performance. Increased flow to clinical decision units was associated with the best A&E performance in both sites. The component analysis also detected a weekend effect on patient transfers which was not associated with performance. We have performed the first data-driven hypothesis-free analysis of patient flow which can enhance understanding of whole healthcare systems. Such analysis can drive transformation in healthcare as it has in industries such as manufacturing.

  15. Keys to Successful Diabetes Self-Management for Uninsured Patients: Social Support, Observational Learning, and Turning Points A Safety Net Providers’ Strategic Alliance Study

    Science.gov (United States)

    Hanahan, Melissa A.; Werner, James J.; Tomsik, Phillip; Weirich, Stephen A.; Reichsman, Ann; Navracruz, Lisa; Clemons-Clark, Terri; Cella, Peggi; Terchek, Joshua; Munson, Michelle R.

    2015-01-01

    Objective To determine how medically uninsured patients with limited material resources successfully manage diabetes. Methods Clinicians at 5 safety net practices enrolled uninsured adult patients (N=26) with prior diagnosis of diabetes for 6 months or longer. Patients were interviewed about enabling factors, motivations, resources, and barriers. Chart reviews and clinician surveys supplemented interview data. Interview, survey, and chart review data were analyzed and findings were summarized. Results Two distinct groups of patients were investigated: 1) “successful,” defined as those with an HbA1c of ≤7% or a recent improvement of at least 2% (n=17); and 2) “unsuccessful,” defined as patients with HbA1c of ≥9% (n=9) without recent improvement. In comparison to unsuccessful patients, successful patients more often reported having friends or family with diabetes, sought information about the disease, used evidence-based self-management strategies, held an accurate perception of their own disease control, and experienced “turning point” events that motivated increased efforts in disease management. Conclusions Uninsured safety net patients who successfully managed diabetes learned from friends and family with diabetes and leveraged disease-related events into motivational turning points. It may be beneficial for clinicians to incorporate social learning and motivational enhancement into diabetes interventions to increase patients’ motivation for improved levels of self-management. PMID:21671529

  16. A prominent lactate peak as a potential key magnetic resonance spectroscopy (MRS feature of progressive multifocal leukoencephalopathy (PML: Spectrum pattern observed in three patients

    Directory of Open Access Journals (Sweden)

    Duško Kozić

    2017-11-01

    Full Text Available Progressive multifocal leukoencephalopathy (PML is a rare, often fatal, opportunistic infection, associated with demyelinating process. PML is caused by John Cunningham (JC polyomavirus, and predominantly affects patients with human immunodeficiency virus (HIV infection or other immunocompromised patients. The purpose of this study was to determine the role of magnetic resonance spectroscopy (MRS in establishing the diagnosis of PML. MRS with long and short echo time was performed in two patients with PML associated with HIV infection and in one PML patient associated with chronic lymphocytic leukemia. The most prominent peak on the obtained spectra was for lactate; it showed 2-3 times higher concentration of lactate compared to choline, almost 4-6 times higher lactate concentration compared to creatine, and 4-11 times higher lactate in comparison to N-acetylaspartate concentration. Similar spectrum pattern was observed in all patients. To the best of our knowledge, this is a new finding that might be useful in early diagnosis of PML. Nevertheless, further confirmation of our results is needed, since we analyzed the spectrum pattern only in three patients. Overall, our results could help in early detection of PML, especially in non-HIV patients, and thus prevent the fatal outcome of the disease. MRS could also be useful in detecting “tumefactive” demyelinating lesions in PML patients, associated with immune reconstitution inflammatory syndrome, to avoid misdiagnosis of neoplasm.

  17. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  18. The role of compliance with PAP use on blood pressure in patients with obstructive sleep apnea: is longer use a key-factor?

    Science.gov (United States)

    Bouloukaki, I; Mermigkis, C; Tzanakis, N; Giannadaki, K; Mauroudi, E; Moniaki, V; Kallergis, E M; Schiza, S E

    2017-02-01

    Scientific data about the effects of positive airway pressure (PAP) treatment on blood pressure (BP) control are continuously increasing; however, they are controversial. We aimed to determine the long-term effects of compliance with PAP therapy on BP in both hypertensive and normotensive patients with obstructive sleep apnea-hypopnea syndrome (OSAHS). One thousand one hundred sixty eight consecutive patients with newly diagnosed OSAHS, who had been recommended PAP therapy, were followed up for a minimum of 2 years. Patients with previous cardiovascular disease were excluded. BP was measured at baseline and after 2 years of PAP treatment. In addition, the correlation between the changes in BP with different levels of PAP compliance was assessed. At the end of the follow-up period, in the hypertensive group of patients (n=586), a significant decrease was shown in systolic (-11.2 mm Hg, P<0.001) and diastolic BP (-4.2 mm Hg, P<0.001). Furthermore, in the patients without hypertension (n=528), a significant decrease was noted both in systolic and diastolic BP (-3.6, P<0.001 and -2.4, P<0.001, respectively). A correlation between the magnitude of change in systolic and diastolic BP and hours of use of PAP (r=0.14, P=0.002 and r=0.1, P=0.025, respectively) was observed in all patients. Long-term use of PAP treatment, as well as increased hours of PAP in patients with OSAHS use showed significant reductions in BP not only in patients with hypertension, but also in normotensive patients. Therefore a significant potential reduction in cardiovascular mortality and morbidity should be expected in these patients.

  19. Key interventions and quality indicators for quality improvement of STEMI care: a RAND Delphi survey.

    Science.gov (United States)

    Aeyels, Daan; Sinnaeve, Peter R; Claeys, Marc J; Gevaert, Sofie; Schoors, Danny; Sermeus, Walter; Panella, Massimiliano; Coeckelberghs, Ellen; Bruyneel, Luk; Vanhaecht, Kris

    2017-12-13

    Identification, selection and validation of key interventions and quality indicators for improvement of in hospital quality of care for ST-elevated myocardial infarction (STEMI) patients. A structured literature review was followed by a RAND Delphi Survey. A purposively selected multidisciplinary expert panel of cardiologists, nurse managers and quality managers selected and validated key interventions and quality indicators prior for quality improvement for STEMI. First, 34 experts (76% response rate) individually assessed the appropriateness of items to quality improvement on a nine point Likert scale. Twenty-seven key interventions, 16 quality indicators at patient level and 27 quality indicators at STEMI care programme level were selected. Eighteen additional items were suggested. Experts received personal feedback, benchmarking their score with group results (response rate, mean, median and content validity index). Consequently, 32 experts (71% response rate) openly discussed items with an item-content validity index above 75%. By consensus, the expert panel validated a final set of 25 key interventions, 13 quality indicators at patient level and 20 quality indicators at care programme level prior for improvement of in hospital care for STEMI. A structured literature review and multidisciplinary expertise was combined to validate a set of key interventions and quality indicators prior for improvement of care for STEMI. The results allow researchers and hospital staff to evaluate and support quality improvement interventions in a large cohort within the context of a health care system.

  20. Patient Engagement: The Key to Redesign the Exchange Between the Demand and Supply for Healthcare in the Era of Active Ageing.

    Science.gov (United States)

    Graffigna, Guendalina; Barello, Serena; Riva, Giuseppe; Bosio, A Claudio

    2014-01-01

    The last decades' changes in the epidemiological trends of chronic disease - also due to the ageing population - and the increased length and quality of life among the majority of Western population have introduced important changes in the organization and management of the healthcare systems. Consequently, health systems throughout the world are searching for new and effective ways to make their services more responsive to new patients and the public's health needs and demands. The idea of patient engagement - borrowed from the marketing conceptualization of consumer engagement - moves from the assumption that making patients/clients co-producers of their health can enhance their satisfaction with the healthcare system as well as their responsibility in both care and prevention by improving clinical outcomes and reducing health delivery costs. To make people aware of their health services options by supporting them in the decision-making process and to engage them in enacting preventive and healthy behaviors is vital for achieving successful health outcomes and preventing waste of resources. In this chapter, we outline a model (PHE model) that explains the patients' subjective experience with their health management process and the levers that may enact the passage from one phase of the process to the other. Based on this conceptual model of patient engagement will be proposed a tool kit of priority actions that may sustain the patient in its process of engagement.

  1. Real-imaging cDNA-AFLP transcript profiling of pancreatic cancer patients: Egr-1 as a potential key regulator of muscle cachexia

    Energy Technology Data Exchange (ETDEWEB)

    Skorokhod, Alexander [Division of Preventive Oncology, National Center for Tumor Diseases (NCT) Heidelberg, German Cancer Research Center (DKFZ), Im Neuenheimer Feld 581, 69120, Heidelberg (Germany); Institute of Molecular Biology and Genetics, Ukrainian Academy of Sciences, Zabolotnogo str. 150, 03143, Kiev (Ukraine); Bachmann, Jeannine [Department of Surgery, Klinikum rechts der Isar, Technische Universität München, Ismaninger Str. 22, 81675, Munich (Germany); Giese, Nathalia A [Department of General Surgery, University of Heidelberg, ImNeuenheimer Feld, 110 69120, Heidelberg (Germany); Martignoni, Marc E [Department of Surgery, Klinikum rechts der Isar, Technische Universität München, Ismaninger Str. 22, 81675, Munich (Germany); Krakowski-Roosen, Holger [Division of Preventive Oncology, National Center for Tumor Diseases (NCT) Heidelberg, German Cancer Research Center (DKFZ), Im Neuenheimer Feld 581, 69120, Heidelberg (Germany)

    2012-06-21

    Cancer cachexia is a progressive wasting syndrome and the most prevalent characteristic of cancer in patients with advanced pancreatic adenocarcinoma. We hypothesize that genes expressed in wasted skeletal muscle of pancreatic cancer patients may determine the initiation and severity of cachexia syndrome. We studied gene expression in skeletal muscle biopsies from pancreatic cancer patients with and without cachexia utilizing Real-Imaging cDNA-AFLP-based transcript profiling for genome-wide expression analysis. Our approach yielded 183 cachexia-associated genes. Ontology analysis revealed characteristic changes for a number of genes involved in muscle contraction, actin cytoskeleton rearrangement, protein degradation, tissue hypoxia, immediate early response and acute-phase response. We demonstrate that Real-Imaging cDNA-AFLP analysis is a robust method for high-throughput gene expression studies of cancer cachexia syndrome in patients with pancreatic cancer. According to quantitative RT-PCR validation, the expression levels of genes encoding the acute-phase proteins α-antitrypsin and fibrinogen α and the immediate early response genes Egr-1 and IER-5 were significantly elevated in the skeletal muscle of wasted patients. By immunohistochemical and Western immunoblotting analysis it was shown, that Egr-1 expression is significantly increased in patients with cachexia and cancer. This provides new evidence that chronic activation of systemic inflammatory response might be a common and unifying factor of muscle cachexia.

  2. Real-imaging cDNA-AFLP transcript profiling of pancreatic cancer patients: Egr-1 as a potential key regulator of muscle cachexia

    International Nuclear Information System (INIS)

    Skorokhod, Alexander; Bachmann, Jeannine; Giese, Nathalia A; Martignoni, Marc E; Krakowski-Roosen, Holger

    2012-01-01

    Cancer cachexia is a progressive wasting syndrome and the most prevalent characteristic of cancer in patients with advanced pancreatic adenocarcinoma. We hypothesize that genes expressed in wasted skeletal muscle of pancreatic cancer patients may determine the initiation and severity of cachexia syndrome. We studied gene expression in skeletal muscle biopsies from pancreatic cancer patients with and without cachexia utilizing Real-Imaging cDNA-AFLP-based transcript profiling for genome-wide expression analysis. Our approach yielded 183 cachexia-associated genes. Ontology analysis revealed characteristic changes for a number of genes involved in muscle contraction, actin cytoskeleton rearrangement, protein degradation, tissue hypoxia, immediate early response and acute-phase response. We demonstrate that Real-Imaging cDNA-AFLP analysis is a robust method for high-throughput gene expression studies of cancer cachexia syndrome in patients with pancreatic cancer. According to quantitative RT-PCR validation, the expression levels of genes encoding the acute-phase proteins α-antitrypsin and fibrinogen α and the immediate early response genes Egr-1 and IER-5 were significantly elevated in the skeletal muscle of wasted patients. By immunohistochemical and Western immunoblotting analysis it was shown, that Egr-1 expression is significantly increased in patients with cachexia and cancer. This provides new evidence that chronic activation of systemic inflammatory response might be a common and unifying factor of muscle cachexia

  3. Decision tree analyses of key patient characteristics in Middle Eastern/North African and Latin American men treated with long-acting and short-acting PDE5 inhibitors for erectile dysfunction.

    Science.gov (United States)

    Rubio-Aurioles, Eusebio; El-Meliegy, Amr; Abdulwahed, Samer; Henneges, Carsten; Sorsaburu, Sebastian; Gurbuz, Sirel

    2015-02-01

    Phosphodiesterase type 5 (PDE5) inhibitors have discontinuation rates as high as 60% in men with erectile dysfunction. Treatment satisfaction has been significantly associated with treatment continuation. Understanding key characteristics in terms of treatment preference, relationship, and lifestyle issues could provide direction on how to improve compliance with PDE5 inhibitor treatment globally. The objective was to identify subgroups of interest in the pooled database of two observational studies conducted in Latin America (LA) and Middle East/North Africa (MENA) exploring patient characteristics and prescription of either a long- or short-acting PDE5 inhibitor at baseline. Two identical prospective, non-interventional, observational, studies in MENA (N = 493) and LA (N = 511) treated men with an 'on demand' (pro re nata, PRN) PDE5 inhibitor (sildenafil, tadalafil, vardenafil, or lodenafil) during 6 months. In this post-hoc meta-analysis of two observational studies with equal design, pooled data were analyzed to determine patient characteristics and PDE5 inhibitor prescribed/used most likely to be associated with patient expectations, satisfaction, self-esteem, and patient-partner relationships. Decision tree analyses, with and without weighting, were used to identify and describe key features. In each analysis of patient expectations, patient-partner relationship, and self-esteem, we describe the two major subgroups at baseline for each decision tree. Analyses of patient expectations and sexual self-esteem revealed that patients prescribed long-acting PDE5 inhibitors (59%) highlighted the importance of treatment effect duration, second to partner satisfaction with treatment, while patients prescribed short-acting PDE5 inhibitors (32%) placed less importance on treatment effect duration but considerable importance on treatment effect lasting until intercourse completion. Further insights regarding patients, partner relationship characteristics, and

  4. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  5. Chronic lymphocytic thyroiditis (CLT) has a positive prognostic value in papillary thyroid cancer (PTC) patients: the potential key role of Foxp3+ T lymphocytes.

    Science.gov (United States)

    Pilli, T; Toti, P; Occhini, R; Castagna, M G; Cantara, S; Caselli, M; Cardinale, S; Barbagli, L; Pacini, F

    2017-12-11

    An impact of chronic lymphocytic thyroiditis (CLT) on papillary thyroid cancer (PTC) outcome has long been advocated but it is still controversial. The aim of this study was to evaluate the prognostic value of CLT in a retrospective cohort of PTC patients and to characterize the lymphocytic subpopulations and infiltrate (LI). We assessed 375 PTC patients, aged 45.2 ± 16.4 years, and treated with thyroidectomy and radioiodine remnant ablation, with a mean follow-up of 6.28 ± 3.86 years. In a subgroup of patients (n = 81) tissue sections were reviewed for the presence of CLT or lymphocytes associated with tumor in absence of background thyroiditis (TAL); cytotoxic CD8+/regulatory Foxp3+ T lymphocyte (CD8+/Foxp3+) ratio was characterized by immunohistochemistry: a low ratio is suggestive of a less effective anti tumor immune response. Seventy-five/375 patients (20%) had a histological diagnosis of CLT and showed at the last follow-up a significantly better outcome compared to those with no CLT (cure rate: 91.8 versus 76.3%, p = 0.003). LI was characterized in 81 PTC patients (24 with CLT and 57 with TAL): the peri-tumoral CD8+/Foxp3+ ratio was lower in patients not cured at the final evaluation. Our data suggest that concurrent CLT has a protective effect on PTC outcome and that the imbalance between cytotoxic and regulatory T lymphocytes in the peri-tumoral TAL may affect the tumor-specific immune response favoring a more aggressive behavior of cancer.

  6. The rarity of ALDH(+) cells is the key to separation of normal versus leukemia stem cells by ALDH activity in AML patients.

    Science.gov (United States)

    Hoang, Van T; Buss, Eike C; Wang, Wenwen; Hoffmann, Isabel; Raffel, Simon; Zepeda-Moreno, Abraham; Baran, Natalia; Wuchter, Patrick; Eckstein, Volker; Trumpp, Andreas; Jauch, Anna; Ho, Anthony D; Lutz, Christoph

    2015-08-01

    To understand the precise disease driving mechanisms in acute myeloid leukemia (AML), comparison of patient matched hematopoietic stem cells (HSC) and leukemia stem cells (LSC) is essential. In this analysis, we have examined the value of aldehyde dehydrogenase (ALDH) activity in combination with CD34 expression for the separation of HSC from LSC in 104 patients with de novo AML. The majority of AML patients (80 out of 104) had low percentages of cells with high ALDH activity (ALDH(+) cells; cells (≥1.9%; ALDH-numerous AML). In patients with ALDH-rare AML, normal HSC could be separated by their CD34(+) ALDH(+) phenotype, whereas LSC were exclusively detected among CD34(+) ALDH(-) cells. For patients with ALDH-numerous AML, the CD34(+) ALDH(+) subset consisted mainly of LSC and separation from HSC was not feasible. Functional analyses further showed that ALDH(+) cells from ALDH-numerous AML were quiescent, refractory to ARA-C treatment and capable of leukemic engraftment in a xenogenic mouse transplantation model. Clinically, resistance to chemotherapy and poor long-term outcome were also characteristic for patients with ALDH-numerous AML providing an additional risk-stratification tool. The difference in spectrum and relevance of ALDH activity in the putative LSC populations demonstrates, in addition to phenotypic and genetic, also functional heterogeneity of leukemic cells and suggests divergent roles for ALDH activity in normal HSC versus LSC. By acknowledging these differences our study provides a new and useful tool for prospective identification of AML cases in which separation of HSC from LSC is possible. © 2014 UICC.

  7. Social Support as a Key Protective Factor against Depression in HIV-Infected Patients: Report from large HIV clinics in Hanoi, Vietnam

    OpenAIRE

    Matsumoto, Shoko; Yamaoka, Kazue; Takahashi, Kenzo; Tanuma, Junko; Mizushima, Daisuke; Do, Cuong Duy; Nguyen, Dung Thi; Nguyen, Hoai Dung Thi; Nguyen, Kinh Van; Oka, Shinichi

    2017-01-01

    Depression is the most common mental health issue among people living with HIV/AIDS (PLWHA). This study explored how different types and sources of social support are associated with depression among HIV-infected patients in Vietnam. We carried out a cross-sectional survey on 1,503 HIV-infected patients receiving antiretroviral therapy at two HIV clinics in Hanoi in 2016. Depression was prevalent in 26.2% of participants. Higher score of social support, especially emotional/informational supp...

  8. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  9. Intake of key micronutrients and food groups in patients with late-stage age-related macular degeneration compared with age-sex-matched controls.

