WorldWideScience

Sample records for previously established protocol

  1. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  2. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  3. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  4. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  5. The relationship between cerebrovascular complications and previously established use of antiplatelet therapy in left-sided infective endocarditis

    DEFF Research Database (Denmark)

    Snygg-Martin, Ulrika; Rasmussen, Rasmus Vedby; Hassager, Christian

    2011-01-01

    Cerebrovascular complications (CVC) in infective endocarditis (IE) are common. The only established treatments to reduce the incidence of CVC in IE are antibiotics and in selected cases early cardiac surgery. Potential effects of previously established antiplatelet therapy are under debate....

  6. Changes in the dominance hierarchy of captive female Japanese macaques as a consequence of merging two previously established groups.

    Science.gov (United States)

    Anderson, Emily J; Weladji, Robert B; Paré, Patrick

    2016-11-01

    Dominance hierarchies play an important role in reducing competition and aggression in social animals. In zoos, changes in group composition are often required due to management protocols, but these changes may have long lasting effects on dominance hierarchies, and, consequently, the wellbeing of the animals. We studied the changes in the female dominance hierarchy that occurred both during and after the formation of a group of 10 adult Japanese macaques at the Zoo de Granby by combining members from two previously established groups. There was no significant correlation between individual ranks in the old groups (groups A and B) and their ranks in the new group (group AB), indicating a significant change in the hierarchy. Alliances between kin appeared to be important in determining rank; when the sister of the dominant female was removed from group AB, the hierarchy changed significantly a second time. The average standardized rank of individuals added later in the formation process of group AB was not different from those added earlier. Ranks in the group AB did correlate with age of individual at the beginning of the field season, but not at the end, after the shift in hierarchy occurred. Zoo management must be aware of the consequences small changes in a social group can have when removing and transferring individuals in both primates and in other social species. Zoo Biol. 35:505-512, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  7. [Comparison of the present and previously used protocol of risk stratification in children with acute lymphoblastic leukemia].

    Science.gov (United States)

    Glodkowska, Eliza; Bialas, Agnieszka; Jackowska, Teresa

    2007-01-01

    Acute lymphoblastic leukaemia (ALL) is one of the most common cancers in children. In Poland, since November 2002 a new protocol of risk stratification has been recommended for assessment of risk factors and for choosing therapy regimens. assessment of accuracy of protocol ALL-IC 2002 in comparison to previously used risk stratification protocols. ALL was diagnosed in 100 children (44 girls, 56 boys; 1-18 years of age) in the Department of Pediatric Hematology and Oncology, Warsaw Medical University, over the period from November 2002 to November 2006. According to the ALL-IC 2002 protocol the patients were divided into three risk groups: SR-standard, IR-intermediate and HR-high. The stratification was by age, leukocyte count, cytogenetic changes, early response to prednisone therapy and bone marrow remission. In the previously used risk stratification protocols-BFM-90, only hepatosplenomegaly and the number of blasts in peripheral blood (PB) were considered, and the patients were divided into three risk groups: low (LRG1.2). out of the 100 patients qualified for treatment regimens according to the ALL-IC 2002 protocol, 97 entered remission, 11 died and 3 had a relapse. Under the ALL-IC 2002 protocol these children were stratified into the following groups: SR-31%, IR-44% and HR-25%. In the previously used stratification, there would be 26% children in low, 46% in the medium and 28% in the high risk group. According to the BFM-90 protocol 18/31 (58%) and 16/44 (36%) patients from the SR and IR groups respectively would be given more intensive treatment. On the other hand 11/44 (25%) and 14/25 (56%) patients from the IR and HR groups respectively would be given less intensive treatment. 1. ALL-IC 2002 protocol in comparison with the previously used protocol BFM-90, changes the qualification of children with ALL for the SR, IR and HR risk groups. This is linked to basic change of treatment protocol, adequate to severity of disease. 2. Children with ALL qualified

  8. Protocol for the establishment and operation of LTPP sections

    CSIR Research Space (South Africa)

    Jones, DJ

    2004-03-01

    Full Text Available and responsibilities • Site location and establishment • Data collection • Reporting criteria A set of data capture forms is provided. Keywords: Long term pavement performance, LTPP, APT, HVS Proposals for implementation: None... of pavement performance models used in pavement management systems. It is also recognized that the link between accelerated pavement testing (APT) and in- service pavement performance is through LTPP studies. While APT can, and does, provide significant...

  9. Learning Recruits Neurons Representing Previously Established Associations in the Corvid Endbrain.

    Science.gov (United States)

    Veit, Lena; Pidpruzhnykova, Galyna; Nieder, Andreas

    2017-10-01

    Crows quickly learn arbitrary associations. As a neuronal correlate of this behavior, single neurons in the corvid endbrain area nidopallium caudolaterale (NCL) change their response properties during association learning. In crows performing a delayed association task that required them to map both familiar and novel sample pictures to the same two choice pictures, NCL neurons established a common, prospective code for associations. Here, we report that neuronal tuning changes during learning were not distributed equally in the recorded population of NCL neurons. Instead, such learning-related changes relied almost exclusively on neurons which were already encoding familiar associations. Only in such neurons did behavioral improvements during learning of novel associations coincide with increasing selectivity over the learning process. The size and direction of selectivity for familiar and newly learned associations were highly correlated. These increases in selectivity for novel associations occurred only late in the delay period. Moreover, NCL neurons discriminated correct from erroneous trial outcome based on feedback signals at the end of the trial, particularly in newly learned associations. Our results indicate that task-relevant changes during association learning are not distributed within the population of corvid NCL neurons but rather are restricted to a specific group of association-selective neurons. Such association neurons in the multimodal cognitive integration area NCL likely play an important role during highly flexible behavior in corvids.