    Science.gov (United States)

    Gopinath, Bamini; Liew, Gerald; Russell, Joanna; Cosatto, Victoria; Burlutsky, George; Mitchell, Paul

    2017-08-01

    Knowledge of the risk factor profile of patients presenting with late-stage age-related macular degeneration (AMD) could help identify the most frequent modifiable AMD precursors among people who are referred for treatment. We aimed to assess dietary behaviours by comparing adjusted mean intakes of micronutrients and major food groups (fruits, vegetables, fish) among patients with AMD and a sample of age-sex-matched controls. Cross-sectional analysis of 480 late AMD cases and 518 population-based age-sex-matched controls with no AMD signs. AMD cases (aged 60+ years) were those presenting for treatment to a hospital eye clinic in Sydney, Australia, during 2012-2015. The comparator group were obtained from a cohort study (Blue Mountains Eye Study; Sydney, Australia) during 2002-2009. Dietary intake was assessed using a semiquantitative food-frequency questionnaire. AMD lesions were assessed from retinal photographs. After multivariable adjustment, patients with late-stage AMD compared with controls had significantly lower intakes of vitamin E (7.4 vs 9.8 mg/day; p<0.0001), beta-carotene (6232 vs 7738 μg/day; p<0.0001), vitamin C (161 vs 184 mg/day; p=0.0002) and folate (498.3 vs 602 μg/day; p<0.0001); but had higher intakes of zinc (13.0 vs 11.9 mg/day; p<0.0001). A significantly lower proportion of patients with late AMD met the recommended intake of vegetables than controls: 52.9% versus 64.5%; p=0.0002. This study showed significant differences in intakes of vitamins C and E, beta-carotene, folate and vegetables between patients with late-stage AMD and healthy controls, and thus has provided a better understanding of the nutritional intake of patients presenting with advanced AMD. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  10.  Patient safety in orthopedic surgery: prioritizing key areas of iatrogenic harm through an analysis of 48,095 incidents reported to a national database of errors

    Directory of Open Access Journals (Sweden)

    Panesar SS

    2013-03-01

    Full Text Available  Sukhmeet S Panesar,1 Andrew Carson-Stevens,2 Sarah A Salvilla,1 Bhavesh Patel,3 Saqeb B Mirza,4 Bhupinder Mann51Centre for Population Health Sciences, The University of Edinburgh, Edinburgh, UK; 2Institute of Primary Care and Public Health, Cardiff University, Cardiff, UK; 3National Patient Safety Agency, London, UK; 4Department of Trauma and Orthopaedic Surgery, University Hospital Southampton NHS Foundation Trust, Southampton General Hospital, Southampton, Hampshire, UK; 5Buckinghamshire Healthcare NHS Trust, Stoke Mandeville Hospital, Aylesbury, UKBackground: With scientific and technological advances, the practice of orthopedic surgery has transformed the lives of millions worldwide. Such successes however have a downside; not only is the provision of comprehensive orthopedic care becoming a fiscal challenge to policy-makers and funders, concerns are also being raised about the extent of the associated iatrogenic harm. The National Reporting and Learning System (NRLS in England and Wales is an underused resource which collects intelligence from reports about health care error.Methods: Using methods akin to case-control methodology, we have identified a method of prioritizing the areas of a national database of errors that have the greatest propensity for harm. Our findings are presented using odds ratios (ORs and 95% confidence intervals (CIs.Results: The largest proportion of surgical patient safety incidents reported to the NRLS was from the trauma and orthopedics specialty, 48,095/163,595 (29.4%. Of those, 14,482/48,095 (30.1% resulted in iatrogenic harm to the patient and 71/48,095 (0.15% resulted in death. The leading types of errors associated with harm involved the implementation of care and on-going monitoring (OR 5.94, 95% CI 5.53, 6.38; self-harming behavior of patients in hospitals (OR 2.14, 95% CI 1.45, 3.18; and infection control (OR 1.91, 95% CI 1.69, 2.17. We analyze these data to quantify the extent and type of iatrogenic

  11. Social Support as a Key Protective Factor against Depression in HIV-Infected Patients: Report from large HIV clinics in Hanoi, Vietnam.

    Science.gov (United States)

    Matsumoto, Shoko; Yamaoka, Kazue; Takahashi, Kenzo; Tanuma, Junko; Mizushima, Daisuke; Do, Cuong Duy; Nguyen, Dung Thi; Nguyen, Hoai Dung Thi; Nguyen, Kinh Van; Oka, Shinichi

    2017-11-14

    Depression is the most common mental health issue among people living with HIV/AIDS (PLWHA). This study explored how different types and sources of social support are associated with depression among HIV-infected patients in Vietnam. We carried out a cross-sectional survey on 1,503 HIV-infected patients receiving antiretroviral therapy at two HIV clinics in Hanoi in 2016. Depression was prevalent in 26.2% of participants. Higher score of social support, especially emotional/informational support and positive social interaction, showed significant association with lower depression rate. Although family was primary source of all types of social support, receiving emotional/informational support not only from family but also from outside of family correlated with a lower proportion of depression. In countries with constrained social resources and/or with family-oriented social structures, as in Vietnam, expanding social networks between HIV populations and society is a potentially important option for reducing depression.

  12. Targets, attitudes, and goals of psychiatrists treating patients with schizophrenia: key outcome drivers, role of quality of life, and place of long-acting antipsychotics

    Directory of Open Access Journals (Sweden)

    de Bartolomeis A

    2016-01-01

    Full Text Available Andrea de Bartolomeis,1 Andrea Fagiolini,2 Marco Vaggi,3 Claudio Vampini4 1Section of Psychiatry and Treatment Resistant Psychosis, Department of Neuroscience, University of Naples Federico II, Naples, Italy; 2Department of Molecular and Developmental Medicine, School of Medicine, University of Siena, Siena, Italy; 3Mental Health and Drug Addiction Department, Genovese, Genoa, Italy; 4Department of Mental Health, Ospedale Civile Maggiore and ULSS 20, Verona, Italy Purpose: This survey of Italian psychiatrists was conducted to better define drivers of schizophrenia treatment choice in real-life practice, particularly for use of long-acting injectable (LAI antipsychotics.Methods: Between October 15 and December 15, 2014, 1,000 surveys were sent to psychiatrists who treat schizophrenic patients; 709 completed questionnaires were analyzed (71% response rate.Results: The two most important factors determining therapy success were efficacy (75% of responses and tolerability (45% followed by global functioning (24% and quality of life (17%. LAI antipsychotics were most often used to facilitate regular treatment monitoring (49%, and 41% of psychiatrists thought that patients with low adherence who had failed oral therapy were well-suited for LAI antipsychotics. Only 4% of respondents saw LAI antipsychotics as appropriate for patients without other therapeutic options.Conclusion: Although efficacy and tolerability were the most common factors used to evaluate treatment success in schizophrenia, psychiatrists also consider QoL and global functioning to be important. Keywords: quality of life, long-acting injectable antipsychotics, schizophrenia, survey

  13. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  14. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  15. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  16. Prevalence pattern of key polymorphisms in the Vitamin D receptor gene among patients of Type 2 diabetes mellitus in Northeast India

    Directory of Open Access Journals (Sweden)

    Dipti Sarma

    2018-01-01

    Full Text Available Aims: To investigate the association between Vitamin D receptor gene polymorphisms (BsmI, TaqI and FokI and type 2 diabetes mellitus in patients in north eastern India. Settings and Design: This was a case control study with 40 cases of type 2 diabetes and 20 controls. Materials and Methods: Genomic DNA was extracted from blood and genotyped for the single nucleotide polymorphism (SNPs of BsmI [rs1544410], TaqI [rs731236] and FokI [rs2228570] by polymerase chain reaction and gene sequencing. Genotype distribution and allelic frequencies were compared between patients and controls. Data was expressed as mean ±standard deviation. Chi square test and t test were used to compare groups. Statistical analysis was done using SAS version 9.3 software. P value of <0.05 was considered significant. Results: Body weight and BMI were significantly associated with VDR polymorphisms BsmI and TaqI while BsmI was significantly associated with HbA1C. Vitamin D deficiency was significantly greater in cases than controls. The frequency of the heterozygous genotype of the BsmI polymorphism was significantly greater in type 2 diabetics than in controls. Conclusions: Vitamin D receptor polymorphisms are associated with type 2 diabetes in our population and require larger scale studies to be considered as possible risk factors or type 2 diabetes mellitus.

  17. Deriving common comorbidity indices from the MedDRA classification and exploring their performance on key outcomes in patients with rheumatoid arthritis.

    Science.gov (United States)

    Putrik, Polina; Ramiro, Sofia; Lie, Elisabeth; Michaud, Kaleb; Kvamme, Maria K; Keszei, Andras P; Kvien, Tore K; Uhlig, Till; Boonen, Annelies

    2018-03-01

    To develop algorithms for calculating the Rheumatic Diseases Comorbidity Index (RDCI), Charlson-Deyo Index (CDI) and Functional Comorbidity Index (FCI) from the Medical Dictionary for Regulatory Activities (MedDRA), and to assess how these MedDRA-derived indices predict clinical outcomes, utility and health resource utilization (HRU). Two independent researchers linked the preferred terms of the MedDRA classification into the conditions included in the RDCI, the CDI and the FCI. Next, using data from the Norwegian Register-DMARD study (a register of patients with inflammatory joint diseases treated with DMARDs), the explanatory value of these indices was studied in models adjusted for age, gender and DAS28. Model fit statistics were compared in generalized estimating equation (prediction of outcome over time) models using as outcomes: modified HAQ, HAQ, physical and mental component summary of SF-36, SF6D and non-RA related HRU. Among 4126 patients with RA [72% female, mean (s.d.) age 56 (14) years], median (interquartile range) of RDCI at baseline was 0.0 (1.0) [range 0-6], CDI 0.0 (0.0) [0-7] and FCI 0.0 (1.0) [0-6]. All the comorbidity indices were associated with each outcome, and differences in their performance were moderate. The RDCI and FCI performed better on clinical outcomes: modified HAQ and HAQ, hospitalization, physical and mental component summary, and SF6D. Any non-RA related HRU was best predicted by RDCI followed by CDI. An algorithm is now available to compute three commonly used comorbidity indices from MedDRA classification. Indices performed comparably well in predicting a variety of outcomes, with the CDI performing slightly worse when predicting outcomes reflecting functioning and health. © The Author 2017. Published by Oxford University Press on behalf of the British Society for Rheumatology. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  18. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  19. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  20. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  1. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  2. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  3. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  4. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  5. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  6. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  7. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  8. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  9. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  10. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  11. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  12. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  13. Key issues affecting quality of life and patient-reported outcomes in prostate cancer: an analysis conducted in 2128 patients with initial psychometric assessment of the prostate cancer symptom scale (PCSS).

    Science.gov (United States)

    Msaouel, Pavlos; Gralla, Richard J; Jones, Randy A; Hollen, Patricia J

    2017-09-01

    Evidence-based quality of life (QL) questionnaires require the identification of issues of importance to patients. The primary aim of this study was to inform providers on patient-expressed issues while enhancing the content validity of instruments assessing QL and patient-reported outcomes (PROs) in prostate cancer. The study provided additional psychometric properties for the new PRO and QL instrument, the Prostate Cancer Symptom Scale (PCSS). An anonymous web-based survey of 2128 patients with prostate cancer was conducted with patients rating 18 QL items on a five-point scale. Most respondents (74%) were aged 55-74 years, had early stage disease at diagnosis (81%) and were diagnosed within 2 years of the survey (81%). The top five-rated issues were: overall QL, ability to perform normal activities, maintaining independence, ability to sleep and not being a burden. These items were ranked as either 'very important' or 'important' by at least 88% of patients. None of the most highly ranked issues were symptoms. Instead, the highest ranked items were global issues reflecting the impact of symptoms on patients. In addition to the enhanced content validity findings, good reliability results and initial support for construct validity are reported for the PCSS. This is the largest survey providing patient-expressed background for content validity for QL and PRO measures. The findings of this study should aid development of newer practical questionnaires, such as the PCSS, which can be adapted to electronic platforms enhancing rapid and accurate PRO and QL evaluation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  14. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  15. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  16. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  17. [Clinical key points. Gonioscopy].

    Science.gov (United States)

    Hamard, P

    2007-05-01

    Gonioscopy should be performed in all patients with glaucoma or suspected of having glaucoma. Four points are systematically evaluated: the width of the angle, the degree of trabecular pigmentation, the iridotrabecular appositions or synechia, and the level of iris insertion and the shape of the peripheral iris profile.

  18. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  19. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  20. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  1. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  2. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  3. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  4. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  5. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  6. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  7. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  8. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  9. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  10. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  11. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  12. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  13. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  14. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  15. ClinicalKey: a point-of-care search engine.

    Science.gov (United States)

    Vardell, Emily

    2013-01-01

    ClinicalKey is a new point-of-care resource for health care professionals. Through controlled vocabulary, ClinicalKey offers a cross section of resources on diseases and procedures, from journals to e-books and practice guidelines to patient education. A sample search was conducted to demonstrate the features of the database, and a comparison with similar tools is presented.

  16. Accountability in district nursing practice: key concepts.

    Science.gov (United States)

    Griffith, Richard

    2015-03-01

    Public trust and confidence in district nurses is essential to the nurse-patient relationship that underpins effective care and treatment. That trust and confidence has even greater focus for district nurses who care for patients in their own homes. Those patients need to be able to count on the professionalism and probity of their district nurses. The professionalism and probity of district nurses is based on their accountability, which protects the public by imposing standards on district nurses and holds them answerable for their acts and omissions. This is the first of a series of articles on accountability in district nursing practice to mark the introduction of the revised Nursing and Midwifery Code on the 31 March 2015. This month's article considers the key concepts of accountability.

  17. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  18. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  19. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  20. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  1. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  2. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  3. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  4. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  5. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  6. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  7. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  8. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  9. Key issues for passive safety

    International Nuclear Information System (INIS)

    Hayns, M.R.

    1996-01-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ''review paper'' as such and only record the highlights. (author)

  10. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  11. Key issues for passive safety

    Energy Technology Data Exchange (ETDEWEB)

    Hayns, M R [AEA Technology, Harwell, Didcot (United Kingdom). European Institutions; Hicken, E F [Forschungszentrum Juelich GmbH (Germany)

    1996-12-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ``review paper`` as such and only record the highlights. (author).

  12. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  13. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  14. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  15. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  16. Key diagnostic information for the oncologist

    International Nuclear Information System (INIS)

    Zlatareva, D.

    2012-01-01

    Full text: The radiologists use many modalities for imaging of oncologic patients. In order to get the most out of these imaging studies oncologist have to provide with precise information: what is the working diagnosis, what treatment the patients has had and what is the clinical question should be answered by imaging study. The main indications for imaging are confirmation of diagnosis, evaluation of the patient for surgery or assessment of response to the therapy. These will influence the choice of the test, the protocol and interpretation of the results. Imaging plays a vital role in the management of patients with cancer. It is important not only for diagnosis, indicating sites of abnormality, and guiding biopsies, but it is also crucial in assessing disease extent and thereby determining treatment. The stage of cancer at the time of diagnosis is a key factor to define prognosis and is important element in determining appropriate treatment. The most clinically used cancer staging system is tumor node metastasis (TNM). Stage is determined from information on the tumor, regional nodes, and metastases and by grouping cases with similar prognosis. The criteria for defining anatomic extent of disease are specific for tumors at different anatomic sites and of different histologic types. Therefore, the criteria for T, N and M are defined separately for each tumor and histologic type. For Hodgkin and other lymphomas, a different system for the extent of disease and prognosis is used. It is mandatory for the radiologist to learn TNM system to provide the oncologist with key diagnostic information. Learning objectives: To understand TNM staging system for the most common malignancies To review the changes from the sixth to the seven edition of the American Joint committee on cancer staging manual To describe diagnostic information provided by CT and MRI in preoperative planning and after therapy To discuss the role of PET/CT imaging in oncology

  17. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  18. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  19. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory...... contributed by Scientific Officer Edgar Thielmann, DG TREN, Head of Department Hans Larsen, RisøNational Laboratory, Senior Asset Manager Aksel Hauge Pedersen, DONG VE, Consultant Timon Wehnert, IZT-Berlin, and Senior Scientist Martine Uyterlinde, ECN...

  20. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  1. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  2. Buffer management to solve bed-blocking in the Netherlands, 2000-2010. Cooperation from an integrated care chain perspective as a key success factor for managing patient flows.

    Directory of Open Access Journals (Sweden)

    Ingrid Mur

    2011-07-01

    Full Text Available Introduction: Bed-blocking problems in hospitals reflect how difficult and complex it is to move patients smoothly through the chain of care. In the Netherlands, during the first decade of the 21st century, some hospitals attempted to tackle this problem by using an Intermediate Care Department (ICD as a buffer for bed-blockers. However, research has shown that ICDs do not sufficiently solve the bed-blocking problem and that bed-blocking is often caused by a lack of buffer management.Tool: Buffer management (BM is a tool that endeavors to balance patient flow in the hospital to nursing home chain of care. Results: Additional research has indicated that the absence of BM is not the result of providers' thinking that BM is unnecessary, unethical or impossible because of unpredictable patient flows. Instead, BM is hampered by a lack of cooperation between care providers.Conclusion: Although stakeholders recognize that cooperation is imperative, they often fail to take the actions necessary to realize cooperation. Our assumption is that this lack of willingness and ability to cooperate is the result of several impeding conditions as well as stakeholders' perceptions of these conditions and the persistence of their current routines, principles and beliefs (RPBs.Discussion: We recommend simultaneously working on improving the conditions and changing stakeholders' perceptions and RPBs.

  3. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  4. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO 2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  5. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  6. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  7. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  8. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  9. Laparoscopic radical cystectomy: key points

    Directory of Open Access Journals (Sweden)

    D. V. Perlin

    2018-01-01

    Full Text Available Background. Radical cystectomy remains the golden standard for treatment of muscle invasive bladder cancer. Objective: to duplicate with highest accuracy the open radical cystectomy procedure, which we successfully utilized earlier in our clinic, in the of laparoscopic conditions in order to preserve the advantages of minimally invasive procedures and retain the reliability of the tried and tested open surgery.Materials and methods. In the report were included 35 patients (27 men and 8 women with bladder cancer, who underwent laparoscopic radical cystectomy in Volgograd Regional Center of Urology and Nephrology between April 2013 and March 2016. Only the patients who had been submitted to full intracorporal ileal conduits were included.Results. The mean operative time was 378 minutes, the mean blood loss was 285 millilitres, the mean length of hospital stay was 12.4 days, only 20 % of patients required the narcotic anesthetics. The postoperative complication rate was 11.4 %. However, the majority of the patients were successfully treated with minimally invasive procedures. Generally, our results were similar to other reported studies.Conclusion. Laparoscopic radical cystectomy is a safe and efficient modality of treatment of bladder cancer. However, it needs more procedures and longer observation period to establish laparoscopic radical cystectomy as an alternative to open radical cystectomy.

  10. An evaluation of dose/unit area and time as key factors influencing the elicitation capacity of methylchloroisothiazolinone/methylisothiazolinone (MCI/MI) in MCI/MI-allergic patients

    DEFF Research Database (Denmark)

    Zachariae, Claus; Lerbaek, Anne; McNamee, Pauline M

    2006-01-01

    Methylchloroisothiazolinone and methylisothiazolinone (MCI/MI) contact allergy affects 1-3% of patch-tested patients in European centres. The aim of the present study was to evaluate the importance of the factors--time and concentration (dose/per unit area)--in the elicitation capacity by means...... (2 p.p.m.) of MCI/MI/unit area of the skin for 4 weeks. After a wash-out period of at least 4 weeks, the subjects were exposed to 0.094 microg/cm2 (7.5 p.p.m.) of MCI/MI/unit area of the skin for 4 weeks. The study showed the importance of both time and exposure in the elicitation process...

  11. Careful assessment key in managing prostatitis.

    Science.gov (United States)

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  12. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  13. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  14. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  15. Quantum key distribution and cryptography

    International Nuclear Information System (INIS)

    Alleaume, R.

    2005-01-01

    Full text: Originally proposed by classical cryptographers, the ideas behind Quantum Key Distribution (QKD) have attracted considerable interest among the quantum optics community, which has significantly helped bring these ideas to reality. Experimental realizations have quickly evolved from early lab demonstrations to QKD systems that are now deployed in real conditions and targeting commercial applications. Although QKD can be theoretically proven to rely on 'unconditional security proofs' and should thus be able to provide security levels unachievable through computationally-based cryptographic techniques, the debate on the cryptographic applications of QKD remains somehow controversial. It seems that a consensus on that matter cannot be reached without a careful analysis of assumptions and definitions related to security models used in classical or in quantum cryptography. In this talk, we will try to present a comprehensive synthesis on this topic. We have initiated this work as a contribution to the European IP SECOQC project, confronting views and knowledge among experimental and theoretical quantum physicists, as well as classical cryptographers. (author)

  16. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  17. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  18. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  19. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  20. Quality of life and discriminating power of two questionnaires in fibromyalgia patients: fibromyalgia Impact Questionnaire and Medical Outcomes Study 36-Item Short-Form Health Survey A qualidade de vida e o poder de discriminação de dois questionários em pacientes com fibromialgia: fibromyalgia Impact Questionnaire e Medical Outcomes Study 36-Item Short-Form Health Survey

    Directory of Open Access Journals (Sweden)

    Ana Assumpção

    2010-08-01

    Full Text Available BACKGROUND: Fibromyalgia is a painful syndrome characterized by widespread chronic pain and associated symptoms with a negative impact on quality of life. OBJECTIVES: Considering the subjectivity of quality of life measurements, the aim of this study was to verify the discriminating power of two quality of life questionnaires in patients with fibromyalgia: the generic Medical Outcomes Study 36-Item Short-Form Health Survey (SF-36 and the specific Fibromyalgia Impact Questionnaire (FIQ. METHODS: A cross-sectional study was conducted on 150 participants divided into Fibromyalgia Group (FG and Control Group (CG (n=75 in each group. The participants were evaluated using the SF-36 and the FIQ. The data were analyzed by the Student t-test (α=0.05 and inferential analysis using the Receiver Operating Characteristics (ROC Curve - sensitivity, specificity and area under the curve (AUC. The significance level was 0.05. RESULTS: The sample was similar for age (CG: 47.8±8.1; FG: 47.0±7.7 years. A significant difference was observed in quality of life assessment in all aspects of both questionnaires (pCONTEXTUALIZAÇÃO: A fibromialgia é uma síndrome dolorosa caracterizada por dor espalhada e crônica e sintomas associados com um impacto negativo na qualidade de vida. OBJETIVOS: Considerando a subjetividade da mensuração de qualidade de vida, o objetivo deste estudo foi avaliar o poder de discriminação de dois questionários que avaliam a qualidade de vida de pacientes com fibromialgia: o genérico Medical Short Form Healthy Survey (SF-36 e o específico Questionário do Impacto da Fibromialgia (QIF. MÉTODOS: Foi conduzido um estudo transversal com 150 indivíduos, divididos em dois grupos: grupo fibromialgia (FM e grupo controle (GC (n=75 em ambos. Os pacientes foram avaliados pelo SF-36 e pelo QIF. Na análise dos dados, utilizou-se o teste "t de Student" com α=0,05 e a Curva ROC (Receiver Operating Characteristics Curve. RESULTADOS: As amostras

  1. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  2. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  3. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  4. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  5. Ten key elements for implementing interprofessional learning in ...

    African Journals Online (AJOL)

    This paper discusses 10 key elements for the design and implementation of interprofessional education (IPE) in a skills centre. The elements are based on published literature as well as on the experience of an IPE initiative, simulating the management of a multiple-traumatised patient in the acute and rehabilitation phases, ...

  6. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  7. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  8. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  9. Evidence-Based Clinical Decision: Key to Improved Patients Care ...

    African Journals Online (AJOL)

    ... materials remain limited to mostly developed countries. There is need to adopt measures to further facilitate dissemination of current information of effective health to care providers and policymakers in resource-poor countries. This review is aimed at re-enforcing the need for applying best-evidence into clinical practice

  10. Patient safety in a physics service medical. Checklist of key parameters to be revised before the dossier of the patient out of service; Seguridad del paciente en un servicio de fisica medica. Checklist de parametros clave a ser revisados antes de que el dossier del paciente salga del servicio

    Energy Technology Data Exchange (ETDEWEB)

    Font Gomez, J. A.; Gandia Martinez, A.; Jimenez Albericio, F. J.; Andres Redondo, M. M.; Mengual Gil, M. A.

    2013-07-01

    In aviation, operating rooms, etc. long checklists used parameters considered important / vital for review prior to the completion of work in the interest of safety. This ensures that any parameters key will be ignored by the computer so that it could cause future problems. (Author)

  11. Quality Management and Key Performance Indicators in Oncologic Esophageal Surgery.

    Science.gov (United States)

    Gockel, Ines; Ahlbrand, Constantin Johannes; Arras, Michael; Schreiber, Elke Maria; Lang, Hauke

    2015-12-01

    Ranking systems and comparisons of quality and performance indicators will be of increasing relevance for complex "high-risk" procedures such as esophageal cancer surgery. The identification of evidence-based standards relevant for key performance indicators in esophageal surgery is essential for establishing monitoring systems and furthermore a requirement to enhance treatment quality. In the course of this review, we analyze the key performance indicators case volume, radicality of resection, and postoperative morbidity and mortality, leading to continuous quality improvement. Ranking systems established on this basis will gain increased relevance in highly complex procedures within the national and international comparison and furthermore improve the treatment of patients with esophageal carcinoma.

  12. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  13. Key acceptability attributes of orodispersible films.

    Science.gov (United States)

    Scarpa, Mariagiovanna; Paudel, Amrit; Kloprogge, Frank; Hsiao, Wen Kai; Bresciani, Massimo; Gaisford, Simon; Orlu, Mine

    2018-04-01

    The features rendering orodispersible films (ODFs) patient-centric formulations are widely discussed in the scientific literature. However there is a lack of research studies exploring ODF characteristics with a potential impact on end-user acceptability. The aim of this study was to identify the key ODF characteristics affecting end-user acceptability by developing in vitro test methods for the prediction of ODFs acceptability and correlate these formulation characteristics with the data obtained from a human panel study. Four drug-free single-polymer films were prepared by solvent casting. Solutions of poly(vinyl) alcohol (PVOH) 39 KDa (P1), PVOH 197 KDa (P2), carboxymethylcellulose (CMC) 395 KDa (C1), and CMC 725 KDa (C2) were prepared. Texture analysis and Dynamic Mechanical Analysis (DMA) were used to assess film tack. Petri dish and drop methods were used to assess disintegration time. A human panel of 24 healthy young adults was employed to identify end-user acceptability criteria of the four study film samples. Texture analysis data of ODF tack were not found to be in agreement with the in vivo perceived stickiness in the mouth. However, measurement of the area under the adhesive force curve obtained by DMA correlated with in vivo perceived stickiness data for all samples. The disintegration times obtained by drop method were more comparable to human panel data than the petri dish method. Hence DMA and drop methods proved to be promising methodologies for the prediction of the end-user acceptability. The type and molecular weight of the film-forming polymer had a strong influence on stickiness perception, whereas only polymeric molecular weight influenced perceived disintegration time. The human panel study showed that Participant Reported Outcomes (PROs) for the perceived stickiness in the mouth and disintegration time of test films received significantly different scores between samples, and thus were identified as the key attributes with the

  14. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  15. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  16. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  17. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  18. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  19. EPA Monthly Key Performance Indicator Dashboards 2017

    Science.gov (United States)

    Each month, the Web Analytics Program posts updated Key Performance Indicator (KPI) dashboards that correspond to three Web performance goals: content consumption, content discovery, and audience engagement.

  20. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  1. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  2. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  3. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  4. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  5. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  6. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  7. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  8. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  9. Locks & keys service moves to building 55

    CERN Multimedia

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  10. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  11. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  12. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  13. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  14. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  15. Key elements of communication in cancer care.

    Science.gov (United States)

    Maex, E; De Valck, C

    2006-01-01

    In this chapter the "communication compass" is introduced. It defines the key elements of communication and provides a language with which to communicate about communication in cancer care. The communication compass consists of two axes. One axis defines the associated perspectives of the clinician and the patient, the other axis the content of information and emotional experience. "Two lovers sat on a park bench with their bodies touching each other, holding hands in the moonlight. There was silence between them. So profound was their love for each other, they needed no words to express it." (Samuel Johnson). Sometimes communication just flows. There are these special moments, as fleeting as they are intense. Often communication is stuck. It is as if we speak another language and never manage to understand one another. The lovers on the park bench need no words to express what they feel, neither do they need words to speak about communication. Where communication gets stuck, we need a suitable language to speak about communication. Professional communication cannot be learned from a cookbook. Most of all it implies a readiness to communicate, which means openness to the other. The old adage that it is impossible not to communicate is only true if no criterion of quality is applied. As soon as some mutual understanding is implied in the definition of communication, the fact that it is at all possible to communicate becomes a miracle. Since there is an important gap between theory and practice, we created a tool that aims to bridge that gap. We call it the communication compass. It does not propose a model of "ideal communication," but provides a language with which to examine and analyze specific situations and to determine what the pitfalls and possibilities are. It is useful as a tool for identifying communicational difficulties in daily clinical practice and it can serve as a model for training basic communication skills.

  16. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  17. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  18. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  19. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  20. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  1. Simple group password-based authenticated key agreements for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  2. Key Facts about Seasonal Flu Vaccine

    Science.gov (United States)

    ... Swine Variant Pandemic Other Key Facts About Seasonal Flu Vaccine Language: English (US) Español Recommend on Facebook ... the flu is to get vaccinated each year. Flu Vaccination Why should people get vaccinated against the ...

  3. China demonstrates intercontinental quantum key distribution

    Science.gov (United States)

    Johnston, Hamish

    2017-11-01

    A quantum cryptography key has been shared between Beijing and Vienna using a satellite - allowing the presidents of the Chinese Academy of Sciences and Austrian Academy of Sciences to communicate via a secure video link.

  4. Key Principles of Superfund Remedy Selection

    Science.gov (United States)

    Guidance on the primary considerations of remedy selection which are universally applicable at Superfund sites. Key guidance here include: Rules of Thumb for Superfund Remedy Selection and Role of the Baseline Risk Assessment.

  5. Key Royale bridge five year evaluation.

    Science.gov (United States)

    2013-06-01

    This report describes the design, construction, instrumentation, and five-year evaluation of the Key Royale Bridge substructure. The primary focus was the evaluation of the implementation of highly reactive supplementary cementitious materials (SCM) ...

  6. Keys to Successful EPIQ Business Demonstrator Implementation

    NARCIS (Netherlands)

    Shoikova, Elena; Denishev, Vladislav

    2009-01-01

    Shoikova, E., & Denishev, V. (2009). Keys to Successful EPIQ Business Demonstrator Implementation. Paper presented at the 'Open workshop of TENCompetence - Rethinking Learning and Employment at a Time of Economic Uncertainty-event'. November, 19, 2009, Manchester, United Kingdom: TENCompetence.

  7. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  8. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  9. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  10. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  11. Multipartite secret key distillation and bound entanglement

    International Nuclear Information System (INIS)

    Augusiak, Remigiusz; Horodecki, Pawel

    2009-01-01

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  12. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  13. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  14. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...

  15. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  16. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  17. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  18. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  19. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  20. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  1. The impact of {sup 18}F-FDG PET/CT in staging of non-small cell lung cancer patients: the key to improve patient treatment strategy; Impacto do {sup 18}F-FDG PET/CT no estadiamento de pacientes com cancer de pulmao: chave para melhorar o tratamento

    Energy Technology Data Exchange (ETDEWEB)

    Bretas, Gustavo Oliveira; Guedes, Juliana Barroso; Carvalho, Fernanda Monteiro Castro; Viana, Marcelo; Amaral, Nilson; Lewer, Marcelo Mamede, E-mail: golbretas@gmail.com [Prefeitura Municipal de Belo Horizonte, Posto de Saude, Belo Horizonte, MG (Brazil); Elcordis Centro de Diagnosticos Ltda., Contagem, MG (Brazil); Fundacao Hospitalar do Estado de Minas Gerais (FHEMIG), Belo Horizonte, MG (Brazil); Hospital Julia Kubistchek, Cirurgia Toracica, Belo Horizonte, MG (Brazil); Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Faculdade de Medicina. Departamento de Anatomia e Imagem

    2016-07-01

    Lung cancer leads the cause of cancer-related deaths in men and women around the world. The most common is non-small cell lung cancer (NSCLC). Fast and accurate staging is essential for choosing treatment for NSCLC. The positron emission tomography (PET) with {sup 18}F-fluorodeoxyglucose ({sup 18}F-FDG) can provide molecular and metabolic information, which acquired simultaneously with computed tomography (CT), has proved to be a very useful tool in the cancer diagnosis and staging. Identifying the stage of lung cancer is important to avoid unnecessary surgeries, reducing morbidity and treatment costs. This study aims to examine the impact of {sup 18}F-FDG PET/CT in the initial evaluation of patients with NSCLC in the Brazilian reality. Twenty-six patients with histopathologic diagnosis of NSCLC were included. They underwent staging in two separated moments: first with morphological images (x-ray and computed tomography scan) and after with {sup 18}F-FDG PET/CT. The performance of {sup 18}F-FDG PET/CT changed lymph node staging in around 30% of the patients initially classified as potentially operable, with high sensitivity and negative predictive values. Regarding the stage of metastasis, {sup 18}F-FDG PET/CT increased by 11.5% the detection of metastasis not previously detected. About the clinical staging, using the {sup 1}'8F-FDG PET/CT significantly reduced the number of patients classified as potentially operable in the early stages, avoiding the use of unnecessary thoracotomies in 19.2% of patients. The metabolic information obtained by {sup 18}F-FDG PET/CT demonstrated better accuracy when compared to anatomic methods in the detection of lymph node and distant metastases. Thus, having important impact on therapeutic strategy and treatment cost related. (author)

  2. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  3. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  4. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  5. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  6. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  7. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  8. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Science.gov (United States)

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  9. Metropolitan Quantum Key Distribution with Silicon Photonics

    Directory of Open Access Journals (Sweden)

    Darius Bunandar

    2018-04-01

    Full Text Available Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss. Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  10. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  11. Metropolitan Quantum Key Distribution with Silicon Photonics

    Science.gov (United States)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  12. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  13. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  14. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  15. The changing model of big pharma: impact of key trends.

    Science.gov (United States)

    Gautam, Ajay; Pan, Xiaogang

    2016-03-01

    Recent years have seen exciting breakthroughs in biomedical sciences that are producing truly novel therapeutics for unmet patient needs. However, the pharmaceutical industry is also facing significant barriers in the form of pricing and reimbursement, continued patent expirations and challenging market dynamics. In this article, we have analyzed data from the 1995-2015 period, on key aspects such as revenue distribution, research units, portfolio mix and emerging markets to identify four key trends that help to understand the change in strategic focus, realignment of R&D footprint, the shift from primary care toward specialty drugs and biologics and the growth of emerging markets as major revenue drivers for big pharma. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  16. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  17. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  18. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  19. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  20. Key characteristics of different management styles

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  1. Election 2000: The Keys Point to Gore.

    Science.gov (United States)

    Lichtman, Allan J.

    2000-01-01

    Asserts that Vice President Al Gore will be elected in 2000 based on the performance of the Clinton administration. Utilizes the key to the White House, 13 true-or-false diagnostic questions stated as propositions. If five or less are false then the party in power wins. (CMK)

  2. Radiology Aide. Instructor Key [and] Student Manual.

    Science.gov (United States)

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  3. Key Competences in vocational education and training

    DEFF Research Database (Denmark)

    Andersen, Ole Dibbern; Kruse, Katrine

    This article presents and discusses how key competences in the school based learning are embedded in the VET curricula during the last five years. It gives an overview of how their role has developed in light of the comprehensive Danish VET reform agreed in 2014 and implemented since August 2015....

  4. Memory for melody and key in childhood.

    Directory of Open Access Journals (Sweden)

    E Glenn Schellenberg

    Full Text Available After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  5. Secure Hybrid Encryption from Weakened Key Encapsulation

    NARCIS (Netherlands)

    D. Hofheinz (Dennis); E. Kiltz (Eike); A. Menezes

    2007-01-01

    textabstractWe put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that we propose. It

  6. Public-key encryption with chaos

    Science.gov (United States)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  7. Quantum key distribution on Hannover Campus

    Energy Technology Data Exchange (ETDEWEB)

    Duhme, Joerg; Franz, Torsten; Werner, Reinhard F. [Leibniz Universitaet Hannover, Institut fuer Theoretische Physik, AG Quanteninformation (Germany); Haendchen, Vitus; Eberle, Tobias; Schnabel, Roman [Albert Einstein Institut, Quantum Interferometry (Germany)

    2012-07-01

    We report on the progress of the implementation of an entanglement-based quantum key distribution on Hannover campus using squeezed gaussian states (continuous variables). This poster focuses on the theoretical aspects of the project. Experimental data has been compared with the theoretical simulation of the experimental setup. We especially discuss effects of the homodyne detection and postprocessing in use on the measurement outcome.

  8. Memory for melody and key in childhood.

    Science.gov (United States)

    Schellenberg, E Glenn; Poon, Jaimie; Weiss, Michael W

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  9. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation,

  10. Five Keys for Teaching Mental Math

    Science.gov (United States)

    Olsen, James R.

    2015-01-01

    After studying the Common Core State Standards for Mathematics (CCSSM) and brain-based learning research, James Olsen believes mental math instruction in secondary school mathematics (grades 7-12) and in teacher education programs needs increased attention. The purpose of this article is to share some keys for teaching mental math. Olsen also…

  11. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  12. Student Engagement: Key to Personalized Learning

    Science.gov (United States)

    Ferlazzo, Larry

    2017-01-01

    Personalized learning has the potential to greatly improve student achievement--but realistic teachers know that any instructional strategy will only be effective if students are willing to do the work. That is why Larry Ferlazzo emphasizes the importance of weaving intrinsic motivation into every personalized learning classroom. Four key elements…

  13. Time to refine key climate policy models

    Science.gov (United States)

    Barron, Alexander R.

    2018-05-01

    Ambition regarding climate change at the national level is critical but is often calibrated with the projected costs — as estimated by a small suite of energy-economic models. Weaknesses in several key areas in these models will continue to distort policy design unless collectively addressed by a diversity of researchers.

  14. The LOFAR Magnetism Key Science Project

    NARCIS (Netherlands)

    Anderson, James; Beck, Rainer; Bell, Michael; de Bruyn, Ger; Chyzy, Krzysztof; Eislöffel, Jochen; Enßlin, Torsten; Fletcher, Andrew; Haverkorn, Marijke; Heald, George; Horneffer, Andreas; Noutsos, Aris; Reich, Wolfgang; Scaife, Anna; the LOFAR collaboration, [No Value

    2012-01-01

    Measuring radio waves at low frequencies offers a new window to study cosmic magnetism, and LOFAR is the ideal radio telescope to open this window widely. The LOFAR Magnetism Key Science Project (MKSP) draws together expertise from multiple fields of magnetism science and intends to use LOFAR to

  15. Memory for melody and key in childhood

    Science.gov (United States)

    Poon, Jaimie; Weiss, Michael W.

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age. PMID:29077726

  16. Soil fauna: key to new carbon models

    NARCIS (Netherlands)

    Filser, Juliane; Faber, J.H.; Tiunov, Alexei V.; Brussaard, L.; Frouz, J.; Deyn, de G.B.; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, M.; Wall, D.H.; Querner, Pascal; Eijsackers, Herman; Jimenez, Juan Jose

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential

  17. Using USB Keys to Promote Mobile Learning

    Directory of Open Access Journals (Sweden)

    Marilyne Rosselle

    2009-07-01

    Full Text Available M-learning (i.e. mobile learning is a field of e-learning that provides learners learning environments using mobile technology. In this context, learning can take place anywhere and anytime, in open and distance learning. Depending on the type of technology it may be done through software called nomadic (i.e. prepared to mobility. Among these technologies, there are those composed of digital interfaces and with autonomy of treatment: Smartphone, PDA, calculator and even mp3 key. In this article we propose to take into account storage devices as mobile technologies. Our focus was on the USB key. We present a procedure to test whether a learning environment embarked on a USB key can be described as nomadic or not. This procedure has been tested on a sample of three ILE (Interactive Learning Environment. This approach has allowed us to define criteria of nomadism, criteria which were then included in the design of a synchronous Weblog on USB key.

  18. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  19. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key theore...

  20. Key Performance Indicators for Primary Schools.

    Science.gov (United States)

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  1. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  2. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  3. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  4. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  5. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  6. GLOBAL TRADE. THE KEY TO TRANSATLANTIC COMPETITIVENESS

    Directory of Open Access Journals (Sweden)

    Mădălina Laura CUCIURIANU

    2015-04-01

    Full Text Available Global trade has an important characteristic in terms of open global markets by means of eliminating barriers to trade and investment. The United States and the European Union, two major international actors and competitors in the economic field, have both the opportunity to change the global trade by concluding the negotiations of the Transatlantic Trade and Investment Partnership. For this reason, this paper tries to find the connections between global trade and transatlantic competitiveness in the way that the global trade can be considered a key to transatlantic competitiveness. The United States and the European Union are global actors and competitors in the global economy and the play field is the global trade. In order to be aware of the importance ofglobal trade in the transatlantic competitiveness, this paper includes also an analysis of the concrete actions that both economic powers are taking in key-sectors of the transatlantic economy.

  7. Quantum key distribution without alternative measurements

    CERN Document Server

    Cabello, A

    2000-01-01

    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator. (20 refs).

  8. Secure quantum key distribution using squeezed states

    International Nuclear Information System (INIS)

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  9. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  10. Key parameters analysis of hybrid HEMP simulator

    International Nuclear Information System (INIS)

    Mao Congguang; Zhou Hui

    2009-01-01

    According to the new standards on the high-altitude electromagnetic pulse (HEMP) developed by International Electrotechnical Commission (IEC), the target parameter requirements of the key structure of the hybrid HEMP simulator are decomposed. Firstly, the influences of the different excitation sources and biconical structures to the key parameters of the radiated electric field wave shape are investigated and analyzed. Then based on the influence curves the target parameter requirements of the pulse generator are proposed. Finally the appropriate parameters of the biconical structure and the excitation sources are chosen, and the computational result of the electric field in free space is presented. The results are of great value for the design of the hybrid HEMP simulator. (authors)

  11. A ''master key'' to chemical separation processes

    International Nuclear Information System (INIS)

    Madic, Ch.; Hill, C.

    2002-01-01

    One of the keys to sorting nuclear waste is extracting minor actinides - the most troublesome long-lived elements - from the flow of waste by separating them from lanthanides, which have very similar chemical properties to actinides, for possible transmutation into shorter-lived elements. Thanks to a European initiative coordinated by CEA, this key is now available: its name is Sanex. There now remains to develop tough, straightforward industrial processes to integrate it into a new nuclear waste management approach by 2005. Sanex joins the Diamex process, used for the combined separation of lanthanides and minor actinides from fission products. A third process, Sesame, designed to separate americium, completes the list of available separation processes. (authors)

  12. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  13. Molecular beam epitaxy applications to key materials

    CERN Document Server

    Farrow, Robin F C

    1995-01-01

    In this volume, the editor and contributors describe the use of molecular beam epitaxy (MBE) for a range of key materials systems that are of interest for both technological and fundamental reasons. Prior books on MBE have provided an introduction to the basic concepts and techniques of MBE and emphasize growth and characterization of GaAs-based structures. The aim in this book is somewhat different; it is to demonstrate the versatility of the technique by showing how it can be utilized to prepare and explore a range of distinct and diverse materials. For each of these materials systems MBE has played a key role both in their development and application to devices.

  14. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  15. Key Success Factors in Medical Tourism Marketing

    OpenAIRE

    Yung-Sheng Yang

    2013-01-01

    The planners in tourism businesses and medical institutes, the evaluation criteria and dimensions for Medical Tourism Marketing are determined by experts through expert interviews. The weights and correlations among the dimensions and criteria are determined by Analytic Hierarchy Process (AHP) to construct an evaluating indicator model suitable for Medical Tourism Marketing. By organizing the overall weight of the key success factors in Medical Tourism Marketing, the top five indicators conta...

  16. PROVIDING QUALITY – A KEY TO SUCCESS

    OpenAIRE

    Oana Staiculescu; Angel-Cristian Staiculescu

    2012-01-01

    Providing a high quality products and services is a key to business success. That is because high quality promotes customer satisfaction and customer satisfaction has a direct link to business revenue. Clients want quality products and services in order to feel they are getting value for money, especially in these hard economic times. Although it is well known that advertising may win new customers, quality can be the reason to keep them. A good manager is aware that the costs of winning mark...

  17. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  18. Key factors of teenagers' mobile advertising acceptance

    OpenAIRE

    Martí Parreño, José; Sanz Blas, Silvia; Ruiz Mafé, Carla; Aldás Manzano, Joaquín

    2013-01-01

    Purpose – The purpose of this paper is to analyse key drivers of teenagers’ attitude toward mobile advertising and its effects on teenagers’ mobile advertising acceptance. Design/methodology/approach – A proposed model of affective (irritation and entertainment) and cognitive (perceived usefulness) antecedents of attitude toward mobile advertising and its effects on mobile advertising acceptance is analysed. The sample consisted of 355 Spanish teenagers. The model was tested us...

  19. Key performance indicators for successful simulation projects

    OpenAIRE

    Jahangirian, M; Taylor, SJE; Young, T; Robinson, S

    2016-01-01

    There are many factors that may contribute to the successful delivery of a simulation project. To provide a structured approach to assessing the impact various factors have on project success, we propose a top-down framework whereby 15 Key Performance Indicators (KPI) are developed that represent the level of successfulness of simulation projects from various perspectives. They are linked to a set of Critical Success Factors (CSF) as reported in the simulation literature. A single measure cal...

  20. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  1. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  2. Parallel Device-Independent Quantum Key Distribution

    OpenAIRE

    Jain, Rahul; Miller, Carl A.; Shi, Yaoyun

    2017-01-01

    A prominent application of quantum cryptography is the distribution of cryptographic keys with unconditional security. Recently, such security was extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subsequent authors all require a sequential execution of N multiplayer games, where N is the security parame...

  3. Feasibility of satellite quantum key distribution

    OpenAIRE

    Bonato, Cristian; Tomaello, Andrea; Da Deppo, Vania; Naletto, Giampiero; Villoresi, Paolo

    2009-01-01

    In this paper we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected e...

  4. Review of key concepts in magnetic resonance physics

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Michael M. [Penn State Hershey Children' s Hospital, Department of Radiology, The Pennsylvania State College of Medicine, Hershey, PA (United States); Chung, Taylor [UCSF Benioff Children' s Hospital Oakland, Department of Diagnostic Imaging, Oakland, CA (United States)

    2017-05-15

    MR physics can be a challenging subject for practicing pediatric radiologists. Although many excellent texts provide very comprehensive reviews of the field of MR physics at various levels of understanding, the authors of this paper explain several key concepts in MR physics that are germane to clinical practice in a non-rigorous but practical fashion. With the basic understanding of these key concepts, practicing pediatric radiologists can build on their knowledge of current clinical MR techniques and future advances in MR applications. Given the challenges of both the increased need for rapid imaging in non-sedated children and the rapid physiological cardiovascular and respiratory motion in pediatric patients, many advances in complex MR techniques are being applied to imaging these children. The key concepts are as follows: (1) structure of a pulse sequence, (2) k-space, (3) ''trade-off triangle'' and (4) fat suppression. This review is the first of five manuscripts in a minisymposium on pediatric MR. The authors' goal for this review is to aid in understanding the MR techniques described in the subsequent manuscripts on brain imaging and body imaging in this minisymposium. (orig.)

  5. Review of key concepts in magnetic resonance physics.

    Science.gov (United States)

    Moore, Michael M; Chung, Taylor

    2017-05-01

    MR physics can be a challenging subject for practicing pediatric radiologists. Although many excellent texts provide very comprehensive reviews of the field of MR physics at various levels of understanding, the authors of this paper explain several key concepts in MR physics that are germane to clinical practice in a non-rigorous but practical fashion. With the basic understanding of these key concepts, practicing pediatric radiologists can build on their knowledge of current clinical MR techniques and future advances in MR applications. Given the challenges of both the increased need for rapid imaging in non-sedated children and the rapid physiological cardiovascular and respiratory motion in pediatric patients, many advances in complex MR techniques are being applied to imaging these children. The key concepts are as follows: (1) structure of a pulse sequence, (2) k-space, (3) "trade-off triangle" and (4) fat suppression. This review is the first of five manuscripts in a minisymposium on pediatric MR. The authors' goal for this review is to aid in understanding the MR techniques described in the subsequent manuscripts on brain imaging and body imaging in this minisymposium.

  6. Interactive simulations for quantum key distribution

    International Nuclear Information System (INIS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels. (paper)

  7. Interactive simulations for quantum key distribution

    Science.gov (United States)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  8. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  9. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  10. Commitment is the key to these accounts

    International Nuclear Information System (INIS)

    Yborra, S.

    1996-01-01

    Key accounts--A.G.A.'s name for regional and national multi-unit accounts--affect gas load and market share in several ways. Many make their equipment and energy policies and decisions at the corporate or regional level, making gas company sales and marketing efforts to them critical, since multiple installations will likely emanate from a single decision. To survive, chains often mimic each other; a money-saving idea implemented by one chain can lead to others in that market sector copying it. A successful equipment field trial with one of these accounts can lead to others following suit. Chains also can play a critical role in launching a new or emerging technology. It a gas equipment test demonstrate meets the chain's energy goals, it can lead to a significant number of orders, accelerating a product's market penetration, improving manufacturing economies of scale, lowering prices and speeding up delivery times. A.G.A.'s key-accounts program's marketing activities fall into three basic categories: assisting chain clients, either directly or through members; enhancing members' key-account program development through training and networking; and increasing chains' awareness of the benefits of gas energy, equipment and services through national forums such as trade expos, seminars, conferences and press exposure

  11. Benchmarking Organisational Capability using The 20 Keys

    Directory of Open Access Journals (Sweden)

    Dino Petrarolo

    2012-01-01

    Full Text Available Organisations have over the years implemented many improvement initiatives, many of which were applied individually with no real, lasting improvement. Approaches such as quality control, team activities, setup reduction and many more seldom changed the fundamental constitution or capability of an organisation. Leading companies in the world have come to realise that an integrated approach is required which focuses on improving more than one factor at the same time - by recognising the importance of synergy between different improvement efforts and the need for commitment at all levels of the company to achieve total system-wide improvement.

    The 20 Keys approach offers a way to look at the strenqth of organisations and to systemically improve it, one step at a time by focusing on 20 different but interrelated aspects. One feature of the approach is the benchmarking system which forms the main focus of this paper. The benchmarking system is introduced as an important part of the 20 Keys philosophy in measuring organisational strength. Benchmarking results from selected South African companies are provided, as well as one company's results achieved through the adoption of the 20 Keys philosophy.

  12. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  13. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  14. Quantum key distribution with entangled photon sources

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-01-01

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses

  15. Key-data of energy (June 2001)

    International Nuclear Information System (INIS)

    2001-06-01

    The energy actors and the economical context of energy are changing: the world exchanges and the deregulation of markets impose to dispose of reliable and relevant indicators to understand the French energy choices and stakes and to compare them with the European and worldwide data. This 2001 edition of the key energy data of France aims at shading light on the French energy policy which is based on: an imperative of supply security, an abatement of CO 2 emissions and a respect of environment, a growth of the economic competitiveness, a maintenance of the public utility missions, and on employment. Graphs, curves, charts and appendixes illustrate and complete this document. (J.S.)

  16. Data key to quest for quality.

    Science.gov (United States)

    Chang, Florence S; Nielsen, Jon; Macias, Charles

    2013-11-01

    Late-binding data warehousing reduces the time it takes to obtain data needed to make crucial decisions. Late binding refers to when and how tightly data from the source applications are bound to the rules and vocabularies that make it useful. In some cases, data can be seen in real time. In historically paper-driven environments where data-driven decisions may be a new concept, buy-in from clinicians, physicians, and hospital leaders is key to success in using data to improve outcomes.

  17. Stahlschüssel key to steel

    CERN Document Server

    Wegst, W S

    2016-01-01

    The Key to Steel (Stahlschlüssel/Stahlschluessel) cross reference book will help you to decode / decipher steel designations and find equivalent materials worldwide. The 2016 edition includes more than 70,000 standard designations and trade names from approximately 300 steelmakers and suppliers. Presentation is trilingual: English, French, and German. Materials covered include structural steels, tool steels, valve steels, high temperature steels and alloys, stainless and heat-resisting steels, and more. Standards and designations from 25 countries are cross-referenced.

  18. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman

    2012-01-01

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  19. Key Developments in Ionic Liquid Crystals

    OpenAIRE

    Fernandez, A.A.; Kouwer, P.H.J.

    2016-01-01

    Ionic liquid crystals are materials that combine the classes of liquid crystals and ionic liquids. The first one is based on the multi-billion-dollar flat panel display industry, whilst the latter quickly developed in the past decades into a family of highly-tunable non-volatile solvents. The combination yields materials with a unique set of properties, but also with many challenges ahead. In this review, we provide an overview of the key concepts in ionic liquid crystals, particularly from a...

  20. NCAP projection displays: key issues for commercialization

    Science.gov (United States)

    Tomita, Akira; Jones, Philip J.

    1992-06-01

    Recently there has been much interest in a new polymer nematic dispersion technology, often called as NCAP, PDLC, PNLC, LCPC, etc., since projection displays using this technology have been shown to produce much brighter display images than projectors using conventional twisted nematic (TN) lightvalves. For commercializing projection displays based on this polymer nematic dispersion technology, the new materials must not only meet various electro- optic requirements, e.g., operational voltage, `off-state'' scattering angle, voltage holding ratio and hysteresis, but must also be stable over the lifetime of the product. This paper reports recent progress in the development of NCAP based projection displays and discusses some of the key commercialization issues.

  1. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...... in the case the adversary is granted access to partial information about the secret state of the primitive. To do so, we work in an extension of the standard black-box model, a new framework where possible leakage from the secret state is taken into account. In particular, we give the first construction...

  2. Ocean energy: key legal issues and challenges

    International Nuclear Information System (INIS)

    Wright, Glen; Rochette, Julien; O'Hagan, Anne Marie; De Groot, Jiska; Leroy, Yannick; Soininen, Niko; Salcido, Rachael; Castelos, Montserrat Abad; Jude, Simon; Kerr, Sandy

    2015-01-01

    Ocean energy is a novel renewable energy resource being developed as part of the push towards a 'Blue Economy'. The literature on ocean energy has focused on technical, environmental, and, increasingly, social and political aspects. Legal and regulatory factors have received less attention, despite their importance in supporting this new technology and ensuring its sustainable development. In this Issue Brief, we set out some key legal challenges for the development of ocean energy technologies, structured around the following core themes of marine governance: (i) international law; (ii) environmental impacts; (iii) rights and ownership; (iv) consenting processes; and (v) management of marine space and resources. (authors)

  3. 5 keys to business analytics program success

    CERN Document Server

    Boyer, John; Green, Brian; Harris, Tracy; Van De Vanter, Kay

    2012-01-01

    With business analytics is becoming increasingly strategic to all types of organizations and with many companies struggling to create a meaningful impact with this emerging technology, this work-based on the combined experience of 10 organizations that display excellence and expertise on the subject-shares the best practices, discusses the management aspects and sociology that drives success, and uncovers the five key aspects behind the success of some of the top business analytics programs in the industry. Readers will learn about numerous topics, including how to create and manage a changing

  4. Local innovation: The key to globalisation

    Directory of Open Access Journals (Sweden)

    Srivardhini K. Jha

    2013-12-01

    Full Text Available The round table discussion draws the panellists to weigh in on how multinational enterprises from developed countries are innovating in and for emerging markets, the challenges faced, and lessons learnt. The key takeaways are that MNEs are increasingly innovating for the Indian market, alongside their contribution to global products. They are doing so by developing close relationships with field facing organisations, co-creating with customers, empowering engineers, and taking a clean slate approach to product development. This approach has given them dividends not only in the local market but also in the global market.

  5. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  6. Geotechnics - the key to ground water protection

    DEFF Research Database (Denmark)

    Baumann, Jens; Foged, Niels; Jørgensen, Peter

    2000-01-01

    During the past 5 to 10 years research into ground water protection has proved that fractures in clay till may increase the hydraulic conductivity and herby the vulnerability of the ground water considerably. However, research has not identified a non-expensive and efficient method to map...... the fracture conditions of the various clay tills. Tests performed at the Danish Geotechnical Institute with large undisturbed columns of clay till show that there is a relation between the strength of the clay till and the hydraulic conductivity. Geotechnical methods may therefore be the key to determine...

  7. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Directory of Open Access Journals (Sweden)

    Hyunsung Kim

    2014-12-01

    Full Text Available The digitization of patient health information (PHI for wireless health monitoring systems (WHMSs has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient’s PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient’s privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  8. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  9. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  10. Il governo della performance dei processi di business : dai Key Performance Indicators ai Key Risk Indicators

    OpenAIRE

    Sergio Beretta; Saverio Bozzolan

    2013-01-01

    The recent paper issued by COSO ["Developing Key Risk Indicators to Strengthen Enterprise Risk Management" (Coso, 2010)] is the starting point of this article whose aim is to discuss the relevance of the business process dimension in the design and implementation of Key Risk Indicators. The Authors analyze the reasons of the systematic underestimation of the business process dimension in the COSO papers and debate the implications that the explicit consideration of the business process dimens...

  11. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  12. Fully Device-Independent Quantum Key Distribution

    Science.gov (United States)

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  13. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    Directory of Open Access Journals (Sweden)

    Doris Yohanna Martínez Castrillón

    2016-07-01

    Full Text Available This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable performance , for it has been consulted theoretical references of Marketing as a management partner with collection and integration of data. Methodologically, it is located within the type of descriptive research field, with a design of transactional non-experimental, with an intentional non-probabilistic stratified sample of four reporting units. The findings established fifteen (15 points of influence called "key success factors (FCE in the area of marketing, and managerial allies of service companies in the security, surveillance and protection sector in industrial, commercial and residential sectors. Finally, it is intended that the actions of marketing service companies should focus to the welfare of both the organization, such as users, both in the environment, and economic, social and technological, characterized by ethics, sustainable development and transparency to respond appropriately.

  14. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  15. Keys of educational change in Ecuador

    Directory of Open Access Journals (Sweden)

    Agustín De la Herrán Gascón

    2018-01-01

    Full Text Available The article analyzes the educational system in Ecuador. The Ecuadorian education system arouses international interest, especially in Latin America. In this essay we will try to answer these questions: What might be the relevant keys from the public education in Ecuador? Why has it reached its present level of development, particularly in inclusive education? What fundaments and policies are behind the results of the goals from Education for All (EFA 2000-2015 From the Dakar framework for Action? (World Education Forum, 2000. In light of these issues, the goal is to understand key factors and reasons that have contributed to the development of the Ecuadorian public education. In terms of methodology, the approach is qualitative, dialectical, documentary and descriptive (Mc Millan and Schumacher, 2005. The research is proposed as a case study, where the choice of the case is justified by its novelty, its degree of development and its emphasis on inclusion and equity in all educational levels. With this aim, it is made a descriptive analysis of the rules underlying the changes in the educational system in Ecuador in the last three decades and it is carried out, particularly since 2008, following the last Constitution (Constituent Assembly, 2008. Tables as an analytical contribution of the authors are offered. Also data endorsed by authors and agencies of maximum national and international prestige are detailed and they realize the effectiveness of policies and such changes.

  16. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  17. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.; Ferreira, Luciana C.; Sequeira, Ana M.M.; Meekan, Mark G.; Duarte, Carlos M.; Bailey, Helen; Bailleul, Fred; Bowen, W. Don; Caley, M. Julian; Costa, Daniel P.; Eguí luz, Victor M.; Fossette, Sabrina; Friedlaender, Ari S.; Gales, Nick; Gleiss, Adrian C.; Gunn, John; Harcourt, Rob; Hazen, Elliott L.; Heithaus, Michael R.; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L.; Lowe, Christopher G.; Madsen, Peter T.; Marsh, Helene; Phillips, Richard A.; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A.; Simpfendorfer, Colin A.; Sims, David W.; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N.; Wikelski, Martin; Womble, Jamie N.; Thums, Michele

    2016-01-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  18. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  19. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  20. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  1. Talent Management: Working lines and key processes

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  2. Clinical transformation: the key to green nephrology.

    Science.gov (United States)

    Connor, Andrew; Mortimer, Frances; Tomson, Charles

    2010-01-01

    Climate change represents a major global public health threat. The very provision of healthcare itself has a significant untoward effect on the environment, to which kidney care is likely to contribute disproportionately. In this article we describe the four principles we believe will underpin a successful transformation to lower carbon kidney care: disease prevention, patient empowerment, lean service delivery and the preferential use of low-carbon technologies. We illustrate their application and their co-benefits, such as improvements in patient care and reductions in cost, with examples. Copyright © 2010 S. Karger AG, Basel.

  3. Key Lake Mining Corporation metallurgical complex

    International Nuclear Information System (INIS)

    Lendrum, F.C.

    1984-02-01

    The Key Lake uranium mine is located in Saskatchewan, 550 km northeast of Saskatoon. It began operations in 1983, and is licensed and regulated by both Saskatchewan government agencies and the Canadian Atomic Energy Control Board. This report examines the metallurgical processes used at the mill and discusses the spills that occurred in the first four months the mine was in operation. It finds that all spills of an acidic nature in the mill were small amounts in the CCD or solution pretreatment sections. Contingency procedures are in place and sumps are capable of handling spills. The only major change in design contemplated will be converting the secondary crushing from the use of an impact crusher to the use of a semi-autogeneous grinding mill. The monitoring program set out by the AECB and Saskatchewan Environment is thorough. It monitors effluents and water pathways, and includes aquatic biota and sediments. Air monitoring is also required by Saskatchewan Environment

  4. Key policy choices in groundwater quality management

    International Nuclear Information System (INIS)

    Batie, S.S.; Diebel, P.L.

    1990-01-01

    The fundamental policy choice of who has the right to do what to whom is a pivotal issue of governance. Over the last few decades, the answer to that question has become more restrictive to those who own and use natural resources as inputs into production processes. Increasingly, the beneficiaries of new policy initiatives are those who desire higher protection of groundwater quality. With respect to groundwater management, policy design increasingly reflects such diverse interests as agriculturists, industrialists, homeowners, local government officials and state officials. Policy design is becoming complex, in part because of this diversity and in part because scientific uncertainty hampers informed policy design. No umbrella federal legislation exists for managing groundwater resources. EPA's role has been mainly an advisory one on groundwater issues. The difficulties and responsibilities of protecting groundwater thus remain with the states. For the near future, it is the states that will address key policy choices with respect to groundwater quality management issues

  5. Key Developments in Ionic Liquid Crystals.

    Science.gov (United States)

    Alvarez Fernandez, Alexandra; Kouwer, Paul H J

    2016-05-16

    Ionic liquid crystals are materials that combine the classes of liquid crystals and ionic liquids. The first one is based on the multi-billion-dollar flat panel display industry, whilst the latter quickly developed in the past decades into a family of highly-tunable non-volatile solvents. The combination yields materials with a unique set of properties, but also with many challenges ahead. In this review, we provide an overview of the key concepts in ionic liquid crystals, particularly from a molecular perspective. What are the important molecular parameters that determine the phase behavior? How should they be introduced into the molecules? Finally, which other tools does one have to realize specific properties in the material?

  6. Key Developments in Ionic Liquid Crystals

    Directory of Open Access Journals (Sweden)

    Alexandra Alvarez Fernandez

    2016-05-01

    Full Text Available Ionic liquid crystals are materials that combine the classes of liquid crystals and ionic liquids. The first one is based on the multi-billion-dollar flat panel display industry, whilst the latter quickly developed in the past decades into a family of highly-tunable non-volatile solvents. The combination yields materials with a unique set of properties, but also with many challenges ahead. In this review, we provide an overview of the key concepts in ionic liquid crystals, particularly from a molecular perspective. What are the important molecular parameters that determine the phase behavior? How should they be introduced into the molecules? Finally, which other tools does one have to realize specific properties in the material?

  7. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  8. Climate Watchlist: Key issues for Cancun negotiations

    Energy Technology Data Exchange (ETDEWEB)

    Chandani, Achala; Siegele, Linda

    2010-11-15

    We must mitigate and adapt to climate change. On this, the international community is agreed. But exactly how to do that is still up for debate. There were high hopes that last year's UN climate talks in Copenhagen would deliver a legally binding agreement for action on climate change. But the outcome — the Copenhagen Accord — was instead a political 'statement of intent' that fell significantly short of expectations. Now, after a year of interim meetings and several negotiating texts, parties to the UN Framework Convention on Climate Change (UNFCCC) are gathering in Cancun, Mexico, to try again. Their success will largely depend on settling disputes — particularly between the developed and developing world — about six key issues: shared vision; adaptation; climate finance; technology transfer; reducing emissions from deforestation and degradation; and post-2012 emissions reduction targets.

  9. Phosphoinositides: Key modulators of energy metabolism☆

    Science.gov (United States)

    Bridges, Dave; Saltiel, Alan R.

    2014-01-01

    Phosphoinositides are key players in many trafficking and signaling pathways. Recent advances regarding the synthesis, location and functions of these lipids have dramatically improved our understanding of how and when these lipids are generated and what their roles are in animal physiology. In particular, phosphoinositides play a central role in insulin signaling, and manipulation of PtdIns(3,4,5)P3 levels in particular, may be an important potential therapeutic target for the alleviation of insulin resistance associated with obesity and the metabolic syndrome. In this article we review the metabolism, regulation and functional roles of phosphoinositides in insulin signaling and the regulation of energy metabolism. This article is part of a Special Issue entitled Phosphoinositides. PMID:25463477

  10. Key Questions in Marine Megafauna Movement Ecology.

    Science.gov (United States)

    Hays, Graeme C; Ferreira, Luciana C; Sequeira, Ana M M; Meekan, Mark G; Duarte, Carlos M; Bailey, Helen; Bailleul, Fred; Bowen, W Don; Caley, M Julian; Costa, Daniel P; Eguíluz, Victor M; Fossette, Sabrina; Friedlaender, Ari S; Gales, Nick; Gleiss, Adrian C; Gunn, John; Harcourt, Rob; Hazen, Elliott L; Heithaus, Michael R; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L; Lowe, Christopher G; Madsen, Peter T; Marsh, Helene; Phillips, Richard A; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A; Simpfendorfer, Colin A; Sims, David W; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N; Wikelski, Martin; Womble, Jamie N; Thums, Michele

    2016-06-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Security of practical quantum key distribution systems

    Energy Technology Data Exchange (ETDEWEB)

    Jain, Nitin

    2015-02-24

    This thesis deals with practical security aspects of quantum key distribution (QKD) systems. At the heart of the theoretical model of any QKD system lies a quantum-mechanical security proof that guarantees perfect secrecy of messages - based on certain assumptions. However, in practice, deviations between the theoretical model and the physical implementation could be exploited by an attacker to break the security of the system. These deviations may arise from technical limitations and operational imperfections in the physical implementation and/or unrealistic assumptions and insufficient constraints in the theoretical model. In this thesis, we experimentally investigate in depth several such deviations. We demonstrate the resultant vulnerabilities via proof-of-principle attacks on a commercial QKD system from ID Quantique. We also propose countermeasures against the investigated loopholes to secure both existing and future QKD implementations.

  12. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  13. Bench press exercise: the key points.

    Science.gov (United States)

    Padulo, J; Laffaye, G; Chaouachi, A; Chamari, K

    2015-06-01

    The bench press exercise (BPE) is receiving increasing interest as a field testing, training/therapeutic modality to improve neuromuscular performance or to increase bone mass density. Several studies have been performed using BPE as a standard for increasing upper-limb strength. For this purpose, the position of the bar, the loads, the sets, the number of repetitions, the recovery time in-between sets, the movement speed, the muscular work and the use of the determination of the one repetition maximum (1-RM) are the classical tools investigated in the literature that have been shown to affect the BPE effect on neuromuscular. The goal of the present short review is to make a picture of the current knowledge on the bench press exercise, which could be very helpful for a better understanding of this standard movement and its effects. Based on the related literature, several recommendations on these key points are presented here.

  14. Low-Power Public Key Cryptography

    Energy Technology Data Exchange (ETDEWEB)

    BEAVER,CHERYL L.; DRAELOS,TIMOTHY J.; HAMILTON,VICTORIA A.; SCHROEPPEL,RICHARD C.; GONZALES,RITA A.; MILLER,RUSSELL D.; THOMAS,EDWARD V.

    2000-11-01

    This report presents research on public key, digital signature algorithms for cryptographic authentication in low-powered, low-computation environments. We assessed algorithms for suitability based on their signature size, and computation and storage requirements. We evaluated a variety of general purpose and special purpose computing platforms to address issues such as memory, voltage requirements, and special functionality for low-powered applications. In addition, we examined custom design platforms. We found that a custom design offers the most flexibility and can be optimized for specific algorithms. Furthermore, the entire platform can exist on a single Application Specific Integrated Circuit (ASIC) or can be integrated with commercially available components to produce the desired computing platform.

  15. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  16. Adaptation to climate change. Key terms

    International Nuclear Information System (INIS)

    Levina, E.; Tirpak, D.

    2006-05-01

    Adaptation has become an important issue in international and domestic discussions on climate change. Numerous terms and concepts have come into common usage as a result of IPCC reports, discussions in the context of the UNFCCC and dialogs by the climate community at large. This paper examines the key adaptation terms and concepts used by the climate change community and other institutions. Conflicts and contradictions are noted with the aim of sensitizing different bodies to the differences, but particularly the Parties to the Convention and experts participating in the IPCC. Given the need to promote a common understanding among various stakeholders and the potential financial implications of various definitions, it appears important for the IPCC and the UNFCCC to work toward common definitions, at least for a core set of terms and concepts

  17. Key Value Considerations for Consultant Pharmacists.

    Science.gov (United States)

    Meyer, Lee; Perry, Ronald G; Rhodus, Susan M; Stearns, Wendy

    2016-07-01

    Managing the efficiency and costs of residents' drug regimens outside the acute-care hospital and through transitions of care requires a toolbox filled with cost-control tools and careful collaboration among the pharmacy provider(s), facility staff, and the consultant/senior care pharmacist. This article will provide the reader with key long-term care business strategies that affect the profitability of the pharmacy provider in various care settings while, at the same time, ensuring optimal therapy for residents as they transition across levels of care. Readers can take away ideas on how to access critical information, what they can do with this information, and how they can improve the overall care process. Four experts in various aspects of pharmacy management share their insights on pharmacy practice issues including formulary management, performance metrics, short-cycle dispensing challenges/solutions, cost-control measures, facility surveys, billing practices, medication reconciliation, prospective medication reviews, and transitions of care.

  18. Key world energy statistics. 2004 edition

    International Nuclear Information System (INIS)

    2004-01-01

    Key World Energy Statistics from the IEA contains timely, clearly-presented data on the supply, transformation and consumption of all major energy sources. The IEA energy balances and statistics databases on CD-Rom provide annual historical energy data extracted from four IEA/OECD data bases: energy statistics and energy balances, which contain data for most of the OECD countries for the years 1960 to 2002 and energy statistics and balances for more than 100 non-OECD countries for the years 1971 to 2002. The CDs and/or hard-copies and PDFs can be purchased individually: Energy Balances of OECD Countries 2004; Energy Statistics of OECD Countries 2004; Energy Balances of Non OECD Countries 2004; Energy Statistics of Non-OECD Countries 2004

  19. Altruity: Key to the Fight Against Poverty

    Directory of Open Access Journals (Sweden)

    Philippe Kourilsky

    2012-06-01

    Full Text Available This paper presents the concept of altruity and illustrates its philosophical and practical importance in the fight against poverty. Altruity –a highly specific form of rational altruism– is the duty that comes with freedom. The individual duty of altruity is the necessary counterpart of the right to individual freedoms. It is, by its very nature, distinct from (though complementary to generosity, and devoid of any expectation of reciprocity (while not excluding it. The idea of altruity is the cornerstone of a theory of individual responsibility, and of a theory of justice, which provide a conceptual framework for the struggle against poverty. And because it is only meaningful if implemented with a pre-defined method, it also provides a framework for action, as the FACTS Initiative has shown. Altruity thus emerges as one of the keys to the fight against poverty.

  20. Risk management of key issues of FPSO

    Science.gov (United States)

    Sun, Liping; Sun, Hai

    2012-12-01

    Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offloading system and fire accidents were analyzed based on the floating production, storage and offloading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offloading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.

  1. Managing clinical education through understanding key principles.

    Science.gov (United States)

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  2. Nutrition and healthy ageing: the key ingredients.

    Science.gov (United States)

    Kiefte-de Jong, Jessica C; Mathers, John C; Franco, Oscar H

    2014-05-01

    Healthy longevity is a tangible possibility for many individuals and populations, with nutritional and other lifestyle factors playing a key role in modulating the likelihood of healthy ageing. Nevertheless, studies of effects of nutrients or single foods on ageing often show inconsistent results and ignore the overall framework of dietary habits. Therefore, the use of dietary patterns (e.g. a Mediterranean dietary pattern) and the specific dietary recommendations (e.g. dietary approaches to stop hypertension, Polymeal and the American Healthy Eating Index) are becoming more widespread in promoting lifelong health. A posteriori defined dietary patterns are described frequently in relation to age-related diseases but their generalisability is often a challenge since these are developed specifically for the population under study. Conversely, the dietary guidelines are often developed based on prevention of disease or nutrient deficiency, but often less attention is paid to how well these dietary guidelines promote health outcomes. In the present paper, we provide an overview of the state of the art of dietary patterns and dietary recommendations in relation to life expectancy and the risk of age-related disorders (with emphasis on cardiometabolic diseases and cognitive outcomes). According to both a posteriori and a priori dietary patterns, some key 'ingredients' can be identified that are associated consistently with longevity and better cardiometabolic and cognitive health. These include high intake of fruit, vegetables, fish, (whole) grains and legumes/pulses and potatoes, whereas dietary patterns rich in red meat and sugar-rich foods have been associated with an increased risk of mortality and cardiometabolic outcomes.

  3. Key Intersections between HRD and Management

    Science.gov (United States)

    Egan, Toby M.

    2011-01-01

    This article is in part inspired by an HRD director's insight that his HRD staff should view themselves as HRD Family Doctors, suggesting that a doctor-patient relationship was similar in many respects to the HRD-manager consulting relationship. Although that is possible in some organizations, the author's interviews with corporate managers and…

  4. Implementation of renal key performance indicators: promoting improved clinical practice.

    Science.gov (United States)

    Toussaint, Nigel D; McMahon, Lawrence P; Dowling, Gregory; Soding, Jenny; Safe, Maria; Knight, Richard; Fair, Kathleen; Linehan, Leanne; Walker, Rowan G; Power, David A

    2015-03-01

    In the Australian state of Victoria, the Renal Health Clinical Network (RHCN) of the Department of Health Victoria established a Renal Key Performance Indicator (KPI) Working Group in 2011. The group developed four KPIs related to chronic kidney disease and dialysis. A transplant working group of the RHCN developed two additional KPIs. The aim was to develop clinical indicators to measure performance of renal services to drive service improvement. A data collection and benchmarking programme was established, with data provided monthly to the Department using a purpose-designed website portal. The KPI Working Group is responsible for analysing data each quarter and ensuring indicators remain accurate and relevant. Each indicator has clear definitions and targets, and assess (i) patient education, (ii) timely creation of vascular access for haemodialysis, (iii) proportion of patients dialysing at home, (iv) incidence of dialysis-related peritonitis, (v) incidence of pre-emptive renal transplantation, and (vi) timely listing of patients for deceased donor transplantation. Most KPIs have demonstrated improved performance over time with limited gains notably in two: the proportion of patients dialysing at home (KPI 3) and timely listing patients for transplantation (KPI 6). KPI implementation has been established in Victoria for 2 years, providing performance data without additional funding. The six Victorian KPIs are measurable, relevant and modifiable, and implementation relies on enthusiasm and goodwill of physicians and nurses involved in collecting data. The KPIs require further evaluation, but adoption of a similar programme by other jurisdictions could lead to improved national outcomes. © 2014 Asian Pacific Society of Nephrology.

  5. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  6. Precautionary allergen labelling: perspectives from key stakeholder groups

    DEFF Research Database (Denmark)

    DunnGalvin, A.; Chan, C. -H.; Crevel, R.

    2015-01-01

    to summarize the perspectives of all the key stakeholders (including clinicians, patients, food industry and regulators), with the aim of defining common health protection and risk minimization goals. The lack of agreed reference doses has resulted in inconsistent application of PAL by the food industry...... and in levels of contamination that prompt withdrawal action by enforcement officers. So there is a poor relationship between the presence or absence of PAL and actual reaction risk. This has led to a loss of trust in PAL, reducing the ability of consumers with food allergies to make informed choices....... The result has been reduced avoidance, reduced quality of life and increased risk-taking by consumers who often ignore PAL. All contributing stakeholders agree that PAL must reflect actual risk. PAL should be transparent and consistent with rules underpinning decision-making process being communicated...

  7. Key aspects about education for refugee children

    Directory of Open Access Journals (Sweden)

    Mª Jesús Vega Pascual

    2003-01-01

    Full Text Available This presentation entitled «Key Aspects about Education for Refugee Children:Refugee Camp Situation», is based on the 2003 UNHCR Guidelines on Education and highlights the relevance of the education even in situations of emergency and crisis, interms of protection and psychosocial well-being of children. It also mentions key issues to consider when working with refugees, internally displaced people, asylum-seekers,stateless and other populations of concen to UNHCR. Aspects such as refugee children’s rights, UNHCR policy commitments to education, participation of refugees and their communities in the design, establishement and implementation of education programmes, specially in emergencies, will be dealt with in this presentation. It will alsomentions topics such as the school drop out, education for vulnerable groups and the need for promoting a gender sentitive approach, bearing in mind that the hard experience of exile, the changes of family structure, the ethnic, cultural, religious and legal differences are key when working with this populationEsta presentación titulada "Consideraciones esenciales sobre la educación de los niños refugiados: la situación en los campos de refugiados", está basada en las Directrices del ACNUR sobre Eduación de 2003, y pretende resaltar la importancia de la educación en las situaciones de refugiados, incluso en situaciones de emergencia o crisis, y cómo ésta juega en favor de la protección y del bienestar psicosocial de los niños. Se mencionan las peculiaridades más relevantes que deben tenerse en cuenta cuando se trabaja con refugiados, desplazados internos, solicitantes de asilo, apátridas y otras poblaciones de las que se ocupa el ACNUR. Se verán aspectos como los derechos de los niños refugiados, los compromisos del Alto Comisionado en materia de Educación, la participación de los refugiados y sus comunidades para diseñar, establecer e impartir programas de educación especialmente

  8. New oral anticoagulants: key messages for clinicians

    Directory of Open Access Journals (Sweden)

    Matteo Giorgi-Pierfranceschi

    2013-12-01

    Full Text Available New oral anticoagulants are an effective and safe alternative to vitamin K antagonists in many fields of clinical practice. The use of the direct inhibitors of activated Factor II (dabigatran and activated Factor X (apixaban and rivaroxaban, both in patients with non-valvular atrial fibrillation (NVAF and those with acute venous thromboembolism (VTE, is of great interest for internal medicine physicians. This paper aims to give practical guidance on management (starting therapy, follow up and bleeding complications of patients treated with dabigatran, rivaroxaban or apixaban for NVAF or acute VTE providing practical tables concerning the phases of therapy, management of complications, drug interaction and dose adjustment if renal impairment occurs.

  9. Animals are key to human toxoplasmosis.

    Science.gov (United States)

    Schlüter, Dirk; Däubener, Walter; Schares, Gereon; Groß, Uwe; Pleyer, Uwe; Lüder, Carsten

    2014-10-01

    Toxoplasma gondii is an extremely sucessfull protozoal parasite which infects almost all mamalian species including humans. Approximately 30% of the human population worldwide is chronically infected with T. gondii. In general, human infection is asymptomatic but the parasite may induce severe disease in fetuses and immunocompromised patients. In addition, T. gondii may cause sight-threatening posterior uveitis in immunocompetent patients. Apart from few exceptions, humans acquire T. gondii from animals. Both, the oral uptake of T. gondii oocysts released by specific hosts, i.e. felidae, and of cysts persisting in muscle cells of animals result in human toxoplasmosis. In the present review, we discuss recent new data on the cell biology of T. gondii and parasite diversity in animals. In addition, we focus on the impact of these various parasite strains and their different virulence on the clinical outcome of human congenital toxoplasmosis and T. gondii uveitis. Copyright © 2014 Elsevier GmbH. All rights reserved.

  10. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  11. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  12. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  13. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  14. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  15. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  16. Key clinical features to identify girls with CDKL5 mutations.

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydeé; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothée; Afenjar, Alexandra; Rio, Marlène; Héron, Delphine; N'guyen Morel, Marie Ange; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-10-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 (CDKL5) gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of CDKL5-associated encephalopathy. We screened the entire coding region of CDKL5 for mutations in 183 females with encephalopathy with early seizures by denaturing high liquid performance chromatography and direct sequencing, and we identified in 20 unrelated girls, 18 different mutations including 7 novel mutations. These mutations were identified in eight patients with encephalopathy with RTT-like features, five with infantile spasms and seven with encephalopathy with refractory epilepsy. Early epilepsy with normal interictal EEG and severe hypotonia are the key clinical features in identifying patients likely to have CDKL5 mutations. Our study also indicates that these patients clearly exhibit some RTT features such as deceleration of head growth, stereotypies and hand apraxia and that these RTT features become more evident in older and ambulatory patients. However, some RTT signs are clearly absent such as the so called RTT disease profile (period of nearly normal development followed by regression with loss of acquired fine finger skill in early childhood and characteristic intensive eye communication) and the characteristic evolution of the RTT electroencephalogram. Interestingly, in addition to the overall stereotypical symptomatology (age of onset and evolution of the disease) resulting from CDKL5 mutations, atypical forms of CDKL5-related conditions have also been observed. Our data suggest that phenotypic heterogeneity does not correlate with the nature or the position of the mutations or with the pattern of X-chromosome inactivation, but most probably with the functional transcriptional and/or translational consequences of CDKL5

  17. Development of key fusion technologies at JET

    International Nuclear Information System (INIS)

    2001-01-01

    The recent operational phase in JET in which Deuterium-Tritium fuel was used (DTE1) resulted in record breaking fusion performance. In addition to important contributions in plasma physics, the JET Team has also made major advances in demonstrating the viability of some of the key technologies required for the realisation of future fusion power. Two of the most important technological areas which have been successfully demonstrated in JET are the ITER scale tritium processing plant and the exchange of the divertor and maintenance of the interior of JET by totally remote means. The experiment also provided the first data on tritium retention and co-deposition in a diverted tokamak. Of the 35g of tritium injected into the JET torus, about 6g remained in the tokamak. The amount resides mainly on cool surfaces at the inboard divertor side. The precise, safe and timely execution of the remote handling shutdown proved that the design, function, performance and operational methodology of the RH equipment prepared over the years at JET are appropriate for the successful and rapid replacement of components in an activated tokamak environment. (author)

  18. Achieving organizational alignment - key to survival

    International Nuclear Information System (INIS)

    Allison, J.T.

    1997-01-01

    The restructuring of the gas and electric industry and the impact of the restructuring on organizational survival was discussed. The forces driving the trend to restructuring are commoditization of energy, demanding, fragmented customer needs, diverse, transforming technologies, and intense competition. Realigning a company to the changing marketplace is the key to survival with customers, financial markets, and with competition. This paper presented a reality-based, results oriented approach to strategy consulting. Four case studies - Telco, Natural gas holding company, Combined utility, and Duke/Louis Dreyfus - were used for illustrating different problems and different approaches to restructuring. In each case a comparison was made between the company's old organization in the early 1990's, the driving forces responsible for the change and the company's new organization in the mid 1990's. In all cases the predominance of the customer focus is quite apparent, as is the clear lines of demarcation between regulated and unregulated activities. The underlying theme in all restructuring is agility and striving for flexibility

  19. Designing organizational structures: Key thoughts for development.

    Science.gov (United States)

    Killingsworth, Patricia; Eschenbacher, Lynn

    2018-04-01

    Current strategies and concepts to consider in developing a system-level organizational structure for the pharmacy enterprise are discussed. There are many different ways to design an organizational structure for the pharmacy enterprise within a health system. The size of the organization, the number of states in which it operates, and the geographic spread and complexity of the pharmacy business lines should be among the key considerations in determining the optimal organizational and decision-making structures for the pharmacy enterprise. The structure needs to support incorporation of the pharmacy leadership (both system-level executives and local leaders) into all strategic planning and discussions at the hospital and health-system levels so that they can directly represent the pharmacy enterprise instead of relying on others to develop strategy on their behalf. It is important that leaders of all aspects of the pharmacy enterprise report through the system's top pharmacy executive, who should be a pharmacist and have a title consistent with those of other leaders reporting at the same organizational level (e.g., chief pharmacy officer). Pharmacy leaders need to be well positioned within an organization to advocate for the pharmacy enterprise and use all resources to the best of their ability. As the scope and complexity of pharmacy services grow, it is critical to ensure that leadership of the pharmacy enterprise is unified under a single pharmacy executive team. Copyright © 2018 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  20. Key challenges to expanding renewable energy

    International Nuclear Information System (INIS)

    Stram, Bruce N.

    2016-01-01

    The key advantage of renewables is that they are free of direct pollution and carbon emissions. Given concern over global warming caused by carbon emissions, there are substantial policy efforts to increase renewable penetrations. The purpose of this paper is to outline and evaluate the challenges presented by increasing penetrations of renewable electricity generation. These generation sources primarily include solar and wind which are growing rapidly and are new enough to the grid that the impact of high penetrations is not fully understood. The intrinsic nature of solar and wind power is very likely to present greater system challenges than “conventional” sources. Within limits, those challenges can be overcome, but at a cost. Later sections of the paper will draw on a variety of sources to identify a range of such costs, at least as they are foreseen by researchers helping prepare ambitious plans for grids to obtain high shares (30–50%) of their megawatt hours from primarily solar and wind generation. Energy poverty issues are outlined and related to renewable costs issues. - Highlights: •Integration of intermittent renewables with existing power grids. •Renewable ramping and over production issues. •Renewable caused system costs. •Energy poverty circumstances and consequences.

  1. Uniformity: The key to better inventory management

    International Nuclear Information System (INIS)

    Boshears, G.

    1993-01-01

    The objective of this paper is to show how uniformity in describing parts and materials can be the key ingredient to more effective inventory management. Although most nuclear utilities have some type of computer system for maintenance management as well as materials tracking, few have a system to provide the various users with complete information about parts and material in stock. One of the industry's most perplexing problems is How do you know, and find, the item you need to repair a particular piece of equipment or component? In many instances it is easier to order a new one from the manufacturer rather than try to find it on-site, which can result in inaccurate usage records, over-stocking, frustration, and strain on cash flow. What is needed is a higher degree of uniformity within a station, and a utility, of catalog descriptions for parts and material that will satisfy all users-planners, craftsmen, warehouse personnel, and buyers. The results of attaining this uniformity are improved performance through searchability, duplicate stock avoidance, interchangeability, substitutability, and more accurate bills of material; economic benefits will also be noted

  2. RFID: A key technology for Humanity

    Science.gov (United States)

    Duroc, Yvan; Tedjini, Smail

    2018-01-01

    The RFID (Radio Frequency IDentification) technology is a well-known wireless application for traceability, logistics, and access control. It became ubiquitous in industry and our daily life (ticketing, payment, passports, car keys, etc.). RFID is nowadays a standardized technology; its inherent advantages, which are unitary, identification, wireless communication, and low cost of tags, provide it with decisive practical benefits that drive new developments in terms of concepts and applications. This trend is largely confirmed by the market forecast, but also by its implementation in the area of health (smart hospital), assistance to persons, anti-counterfeiting, as well as by its perspective in terms of new paradigms for distributed ambient intelligence and the Internet of Things. The first part of this paper briefly reviews the fundamental concepts of the RFID technology, and shows its link with the radio science. A state of the art including the presentation of current performance and developments is also summarized. The second part illustrates the impact of RFID to the service of our society with a focus of applications in the field of autonomy and handicap. Finally, the last part highlights a panorama of perspectives and the future directions of RFID applications dedicated to the service of Humanity. xml:lang="fr"

  3. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  4. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  5. Outreach: Key to Sustainable Nuclear Knowledge Management

    International Nuclear Information System (INIS)

    Segovia, V.

    2016-01-01

    Full text: With the numerous nuclear power plants being built globally and the prospects for many more, the challenge of the timely availability of a well-prepared, qualified, knowledgeable workforce is a key element in the “critical path” to commissioning these plants. All of these individuals will need quality education and training that is rooted in safety and established in experience. In addition, because many of these new plants are typically being built in developing countries, education, training, recruiting and retaining operations staff can be a significant challenge. Attracting sources of qualified employees for these nuclear power plants in local communities is paramount which implies a strong focus on the science and math education outreach programmes at all levels. This paper will highlight the Nuclear Power Institute’s integration of human resource development outreach strategies, education and training systems, and international cooperation to demonstrate how working in particular with the education sector can not only create interest in future careers in nuclear technology and capture valuable knowledge, but can also build community based support for nuclear power programmes with an emphasis of developing competent workers through education and training, mentoring and apprenticeships. Outreach has also become an important element of all nuclear knowledge management endeavours. (author

  6. Identifying Key Attributes for Protein Beverages.

    Science.gov (United States)

    Oltman, A E; Lopetcharat, K; Bastian, E; Drake, M A

    2015-06-01

    This study identified key attributes of protein beverages and evaluated effects of priming on liking of protein beverages. An adaptive choice-based conjoint study was conducted along with Kano analysis to gain insight on protein beverage consumers (n = 432). Attributes evaluated included label claim, protein type, amount of protein, carbohydrates, sweeteners, and metabolic benefits. Utility scores for levels and importance scores for attributes were determined. Subsequently, two pairs of clear acidic whey protein beverages were manufactured that differed by age of protein source or the amount of whey protein per serving. Beverages were evaluated by 151 consumers on two occasions with or without priming statements. One priming statement declared "great flavor," the other priming statement declared 20 g protein per serving. A two way analysis of variance was applied to discern the role of each priming statement. The most important attribute for protein beverages was sweetener type, followed by amount of protein, followed by type of protein followed by label claim. Beverages with whey protein, naturally sweetened, reduced sugar and ≥15 g protein per serving were most desired. Three consumer clusters were identified, differentiated by their preferences for protein type, sweetener and amount of protein. Priming statements positively impacted concept liking (P 0.05). Consistent with trained panel profiles of increased cardboard flavor with higher protein content, consumers liked beverages with 10 g protein more than beverages with 20 g protein (6.8 compared with 5.7, P appeal. © 2015 Institute of Food Technologists®

  7. Nuclear energy: a key role despite problems

    International Nuclear Information System (INIS)

    Anderson, E.V.

    1977-01-01

    Nuclear energy is projected to be the fastest growing power source and a key to meeting power demands in spite of the many problems facing the nuclear industry in the form of delays, protests, and cancellations. Pressures for a nuclear moratorium will slow the industry, Mr. Anderson feels, but in the long run nuclear reactors will make up an increasing share of the power generating capacity. The Arthur D. Little Co. projects a fourfold increase between 1975 and 1985 on the basis of 10-year lead times for construction of nuclear power plants. Half the new generating capacity after 1985 will be nuclear. Problems besetting every stage of the nuclear fuel cycle result from debates over proliferation, waste disposal, reactor safety, and environmental damage and lead to controversy over regulations and licensing. U.S. utilities are not ordering reactors, but manufacturers are finding markets in other countries. Financial difficulties have kept domestic utilities from undertaking large investment programs until they can resolve problems of fuel costs and rate structures. New construction is inevitable, however, to meet future electrical requirements. Nuclear companies, which number nearly 1300 manufacturers and service providers, need to develop a better public image by working together to demonstrate their ability to manage the risks and uncertainties

  8. KEY PERFORMING FACTORS OF LEADING ROMANIAN COMPANIES

    Directory of Open Access Journals (Sweden)

    BURJA CAMELIA

    2014-08-01

    Full Text Available The analysis of financial economic ratios provides managers and external partners feedback on the results obtained from operational activities and the associated performance and risks. This paper studies the functional dependence of the companies’ success (on performance over internal financial management elements. The research was carried out for the most traded non-financial securities Bucharest listed companies and covers the period 2011- 2013. To carry out its purpose it analyzed the interdependence between the key financial ratios, studying the impact of liquidity ratios, solvency and efficiency on profitability. The study provides empirical evidences to identify factors that have ensured the performance of companies and their ranking in the segment of the most traded companies in Romania. Results suggest the view that the source of company success on the capital market lies in the positive signals sent to investors regarding profitability and the low risk of solvency. This study gives additional information for managerial decision-making in order to create more value and a better positioning of the companies in the market

  9. Development of key fusion technologies at JET

    International Nuclear Information System (INIS)

    1999-01-01

    The recent operational phase in JET in which Deuterium-Tritium fuel was used (DTE1) resulted in record breaking fusion performance. In addition to important contributions in plasma physics, the JET Team has also made major advances in demonstrating the viability of some of the key technologies required for the realisation of future fusion power. Two of the most important technological areas which have been successfully demonstrated in JET are the ITER scale tritium processing plant and the exchange of the divertor and maintenance of the interior of JET by totally remote means. The experiment also provided the first data on tritium retention and co-deposition in a diverted tokamak. Of the 35g of tritium injected into the JET torus, about 6g remained in the tokamak. The amount resides mainly on cool surfaces at the inboard divertor side. The precise, safe and timely execution of the remote handling shutdown proved that the design, function, performance and operational methodology of the RH equipment prepared over the years at JET are appropriate for the successful and rapid replacement of components in an activated tokamak environment. (author)

  10. Key performance indicators in British military trauma.

    Science.gov (United States)

    Stannard, Adam; Tai, Nigel R; Bowley, Douglas M; Midwinter, Mark; Hodgetts, Tim J

    2008-08-01

    Key performance indicators (KPI) are tools for assessing process and outcome in systems of health care provision and are an essential component in performance improvement. Although KPI have been used in British military trauma for 10 years, they remain poorly defined and are derived from civilian metrics that do not adjust for the realities of field trauma care. Our aim was to modify current trauma KPI to ensure they more faithfully reflect both the military setting and contemporary evidence in order to both aid accurate calibration of the performance of the British Defence Medical Services and act as a driver for performance improvement. A workshop was convened that was attended by senior, experienced doctors and nurses from all disciplines of trauma care in the British military. "Speciality-specific" KPI were developed by interest groups using evidence-based data where available and collective experience where this was lacking. In a final discussion these were streamlined into 60 KPI covering each phase of trauma management. The introduction of these KPI sets a number of important benchmarks by which British military trauma can be measured. As part of a performance improvement programme, these will allow closer monitoring of our performance and assist efforts to develop, train, and resource British military trauma providers.

  11. Economic contribution of recreating visitors to the Florida Keys/Key West

    Science.gov (United States)

    Donald B.K. English; Warren Kriesel; Vernon R Leeworthy; Peter C. Wiley

    1996-01-01

    This report provides estimates of the economic impact that visitors to the Florida Keys have on both the Monroe County and larger South Florida regional economies. Estimates are made for output/sales, income, and employment and include both direct and secondary economic impacts. This report provides the basis for demonstrating the income-producing asset value of the...

  12. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  13. A Novel Key Distribution Solution for Combined Public/Secret Key ...

    African Journals Online (AJOL)

    Moreover, an implementation over the new IPv6 Internet protocol is presented such that the system can be ported to both wired and wireless networking environments. Keywords: cryptography, key distribution, security server. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  14. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  15. Development of key performance indicators for prehospital emergency care.

    Science.gov (United States)

    Murphy, Adrian; Wakai, Abel; Walsh, Cathal; Cummins, Fergal; O'Sullivan, Ronan

    2016-04-01

    Key performance indicators (KPIs) are used to monitor and evaluate critical areas of clinical and support functions that influence patient outcome. Traditional prehospital emergency care performance monitoring has focused solely on response time metrics. The landscape of emergency care delivery in Ireland is in the process of significant national reconfiguration. The development of KPIs is therefore considered one of the key priorities in prehospital research. The aim of this study was to develop a suite of KPIs for prehospital emergency care in Ireland. A systematic literature review of prehospital care performance measurement was undertaken followed by a three-round Delphi consensus process facilitated by a broad-based multidisciplinary group of panellists. The consensus process was conducted between June 2012 and October 2013. Each candidate indicator on the Delphi survey questionnaire was rated using a 5-point Likert-type rating scale. Agreement was defined as at least 70% of responders rating an indicator as 'agree' or 'strongly agree' on the rating scale. Data were analysed using descriptive statistics. Sensitivity of the ratings was examined for robustness by bootstrapping the original sample. Of the 78 citations identified by the systematic review, 5 relevant publications were used to select candidate indicators for the Delphi round 1 questionnaire. Response rates in Delphi rounds 1 and 2 were 89% and 83%, respectively. Following the consensus development conference, 101 KPIs reached consensus. Based on the Donabedian framework for quality-of-care indicators, 7 of the KPIs which reached agreement were structure KPIs, 74 were process KPIs and 20 were outcome KPIs. The highest ranked indicator was a process KPI ('Direct transport of ST-elevation myocardial infarction patients to a primary percutaneous intervention (PCI)-capable facility for ECG to PCI time performance measurement using scientifically valid and reliable KPIs. Employing a Delphi panel of key

  16. Labelling patients

    International Nuclear Information System (INIS)

    Strudwick, R.M.

    2016-01-01

    This article looks at how diagnostic radiographers label their patients. An ethnographic study of the workplace culture in one diagnostic imaging department was undertaken using participant observation for four months and semi-structured interviews with ten key informants. One of the key themes; the way in which radiographers label their patients, is explored in this article. It was found from the study that within the department studied the diagnostic radiographers labelled or categorised their patients based on the information that they had. This information is used to form judgements and these judgements were used to assist the radiographers in dealing with the many different people that they encountered in their work. This categorisation and labelling of the patient appears to assist the radiographer in their decision-making processes about the examination to be carried out and the patient they are to image. This is an important aspect of the role of the diagnostic radiographer. - Highlights: • I have studied the culture in one imaging department. • Radiographers label or categorise their patients. • These labels/categories are used to manage the patient. • This is an important aspect of the way in which radiographers work.

  17. Set-aside key to creating industry

    International Nuclear Information System (INIS)

    Anon.

    1998-01-01

    The Canadian Wind Energy Association (CanWEA) submitted a plan of wind energy industry development to the Regie de l'energie of Quebec at its May wind set-aside hearings. According to the plan, CanWEA wants to see Hydro-Quebec buy 10 MW of wind power a year starting in 2001, progressively increasing to 50 MW power per year in four years. According to CanWEA the size of the set-aside must be large enough to foster competition in the turbine manufacturing sector, as well as put a downward pressure on wind energy prices. In 1996, Hydro-Quebec pledged to buy 10 MW of wind power per year over 10 years. It raised the target to 20 MW per year over 10 years in 1997, which was raised to 30 MW per year by a parliamentary commission in the spring of 1998. Hydro-Quebec contends that it cannot buy more than 30 MW, given that some of the utility's large industrial customers won't want to pay the increased cost of wind energy, and before buying any wind power there will have to be a decision about who will pay the additional cost. The Regie de l'energie has the power to decide whether Hydro-Quebec should spread the cost over the entire customer base, or just charge those customers willing to pay. According to the Regie, the wind set-aside is not simply an energy supply question, it is also a matter of developing a wind turbine manufacturing industry. It is this larger objective and other key issues, such as the economic spin-offs from developing wind energy, its role in regional development and its environmental impacts that will determine the the size of the set-aside and the price to be paid for wind power by Hydro-Quebec

  18. Medical device software: defining key terms.

    Science.gov (United States)

    Pashkov, Vitalii; Gutorova, Nataliya; Harkusha, Andrii

    one of the areas of significant growth in medical devices has been the role of software - as an integral component of a medical device, as a standalone device and more recently as applications on mobile devices. The risk related to a malfunction of the standalone software used within healthcare is in itself not a criterion for its qualification or not as a medical device. It is therefore, necessary to clarify some criteria for the qualification of stand-alone software as medical devices Materials and methods: Ukrainian, European Union, United States of America legislation, Guidelines developed by European Commission and Food and Drug Administration's, recommendations represented by international voluntary group and scientific works. This article is based on dialectical, comparative, analytic, synthetic and comprehensive research methods. the legal regulation of software which is used for medical purpose in Ukraine limited to one definition. In European Union and United States of America were developed and applying special guidelines that help developers, manufactures and end users to difference software on types standing on medical purpose criteria. Software becomes more and more incorporated into medical devices. Developers and manufacturers may not have initially appreciated potential risks to patients and users such situation could have dangerous results for patients or users. It is necessary to develop and adopt the legislation that will intend to define the criteria for the qualification of medical device software and the application of the classification criteria to such software, provide some illustrative examples and step by step recommendations to qualify software as medical device.

  19. Nickel exposure from keys: alternatives for protection and prevention.

    Science.gov (United States)

    Hamann, Dathan; Scheman, Andrew J; Jacob, Sharon E

    2013-01-01

    Keys are an important exposure source of metal allergens to consumers and confer a significant problem for nickel-allergic individuals because of repeated daily use. The aims of this study were to investigate the frequency of nickel and cobalt release in keys and to consider the effectiveness of coatings for preventing metallic allergen release from common metal allergen-releasing keys. Keys from a variety of common stores were nickel and cobalt spot tested. Nickel-releasing keys were coated with enamel sprays, subjected to a use test, and retested to assess for metal allergen release. Of 55 tested keys, 80% showed a strong positive result to the nickel spot test. None of the tested keys exhibited cobalt release. No keys initially released nickel after enamel coatings. Key coatings chipped at the portion inserted into a lock after 30 insertions, and keys were found to release nickel. The handle of the key was not found to release nickel after 60 insertions. Nickel release from keys is very common; nickel-allergic consumers should consider purchasing keys that do not release nickel (eg, brass, anodized). Enamel coating may be useful in protecting nickel-sensitive individuals from their keys but cannot consistently prevent nickel-release from portions used frequently.

  20. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    Science.gov (United States)

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  1. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    Science.gov (United States)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  2. Key developments of the EP1000 design

    International Nuclear Information System (INIS)

    Noviello, L.

    1999-01-01

    In 1994, a group of European utilities initiated, together with Westinghouse and its industrial partner GENESI (an Italian consortium including ANSALDO and FIAT), a program designated EPP (European Passive Plant) to evaluate Westinghouse passive nuclear plant technology for application in Europe. The Phase I of the European Passive Plant program involved the evaluation of the Westinghouse 600 MWe AP600 and 1000 MWe Simplified Pressurized Water Reactor (SPWR) designs against the European Utility Requirements (EUR), and when necessary, the investigation of possible modifications to achieve compliance with the EUR. In Phase 1 of the program, which has been completed in 1996, the following major tasks were accomplished: The impacts of the European Utility Requirements (EUR) on the Westinghouse nuclear island design were evaluated. A 1000 MWe passive plant reference design (EP1000) was developed which conforms to the EUR and is expected to be licensable in Europe. With respect to the NSSS and containment, the EP1000 reference design closely follows those of the Westinghouse SPWR design, while the AP600 design has been taken as the basis for the design of the auxiliary systems. Extensive design and testing efforts have been made for the AP600 and SPWR during the respective multi-year programs. While the results of these programs have been and will continue to be utilised, at the maximum extent, to minimise the work to be performed on the EP1000 design, the compliance with EUR is a key design requirement for the EP1000 The ultimate objective of Phase 2 of the program is to develop design details and perform supporting analyses to produce a Safety Case Report (SCR) for submittal to European Safety Authorities. The first part of Phase 2, hereafter referred as Phase 2A, started at the beginning of 1997 and will be completed at the end of 1998. Scope of this phase of the program is to develop the design modifications of important systems and structures so to comply with the

  3. Key conclusions from AVOID Work Stream One

    Science.gov (United States)

    Warren, Rachel

    2010-05-01

    AVOID work stream (WS1)one has produced emission scenarios that simulate potential future global emission pathways for greenhouse gases during the 21st century. The study explored the influence of three key features of such pathways: (1) the year in which emissions peak globally, (2) the rate of emission reduction, and (3) the minimum level to which emissions are eventually reduced. It examined the resultant climate change, climate change impacts and economic implications using computer simulations. Avoided impacts, carbon taxes and GDP change increase throughout the 21st century in the models. AVOID-WS1 showed that in the absence of climate policy it is very likely that global mean temperatures would exceed 3 degrees and there are evens chances that the temperature would rise by 4 degrees relative to pre-industrial times. Scenarios that peak emissions in 2016 were more effective at constraining temperatures to below 3 degrees than those that peaked in 2030: one ‘2016' scenario achieved a probability of 45% of avoiding breaching of a 2 degree threshold. Scenarios peaking in 2030 were inconsistent with constraining temperatures to below 2 degrees. Correspondingly, scenarios that peak in 2030 are more effective at avoiding climate impacts than scenarios that peak in 2016, for all sectors that we studied. Hence the date at which emissions peak is more important than the rate of subsequent emissions reduction in determining the avoided impacts. Avoided impacts increase with time, being negligible in the 2030s, significant by the 2050s and large by the 2080s. Finally, the choice of GCM influences the magnitude of the avoided impacts strongly, so that the uncertainties in our estimates of avoided impacts for each scenario are larger than the difference between the scenarios. Our economic analysis is based on models which differ greatly in the assumptions that they make, but generally show that the date at which emissions peak is a stronger driver of induced GDP changes

  4. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  5. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  6. Preparing for severe contrast media reactions in children - results of a national survey, a literature review and a suggested protocol

    International Nuclear Information System (INIS)

    Lindsay, R.; Paterson, A.; Edgar, D.

    2011-01-01

    Aim: To identify current practices within paediatric radiology in the UK with regard to the use of prophylactic medication, prior to administering intravenous (IV) radiocontrast medium (RCM). In addition, the pre-injection risk management strategies of the departments questioned was to be evaluated, and using consensus opinion, a protocol for managing patients identified as being at high risk for an adverse reaction to RCM was to be outlined. Materials and methods: An online survey of paediatric radiology consultants representing all geographic regions of the UK was carried out. The questions asked included an assessment of the risk factors for adverse reactions to RCM, and how such reactions are anticipated and managed. The questionnaire asked about the perceived indications for, and the use of prophylactic medication prior to RCM administration. Results: A response rate of 51% was achieved. The majority of respondents felt that a history of previous RCM reaction was an indication to administer prophylactic drugs prior to a further dose of RCM. No other risk factor was believed to require prophylactic medication. Conclusion: Using information obtained from the survey, a literature search was performed to assess the evidence available in support of each practice. A protocol was devised to identify children at risk of an adverse reaction to RCM, and guide the use of prophylactic medication in this group of patients. The survey highlighted considerable variability in the risk-assessment and management practices within paediatric radiology in the UK. The derived protocol may guide radiologists' management of children at risk for an RCM reaction.

  7. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  8. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  9. British Military surgical key performance indicators: time for an update?

    Science.gov (United States)

    Marsden, Max Er; Sharrock, A E; Hansen, C L; Newton, N J; Bowley, D M; Midwinter, M

    2016-10-01

    Key performance indicators (KPIs) are metrics that compare actual care against an ideal structure, process or outcome standard. KPIs designed to assess performance in deployed military surgical facilities have previously been published. This study aimed to review the overall performance of surgical trauma care for casualties treated at Role 3 Camp Bastion, Medical Treatment Facility, Afghanistan, in light of the existing Defence Medical Services (DMS) KPIs. The secondary aims were to assess the utility of the surgical KPIs and make recommendations for future surgical trauma care review. Data on 22 surgical parameters were prospectively collected for 150 injured patients who had primary surgery at Camp Bastion between 1 May 2013 and 20 August 2013. Additional information for these patients was obtained using the Joint Theatre Trauma Register. The authors assessed data recording, applicability and compliance with the KPIs. Median data recording was 100% (IQR 98%-100%), median applicability was 56% (IQR 10%-99%) and median compliance was 78% (IQR 58%-93%). One KPI was not applicable to any patient in our population. Eleven KPIs achieved >80% compliance, five KPIs had 80%-60% compliance and five KPIs had performance of the surgical aspect of military trauma care in 2013. The KPIs highlight areas for improvement in service delivery. Individual KPI development should be driven by evidence and reflect advances in practice and knowledge. A method of stakeholder consultation, and sequential refinement following evidence review, may be the right process to develop the future set of DMS KPIs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  10. Aerosol typing - key information from aerosol studies

    Science.gov (United States)

    Mona, Lucia; Kahn, Ralph; Papagiannopoulos, Nikolaos; Holzer-Popp, Thomas; Pappalardo, Gelsomina

    2016-04-01

    Aerosol typing is a key source of aerosol information from ground-based and satellite-borne instruments. Depending on the specific measurement technique, aerosol typing can be used as input for retrievals or represents an output for other applications. Typically aerosol retrievals require some a priori or external aerosol type information. The accuracy of the derived aerosol products strongly depends on the reliability of these assumptions. Different sensors can make use of different aerosol type inputs. A critical review and harmonization of these procedures could significantly reduce related uncertainties. On the other hand, satellite measurements in recent years are providing valuable information about the global distribution of aerosol types, showing for example the main source regions and typical transport paths. Climatological studies of aerosol load at global and regional scales often rely on inferred aerosol type. There is still a high degree of inhomogeneity among satellite aerosol typing schemes, which makes the use different sensor datasets in a consistent way difficult. Knowledge of the 4d aerosol type distribution at these scales is essential for understanding the impact of different aerosol sources on climate, precipitation and air quality. All this information is needed for planning upcoming aerosol emissions policies. The exchange of expertise and the communication among satellite and ground-based measurement communities is fundamental for improving long-term dataset consistency, and for reducing aerosol type distribution uncertainties. Aerosol typing has been recognized as one of its high-priority activities of the AEROSAT (International Satellite Aerosol Science Network, http://aero-sat.org/) initiative. In the AEROSAT framework, a first critical review of aerosol typing procedures has been carried out. The review underlines the high heterogeneity in many aspects: approach, nomenclature, assumed number of components and parameters used for the

  11. Determinants of Key Account Management Effectiveness: The Case ...

    African Journals Online (AJOL)

    Dires Abebe Fenta

    maintaining enhanced relationships with strategic business customers named as. 'key accounts'. ... Key account management is one mechanism of treating strategic ..... Considering this report, correlation statistics was undergone to check the.

  12. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  13. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and

  14. The elderly patients' dignity

    DEFF Research Database (Denmark)

    Høy, Bente; Hall, E.O.C.; Wagner, L.

    2007-01-01

    the principles of nursing practice, protecting, enhancing and promoting the elderly patient's health potential. It is suggested that these themes of dignity provide a frame of reference in elder care; they shape the understanding of when health issues become a concern for health-promoting care for the elderly...... patient and what goals should be defined. Key words: Dignity, elderly patient, phenomenological hermeneutical method....

  15. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  16. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  17. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  18. Basic study on the rectangular numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1997-06-01

    The present study was conducted to examine the optimum inter-key spacing of numeric rectangular keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) participated in the experiment. Each subject performed the data entry task using rectangular keys of touch devices. These keys were arranged in both horizontal and vertical layouts. The sizes of the rectangular keys in both layouts were 12 x 21 mm and 15 x 39 mm, and each of the inter-key spacing of each key was 0, 3, 6, 12 and 21 mm. The response time with inter-key spacing of 3 mm was significantly faster than with the inter-key spacing of 0, 12 and 21 mm (p < 0.05). Keys of vertical position produced faster response time than that of horizontal position. The subjective ratings showed that the inter-key spacing of 6 mm was significantly better than the inter-key spacing of 0, 3, 12 and 21 mm (p < 0.05).

  19. Quantum cryptography to satellites for global secure key distribution

    Science.gov (United States)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  20. Accelerating foreign-key joins using asymmetric memory channels

    NARCIS (Netherlands)

    Pirk, H.; Manegold, S.; Kersten, M.

    2011-01-01

    Indexed Foreign-Key Joins expose a very asymmetric access pattern: the Foreign-Key Index is sequentially scanned whilst the Primary-Key table is target of many quasi-random lookups which is the dominant cost factor. To reduce the costs of the random lookups the fact-table can be (re-) partitioned at

  1. Extensible router for a quantum key distribution network

    International Nuclear Information System (INIS)

    Zhang Tao; Mo Xiaofan; Han Zhengfu; Guo Guangcan

    2008-01-01

    Building a quantum key distribution network is crucial for practical quantum cryptography. We present a scheme to build a star topology quantum key distribution network based on wavelength division multiplexing which, with current technology, can connect at least a hundred users. With the scheme, a 4-user demonstration network was built up and key exchanges were performed

  2. Research of user key management mechanisms in the cloud

    Directory of Open Access Journals (Sweden)

    Іван Федорович Аулов

    2016-06-01

    Full Text Available The results of comparison and recommendations on the use of existing user key management mechanisms in the cloud environment are given. New generation and installing mechanism of a private key pair between the N-means of key management in the cloud by using a modified Diffie-Hellman protocol is proposed

  3. Key scientific problems from Cosmic Ray History

    Science.gov (United States)

    Lev, Dorman

    2016-07-01

    Recently was published the monograph "Cosmic Ray History" by Lev Dorman and Irina Dorman (Nova Publishers, New York). What learn us and what key scientific problems formulated the Cosmic Ray History? 1. As many great discoveries, the phenomenon of cosmic rays was discovered accidentally, during investigations that sought to answer another question: what are sources of air ionization? This problem became interesting for science about 230 years ago in the end of the 18th century, when physics met with a problem of leakage of electrical charge from very good isolated bodies. 2. At the beginning of the 20th century, in connection with the discovery of natural radioactivity, it became apparent that this problem is mainly solved: it was widely accepted that the main source of the air ionization were α, b, and γ - radiations from radioactive substances in the ground (γ-radiation was considered as the most important cause because α- and b-radiations are rapidly absorbed in the air). 3. The general accepted wrong opinion on the ground radioactivity as main source of air ionization, stopped German meteorologist Franz Linke to made correct conclusion on the basis of correct measurements. In fact, he made 12 balloon flights in 1900-1903 during his PhD studies at Berlin University, carrying an electroscope to a height of 5500 m. The PhD Thesis was not published, but in Thesis he concludes: "Were one to compare the presented values with those on ground, one must say that at 1000 m altitude the ionization is smaller than on the ground, between 1 and 3 km the same amount, and above it is larger with values increasing up to a factor of 4 (at 5500 m). The uncertainties in the observations only allow the conclusion that the reason for the ionization has to be found first in the Earth." Nobody later quoted Franz Linke and although he had made the right measurements, he had reached the wrong conclusions, and the discovery of CR became only later on about 10 years. 4. Victor Hess, a

  4. KEY COMPARISON: Key comparison CCQM-K60: Total selenium and selenomethionine in selenised wheat flour

    Science.gov (United States)

    Goenaga Infante, Heidi; Sargent, Mike

    2010-01-01

    Key comparison CCQM-K60 was performed to assess the analytical capabilities of national metrology institutes (NMIs) to accurately quantitate the mass fraction of selenomethionine (SeMet) and total selenium (at low mg kg-1 levels) in selenised wheat flour. It was organized by the Inorganic Analysis Working Group (IAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) as a follow-up key comparison to the previous pilot study CCQM-P86 on selenised yeast tablets. LGC Limited (Teddington, UK) and the Institute for National Measurement Standards, National Research Council Canada (NRCC, Ottawa, Canada) acted as the coordinating laboratories. CCQM-K60 was organized in parallel with a pilot study (CCQM-P86.1) involving not only NMIs but also expert laboratories worldwide, thus enabling them to assess their capabilities, discover problems and learn how to modify analytical procedures accordingly. Nine results for total Se and four results for SeMet were reported by the participant NMIs. Methods used for sample preparation were microwave assisted acid digestion for total Se and multiple-step enzymatic hydrolysis and hydrolysis with methanesulfonic acid for SeMet. For total Se, detection techniques included inductively coupled plasma mass spectrometry (ICP-MS) with external calibration, standard additions or isotope dilution analysis (IDMS); instrumental neutron activation analysis (INAA); and graphite furnace atomic absorption spectrometry (GFAAS) with external calibration. For determination of SeMet in the wheat flour sample, the four NMIs relied upon measurements using species-specific IDMS (using 76Se-enriched SeMet) with HPLC-ICP-MS. Eight of the nine participating NMIs reported results for total Se within 3.5% deviation from the key comparison reference value (KCRV). For SeMet, the four participating NMIs reported results within 3.2% deviation from the KCRV. This shows that the performance of the majority of the CCQM-K60 participants was very good

  5. Autoshaping of key pecking in pigeons with negative reinforcement1

    Science.gov (United States)

    Rachlin, Howard

    1969-01-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key. ImagesFig. 3.Fig. 4. PMID:16811371

  6. Autoshaping of key pecking in pigeons with negative reinforcement.

    Science.gov (United States)

    Rachlin, H

    1969-07-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key.

  7. Mitigation of Control Channel Jamming via Combinatorial Key Distribution

    Science.gov (United States)

    Falahati, Abolfazl; Azarafrooz, Mahdi

    The problem of countering control channel jamming against internal adversaries in wireless ad hoc networks is addressed. Using combinatorial key distribution, a new method to secure the control channel access is introduced. This method, utilizes the established keys in the key establishment phase to hide the location of control channels without the need for a secure BS. This is in obtained by combination of a collision free one-way function and a combinatorial key establishment method. The proposed scheme can be considered as a special case of the ALOHA random access schemes which uses the common established keys as its seeds to generate the pattern of transmission.

  8. Formal Analysis of Key Integrity in PKCS#11

    Science.gov (United States)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  9. Key-space analysis of double random phase encryption technique

    Science.gov (United States)

    Monaghan, David S.; Gopinathan, Unnikrishnan; Naughton, Thomas J.; Sheridan, John T.

    2007-09-01

    We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

  10. Multicomponent reactions provide key molecules for secret communication.

    Science.gov (United States)

    Boukis, Andreas C; Reiter, Kevin; Frölich, Maximiliane; Hofheinz, Dennis; Meier, Michael A R

    2018-04-12

    A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message.

  11. Secret key distillation from shielded two-qubit states

    International Nuclear Information System (INIS)

    Bae, Joonwoo

    2010-01-01

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  12. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  13. Key factors influencing the intention of telecare adoption: an institutional perspective.

    Science.gov (United States)

    Liu, Chung-Feng

    2011-05-01

    The objective of this study was to explore key factors of influence on the adoption of telecare by care institutions. This investigation was based on an extensive Technology-Organization-Environment framework comprising the four constructs of technology, organization, environment, and the project planning as well as corresponding variables. This study utilized a self-administered questionnaire for data collection, focusing on the managers of all 339 nursing homes in Taiwan for the census survey. A total of 70 valid questionnaires yielded a response rate of 20.65%. After analyzing the responses through the Partial Least Squares approach, government support, technological knowledge, supplier support, team skills, and compatibility were found to be the five key factors that positively impact intention to adopt telecare from an institutional perspective. The results of this study indicated that care institutions, for the most part, are willing to develop telecare and are already incorporating preliminary applications of telecare, such as distance learning and resident positioning. Solutions to potential issues related to implementing telecare in practice are also proposed in this study.

  14. [Medical interviewing, initial key step in the disease diagnosis].

    Science.gov (United States)

    Scheen, A J

    2013-11-01

    Medicine combines the characteristics of both a science and an art. The main objective is to cure the patient (or at least to alleviate symptoms). The first step of the global medical approach is to make a diagnosis, which will determine the therapy. Since Hippocrates, semiology, i.e. the study of both symptoms and signs, is crucial to make or guide the disease diagnosis. The development of more and more sophisticated medical technologies may lead to believe that semiology is not useful anymore in medical practice. It is absolutely not true because a careful semiology can provide precise diagnoses in a majority of cases or, at least, can lead to a limited differential diagnosis that helps in the selection of a few well defined complementary investigations. The aim of this article targeting mainly medical students is to emphasize the key rules of a well done medical interviewing, which should progress from an "analytical" approach to a "syndromic" approach, combining knowledge, know-how and self-management skills.

  15. Inflammatory breast cancer biology: the tumour microenvironment is key.

    Science.gov (United States)

    Lim, Bora; Woodward, Wendy A; Wang, Xiaoping; Reuben, James M; Ueno, Naoto T

    2018-04-27

    Inflammatory breast cancer (IBC) is a rare and aggressive disease that accounts for ~2-4% of all breast cancers. However, despite its low incidence rate, IBC is responsible for 7-10% of breast cancer-related mortality in Western countries. Thus, the discovery of robust biological targets and the development of more effective therapeutics in IBC are crucial. Despite major international efforts to understand IBC biology, genomic studies have not led to the discovery of distinct biological mechanisms in IBC that can be translated into novel therapeutic strategies. In this Review, we discuss these molecular profiling efforts and highlight other important aspects of IBC biology. We present the intrinsic characteristics of IBC, including stemness, metastatic potential and hormone receptor positivity; the extrinsic features of the IBC tumour microenvironment (TME), including various constituent cell types; and lastly, the communication between these intrinsic and extrinsic components. We summarize the latest perspectives on the key biological features of IBC, with particular emphasis on the TME as an important contributor to the aggressive nature of IBC. On the basis of the current understanding of IBC, we hope to develop the next generation of translational studies, which will lead to much-needed survival improvements in patients with this deadly disease.

  16. USP : Key Considerations and Changes for Health Systems

    Science.gov (United States)

    Sahadeo, Priya; Weber, Robert J.

    2015-01-01

    On March 28, 2014, The United States Pharmacopeia and The National Formulary (USP-NF) published USP General Chapter Hazardous Drugs–Handling in Healthcare Settings, as open for public comment in the USP Pharmacopeial Forum (PF) 40(3). Pharmacy directors must be proactive in understanding the impact that USP will have on their processes for preparing sterile products. USP General Chapter pertains to the compounding of both hazardous and nonhazardous drugs. USP serves as a new standard to guide the handling of hazardous drugs in order to protect patients, health care personnel, and the environment. USP describes hazardous drug handling related to the receipt, storage, compounding, dispensing, administration, and disposal of both sterile and nonsterile products and preparations. Regardless of all of the requirements listed in USP , there is no substitute for disciplined, consistent work practices regarding proper sterile technique. This point should be emphasized with all compounding personnel. Even if one is compounding in the most compliant USP cleanroom, improper technique can negate all the benefits of the physical structures. Pharmacy leaders at every level will play a key role in assisting an organization to achieve timely compliance with USP standards. Until the standard becomes official, it is important for pharmacists to become familiarized with the latest draft to identify potential barriers to compliance and to strategize a plan to overcome barriers. Although complying with USP may seem to be a daunting task, it can be manageable if approached in a systematic organized way. PMID:27729683

  17. Five Key Leadership Actions Needed to Redesign Family Medicine Residencies.

    Science.gov (United States)

    Kozakowski, Stanley M; Eiff, M Patrice; Green, Larry A; Pugno, Perry A; Waller, Elaine; Jones, Samuel M; Fetter, Gerald; Carney, Patricia A

    2015-06-01

    New skills are needed to properly prepare the next generation of physicians and health professionals to practice in medical homes. Transforming residency training to address these new skills requires strong leadership. We sought to increase the understanding of leadership skills useful in residency programs that plan to undertake meaningful change. The Preparing the Personal Physician for Practice (P4) project (2007-2014) was a comparative case study of 14 family medicine residencies that engaged in innovative training redesign, including altering the scope, content, sequence, length, and location of training to align resident education with requirements of the patient-centered medical home. In 2012, each P4 residency team submitted a final summary report of innovations implemented, overall insights, and dissemination activities during the study. Six investigators conducted independent narrative analyses of these reports. A consensus meeting held in September 2012 was used to identify key leadership actions associated with successful educational redesign. Five leadership actions were associated with successful implementation of innovations and residency transformation: (1) manage change; (2) develop financial acumen; (3) adapt best evidence educational strategies to the local environment; (4) create and sustain a vision that engages stakeholders; and (5) demonstrate courage and resilience. Residency programs are expected to change to better prepare their graduates for a changing delivery system. Insights about effective leadership skills can provide guidance for faculty to develop the skills needed to face practical realities while guiding transformation.

  18. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  19. Optimizing prognosis-related key miRNA-target interactions responsible for cancer metastasis.

    Science.gov (United States)

    Zhao, Hongying; Yuan, Huating; Hu, Jing; Xu, Chaohan; Liao, Gaoming; Yin, Wenkang; Xu, Liwen; Wang, Li; Zhang, Xinxin; Shi, Aiai; Li, Jing; Xiao, Yun

    2017-12-12

    Increasing evidence suggests that the abnormality of microRNAs (miRNAs) and their downstream targets is frequently implicated in the pathogenesis of human cancers, however, the clinical benefit of causal miRNA-target interactions has been seldom studied. Here, we proposed a computational method to optimize prognosis-related key miRNA-target interactions by combining transcriptome and clinical data from thousands of TCGA tumors across 16 cancer types. We obtained a total of 1,956 prognosis-related key miRNA-target interactions between 112 miRNAs and 1,443 their targets. Interestingly, these key target genes are specifically involved in tumor progression-related functions, such as 'cell adhesion' and 'cell migration'. Furthermore, they are most significantly correlated with 'tissue invasion and metastasis', a hallmark of metastasis, in ten distinct types of cancer through the hallmark analysis. These results implicated that the prognosis-related key miRNA-target interactions were highly associated with cancer metastasis. Finally, we observed that the combination of these key miRNA-target interactions allowed to distinguish patients with good prognosis from those with poor prognosis both in most TCGA cancer types and independent validation sets, highlighting their roles in cancer metastasis. We provided a user-friendly database named miRNATarget (freely available at http://biocc.hrbmu.edu.cn/miRNATar/), which provides an overview of the prognosis-related key miRNA-target interactions across 16 cancer types.

  20. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    Science.gov (United States)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  1. Characterization of available light for seagrass and patch reef productivity in Sugarloaf Key, Lower Florida Keys

    Science.gov (United States)

    Toro-Farmer, Gerardo; Muller-Karger, Frank E.; Vega-Rodriguez, Maria; Melo, Nelson; Yates, Kimberly K.; Johns, Elizabeth; Cerdeira-Estrada, Sergio; Herwitz, Stan R.

    2016-01-01

    Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP) was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively). Higher photosynthetic active radiation (PAR) levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm) had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  2. Characterization of Available Light for Seagrass and Patch Reef Productivity in Sugarloaf Key, Lower Florida Keys

    Directory of Open Access Journals (Sweden)

    Gerardo Toro-Farmer

    2016-01-01

    Full Text Available Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively. Higher photosynthetic active radiation (PAR levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  3. Enhanced diffie-hellman algorithm for reliable key exchange

    Science.gov (United States)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  4. Patients' attitudes towards animal testing

    DEFF Research Database (Denmark)

    Masterton, Malin; Renberg, Tobias; Kälvemark Sporrong, Sofia

    2014-01-01

    stakeholders. This study compared the attitudes of patients and researchers on animal testing. Focus-group interviews were held with patients suffering from chronic inflammatory diseases, resulting in a questionnaire that was distributed January–May 2011. The questionnaire was posted to patient members...... of support is comparable to those held by the general public found in national surveys. A clear majority of researchers were positive towards animal testing, and large statistical differences between patients and researchers were found regarding their attitudes towards testing animals commonly held as pets...... (Pattitude towards animal testing is not shared to an equal degree with patients, who are the intended end-users and beneficiaries of medical...

  5. Key barriers to gout care: a systematic review and thematic synthesis of qualitative studies.

    Science.gov (United States)

    Rai, Sharan K; Choi, Hyon K; Choi, Sally H J; Townsend, Anne F; Shojania, Kam; De Vera, Mary A

    2018-04-17

    Gout care remains highly suboptimal, contributing to an increased global disease burden. To understand barriers to gout care, our aim was to provide a systematic review and thematic synthesis of qualitative studies worldwide reporting provider and patient perspectives and experiences with management. We conducted a mapped search of MEDLINE, EMBASE, Cumulative Index to Nursing and Allied Health Literature, and Social Sciences Citation Index databases and selected qualitative studies of provider and patient perspectives on gout management. We used thematic synthesis to combine the included studies and identify key themes across studies. We included 20 studies that reported the experiences and perspectives of 480 gout patients and 120 providers spanning five different countries across three continents. We identified three predominant provider themes: knowledge gaps and management approaches; perceptions and beliefs about gout patients; and system barriers to optimal gout care (e.g. time constraints and a lack of incentives). We also identified four predominant themes among gout patients: limited gout knowledge; interactions with health-care providers; attitudes towards and experiences with taking medication; and practical barriers to long-term medication use. Our systematic review of worldwide literature consistently identified gaps in gout knowledge among providers, which is likely to contribute to patients' lack of appropriate education about the fundamental causes of and essential treatment approaches for gout. Furthermore, system barriers among providers and day-to-day challenges of taking long-term medications among patients are considerable. These factors provide key targets to improve the widespread suboptimal gout care.

  6. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  7. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  8. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  9. Partial Key Grouping: Load-Balanced Partitioning of Distributed Streams

    OpenAIRE

    Nasir, Muhammad Anis Uddin; Morales, Gianmarco De Francisci; Garcia-Soriano, David; Kourtellis, Nicolas; Serafini, Marco

    2015-01-01

    We study the problem of load balancing in distributed stream processing engines, which is exacerbated in the presence of skew. We introduce PARTIAL KEY GROUPING (PKG), a new stream partitioning scheme that adapts the classical “power of two choices” to a distributed streaming setting by leveraging two novel techniques: key splitting and local load estimation. In so doing, it achieves better load balancing than key grouping while being more scalable than shuffle grouping. We test PKG on severa...

  10. Duplication of Key Frames of Video Streams in Wireless Networks

    OpenAIRE

    Sagatov, Evgeny S.; Sukhov, Andrei M.

    2011-01-01

    In this paper technological solutions for improving the quality of video transfer along wireless networks are investigated. Tools have been developed to allow packets to be duplicated with key frames data. In the paper we tested video streams with duplication of all frames, with duplication of key frames, and without duplication. The experiments showed that the best results are obtained by duplication of packages which contain key frames. The paper also provides an overview of the coefficient...

  11. Code for plant identification (KKS) key in PC version

    International Nuclear Information System (INIS)

    Pannenbaecker, K.

    1991-01-01

    The plant identification system (KKS) as a common development of german plant operators, erection firms and also power plant oriented organisations have decisively influenced the technical-organizing activities of planning and erections as operations and maintenance of all kind of power plants. Fundamentals are three key parts, operation, armatures and function keys. Their management and application is executed by a plantidentification-key code in a PC version, which is briefly described in this report. (orig.) [de

  12. Small Private Key PKS on an Embedded Microprocessor

    OpenAIRE

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor...

  13. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  14. Architectural Building A Public Key Infrastructure Integrated Information Space

    Directory of Open Access Journals (Sweden)

    Vadim Ivanovich Korolev

    2015-10-01

    Full Text Available The article keeps under consideration the mattersto apply the cryptographic system having a public key to provide information security and to implya digital signature. It performs the analysis of trust models at the formation of certificates and their use. The article describes the relationships between the trust model and the architecture public key infrastructure. It contains conclusions in respect of the options for building the public key infrastructure for integrated informationspace.

  15. Ranunculaceae of the Western Ukraine. І. Identification key

    OpenAIRE

    Novikoff A.

    2013-01-01

    In these paper the identification key for Ranunculaceae of Lviv, Transcarpathian (Zakarpattia), Rivne, Volhynia, Ivano-Frankivsk, Chernivtsi, Ternopil and Khmelnitsk regions (oblasts) is introduced. The key includes 102 species. It is based on contemporary investigations on taxonomy of the family Ranunculaceae. The key is carried out up to the level of species but in some cases there are short remarks about subspecific structure of selected taxa. Also it is supported by short notes about ...

  16. Workplace wellness programs in Canada: an exploration of key issues.

    Science.gov (United States)

    Morrison, Erin; MacKinnon, Neil J

    2008-01-01

    Faced with the reality of rising health costs, Canadian employers are thinking beyond traditional notions of responsibility for employee health and have begun to embrace Workplace Wellness Programs (WWPs). This article investigates the critical issues of WWPs in the Canadian context from the perspective of key stakeholders. Using a combination of literature and key informant interviews, seven key themes are presented along with recommendations for wider implementation of WWPs in Canada.

  17. Public key infrastructure building trusted applications and web services

    CERN Document Server

    Vacca, John R

    2004-01-01

    OVERVIEW OF PKI TECHNOLOGYPublic Key Infrastructures (PKIs): What Are They?Type of Certificate Authorities (CAS) ServicesPKI StandardsTypes of Vendor and Third-Party CA SystemsProtecting Private KeysCA System AttacksStolen Private Keys: What Can Be Done?Certificate Practice StatementsPKI ReadinessANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURESPKI Design IssuesCost Justification and ConsiderationPKI Standards Design IssuesPKI Architectural Design ConsiderationsIMPLEMENTING PKIRequirementsImplementation ScheduleImplementation CostsPKI PerformanceMANAGING PKIRequesting a CertificateObtaining a

  18. Key events in the history of sustainable development

    OpenAIRE

    Sustainable Development Commission

    2005-01-01

    This document is a table which summaries the key events in the history of sustainable development, adapted from International Institute for Sustainable Development's sustainable development timeline. Publisher PDF

  19. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  20. DNA based random key generation and management for OTP encryption.

    Science.gov (United States)

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  1. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  2. Experimental demonstration of subcarrier multiplexed quantum key distribution system.

    Science.gov (United States)

    Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José

    2012-06-01

    We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.

  3. Entangled quantum key distribution with a biased basis choice

    International Nuclear Information System (INIS)

    Erven, Chris; Ma Xiongfeng; Laflamme, Raymond; Weihs, Gregor

    2009-01-01

    We investigate a quantum key distribution (QKD) scheme that utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a more refined error analysis and finite key size effects are all studied in order to assure the security of the final key generated with the system. We then implement the scheme in a local entangled QKD system that uses polarization entangled photon pairs to securely distribute the key. A 50/50 non-polarizing beamsplitter (BS) with different optical attenuators is used to simulate a variable BS in order to allow us to study the operation of the system for different biases. Over 6 h of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550 secure key bits per raw key bit for the unbiased case. This represents an increase in the efficiency of the key generation rate by 79%.

  4. Identifying Key Issues and Potential Solutions for Integrated Arrival, Departure, Surface Operations by Surveying Stakeholder Preferences

    Science.gov (United States)

    Aponso, Bimal; Coppenbarger, Richard A.; Jung, Yoon; Quon, Leighton; Lohr, Gary; O’Connor, Neil; Engelland, Shawn

    2015-01-01

    NASA's Aeronautics Research Mission Directorate (ARMD) collaborates with the FAA and industry to provide concepts and technologies that enhance the transition to the next-generation air-traffic management system (NextGen). To facilitate this collaboration, ARMD has a series of Airspace Technology Demonstration (ATD) sub-projects that develop, demonstrate, and transitions NASA technologies and concepts for implementation in the National Airspace System (NAS). The second of these sub-projects, ATD-2, is focused on the potential benefits to NAS stakeholders of integrated arrival, departure, surface (IADS) operations. To determine the project objectives and assess the benefits of a potential solution, NASA surveyed NAS stakeholders to understand the existing issues in arrival, departure, and surface operations, and the perceived benefits of better integrating these operations. NASA surveyed a broad cross-section of stakeholders representing the airlines, airports, air-navigation service providers, and industry providers of NAS tools. The survey indicated that improving the predictability of flight times (schedules) could improve efficiency in arrival, departure, and surface operations. Stakeholders also mentioned the need for better strategic and tactical information on traffic constraints as well as better information sharing and a coupled collaborative planning process that allows stakeholders to coordinate IADS operations. To assess the impact of a potential solution, NASA sketched an initial departure scheduling concept and assessed its viability by surveying a select group of stakeholders for a second time. The objective of the departure scheduler was to enable flights to move continuously from gate to cruise with minimal interruption in a busy metroplex airspace environment using strategic and tactical scheduling enhanced by collaborative planning between airlines and service providers. The stakeholders agreed that this departure concept could improve schedule

  5. Digitale Archivierung papierbasierter Krankenakten von Studienpatienten – Eckpunktepapier des KKSN, der GMDS und der TMF unter Mitwirkung des BfArM und der Landesüberwachungsbehörde Nordrhein-Westfalen [Digital archiving of paper-based patient records of clinical trial subjects – a key issues paper of KKSN, GMDS, and TMF in collaboration with the Federal Institute for Drugs and Medical Devices (BfArM and the Health Authority Northrhine-Westphalia

    Directory of Open Access Journals (Sweden)

    Kohl, Christian D.

    2013-04-01

    Full Text Available [english] The management and maintenance of paper-based patient record archives involve high running costs. Therefore, many health care providers choose to digitize their paper records subsequently destroying the originals. By now, this is an established procedure for patient records from routine care.However, at present it is unclear under which circumstances the patient records of patients taking part in clinical trials can be destroyed after digitization. Paper-based original records may only be destroyed if their digital copies are recognized as source documents by both sponsors and authorities. The authors believe that this recognition should be possible, as long as the scanned paper-based records fulfill the requirements for certified copies according to the Note for Guidance (ICH-GCP. This requires that, based on the applied rules, it can be proven at any time that the existing digitization process is clearly regulated, and the resulting quality is regularly controlled and sufficiently high.The objective of this key issues paper is to present the manner in which the existing regulatory guidelines can be implemented to allow the digitized patient records being recognized as source documents.An English version of this article will be published in “Clinical Investigation” (Future Science .[german] Das Verwalten und Vorhalten von Archiven für papierbasierte Patientenakten verursacht hohe laufende Kosten. Viele Gesundheitsversorger sind daher dazu übergegangen, ihre Papierakten in einem Scan-Prozess zu digitalisieren und die Originalakten anschließend zu vernichten. Für die Patientenversorgung hat sich dieses Vorgehen bewährt.Zum gegenwärtigen Zeitpunkt ist jedoch unklar, unter welchen Voraussetzungen Krankenakten von Patienten, die an klinischen Studien teilnehmen, nach dem Digitalisieren vernichtet werden können. Die papierbasierten Originalakten können nur dann vernichtet werden, wenn deren digitale Kopien von Sponsoren und Beh

  6. Patient activation and use of an electronic patient portal.

    Science.gov (United States)

    Ancker, Jessica S; Osorio, Snezana N; Cheriff, Adam; Cole, Curtis L; Silver, Michael; Kaushal, Rainu

    2015-01-01

    Electronic patient portals give patients access to personal medical data, potentially creating opportunities to improve knowledge, self-efficacy, and engagement in healthcare. The combination of knowledge, self-efficacy, and engagement has been termed activation. Our objective was to assess the relationship between patient activation and outpatient use of a patient portal. Survey. A telephone survey was conducted with 180 patients who had been given access to a portal, 113 of whom used it and 67 of whom did not. The validated patient activation measure (PAM) was administered along with questions about demographics and behaviors. Portal users were no different from nonusers in patient activation. Portal users did have higher education level and more frequent Internet use, and were more likely to have precisely 2 prescription medications than to have more or fewer. Patients who chose to use an electronic patient portal were not more highly activated than nonusers, although they were more educated and more likely to be Internet users.

  7. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  8. Calculation of key reduction for B92 QKD protocol

    Science.gov (United States)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  9. Space division multiplexing chip-to-chip quantum key distribution

    DEFF Research Database (Denmark)

    Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld

    2017-01-01

    nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum...

  10. Sound Computational Interpretation of Formal Encryption with Composed Keys

    NARCIS (Netherlands)

    Laud, P.; Corin, R.J.; In Lim, J.; Hoon Lee, D.

    2003-01-01

    The formal and computational views of cryptography have been related by the seminal work of Abadi and Rogaway. In their work, a formal treatment of encryption that uses atomic keys is justified in the computational world. However, many proposed formal approaches allow the use of composed keys, where

  11. Password Authenticated Key Exchange and Protected Password Change Protocols

    Directory of Open Access Journals (Sweden)

    Ting-Yi Chang

    2017-07-01

    Full Text Available In this paper, we propose new password authenticated key exchange (PAKE and protected password change (PPC protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

  12. Chirp investigation in EMLs towards frequency shift keying modulation

    DEFF Research Database (Denmark)

    Iglesias Olmedo, Miguel; Vegas Olmos, Juan José; Westergren, Urban

    2014-01-01

    This paper presents a chirp modeling and experimental results that support our vision of enabling frequency shift keying (FSK) exploiting the chirp effect in externally modulated lasers (EMLs).......This paper presents a chirp modeling and experimental results that support our vision of enabling frequency shift keying (FSK) exploiting the chirp effect in externally modulated lasers (EMLs)....

  13. Perceptions of food risk management among key stakeholders

    DEFF Research Database (Denmark)

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  14. Climate Neutral Campus Key Terms and Definitions | Climate Neutral Research

    Science.gov (United States)

    Campuses | NREL Neutral Campus Key Terms and Definitions Climate Neutral Campus Key Terms and Definitions The term climate neutral evolved along with net zero and a number of other "green" and accuracy in these areas lets research campuses know exactly how close they are to climate

  15. Flora of St Katherine Protectorate: key to families and genera ...

    African Journals Online (AJOL)

    An illustrated key to families and genera of the flora of the St Katherine Protectorate is provided to facilitate the identification of the unique flora of the area, based on five years of collecting mainly in the mountains and wadis surrounding the town of St Katherine. The key includes 43 families and 141 genera, the families ...

  16. Quantum Key Distribution Using Four-Qubit W State

    International Nuclear Information System (INIS)

    Cai Haijing; Song Heshan

    2006-01-01

    A new theoretical quantum key distribution scheme based on entanglement swapping is proposed, where four-qubit symmetric W state functions as quantum channel. It is shown that two legitimate users can secretly share a series of key bits by using Bell-state measurements and classical communication.

  17. Research Note Identifying key grazing indicators to monitor trends in ...

    African Journals Online (AJOL)

    Research Note Identifying key grazing indicators to monitor trends in the veld condition of Lambert's Bay Strandveld, South Africa. ... from which a minimum number of species necessary to monitor trends in the condition of the veld were determined, making it user-friendly for land-users, extension officers and others. The key ...

  18. Key Update Assistant for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    developed a push-button solution - powered by stochastic model checking - that network designers can easily benefit from, and it paves the way for consumers to set up key update related security parameters. Key Update Assistant, as we named it, runs necessary model checking operations and determines...

  19. Key factors influencing the implementation success of home telecare application.

    NARCIS (Netherlands)

    Postema, T.R.F.; Peeters, J.M.; Friele, R.D.

    2012-01-01

    Rationale: The introduction of home telecare in healthcare organizations has shown mixed results in practice. The aim of this study is to arrive at a set of key factors that can be used in further implementation of video communication. We argue that key factors are mainly found in the organizational

  20. Key agreement in peer-to-peer wireless networks

    DEFF Research Database (Denmark)

    Cagalj, Mario; Capkun, Srdjan; Hubaux, Jean-Pierre

    2006-01-01

    We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the “man-in-the-middle” attack if the two users involved in the protocol do not share any ...