  10. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  11. Alkylation induced cerebellar degeneration dependent on Aag and Parp1 does not occur via previously established cell death mechanisms.

    Directory of Open Access Journals (Sweden)

    Carrie M Margulies

    Full Text Available Alkylating agents are ubiquitous in our internal and external environments, causing DNA damage that contributes to mutations and cell death that can result in aging, tissue degeneration and cancer. Repair of methylated DNA bases occurs primarily through the base excision repair (BER pathway, a multi-enzyme pathway initiated by the alkyladenine DNA glycosylase (Aag, also known as Mpg. Previous work demonstrated that mice treated with the alkylating agent methyl methanesulfonate (MMS undergo cerebellar degeneration in an Aag-dependent manner, whereby increased BER initiation by Aag causes increased tissue damage that is dependent on activation of poly (ADP-ribose polymerase 1 (Parp1. Here, we dissect the molecular mechanism of cerebellar granule neuron (CGN sensitivity to MMS using primary ex vivo neuronal cultures. We first established a high-throughput fluorescent imaging method to assess primary neuron sensitivity to treatment with DNA damaging agents. Next, we verified that the alkylation sensitivity of CGNs is an intrinsic phenotype that accurately recapitulates the in vivo dependency of alkylation-induced CGN cell death on Aag and Parp1 activity. Finally, we show that MMS-induced CGN toxicity is independent of all the cellular events that have previously been associated with Parp-mediated toxicity, including mitochondrial depolarization, AIF translocation, calcium fluxes, and NAD+ consumption. We therefore believe that further investigation is needed to adequately describe all varieties of Parp-mediated cell death.

  12. Alkylation induced cerebellar degeneration dependent on Aag and Parp1 does not occur via previously established cell death mechanisms.

    Science.gov (United States)

    Margulies, Carrie M; Chaim, Isaac Alexander; Mazumder, Aprotim; Criscione, June; Samson, Leona D

    2017-01-01

    Alkylating agents are ubiquitous in our internal and external environments, causing DNA damage that contributes to mutations and cell death that can result in aging, tissue degeneration and cancer. Repair of methylated DNA bases occurs primarily through the base excision repair (BER) pathway, a multi-enzyme pathway initiated by the alkyladenine DNA glycosylase (Aag, also known as Mpg). Previous work demonstrated that mice treated with the alkylating agent methyl methanesulfonate (MMS) undergo cerebellar degeneration in an Aag-dependent manner, whereby increased BER initiation by Aag causes increased tissue damage that is dependent on activation of poly (ADP-ribose) polymerase 1 (Parp1). Here, we dissect the molecular mechanism of cerebellar granule neuron (CGN) sensitivity to MMS using primary ex vivo neuronal cultures. We first established a high-throughput fluorescent imaging method to assess primary neuron sensitivity to treatment with DNA damaging agents. Next, we verified that the alkylation sensitivity of CGNs is an intrinsic phenotype that accurately recapitulates the in vivo dependency of alkylation-induced CGN cell death on Aag and Parp1 activity. Finally, we show that MMS-induced CGN toxicity is independent of all the cellular events that have previously been associated with Parp-mediated toxicity, including mitochondrial depolarization, AIF translocation, calcium fluxes, and NAD+ consumption. We therefore believe that further investigation is needed to adequately describe all varieties of Parp-mediated cell death.

  13. Establishment and intra-/inter-laboratory validation of a standard protocol of reactive oxygen species assay for chemical photosafety evaluation.

    Science.gov (United States)

    Onoue, Satomi; Hosoi, Kazuhiro; Wakuri, Shinobu; Iwase, Yumiko; Yamamoto, Toshinobu; Matsuoka, Naoko; Nakamura, Kazuichi; Toda, Tsuguto; Takagi, Hironori; Osaki, Naoto; Matsumoto, Yasuhiro; Kawakami, Satoru; Seto, Yoshiki; Kato, Masashi; Yamada, Shizuo; Ohno, Yasuo; Kojima, Hajime

    2013-11-01

    A reactive oxygen species (ROS) assay was previously developed for photosafety evaluation of pharmaceuticals, and the present multi-center study aimed to establish and validate a standard protocol for ROS assay. In three participating laboratories, two standards and 42 coded chemicals, including 23 phototoxins and 19 nonphototoxic drugs/chemicals, were assessed by the ROS assay according to the standardized protocol. Most phototoxins tended to generate singlet oxygen and/or superoxide under UV-vis exposure, but nonphototoxic chemicals were less photoreactive. In the ROS assay on quinine (200 µm), a typical phototoxic drug, the intra- and inter-day precisions (coefficient of variation; CV) were found to be 1.5-7.4% and 1.7-9.3%, respectively. The inter-laboratory CV for quinine averaged 15.4% for singlet oxygen and 17.0% for superoxide. The ROS assay on 42 coded chemicals (200 µm) provided no false negative predictions upon previously defined criteria as compared with the in vitro/in vivo phototoxicity, although several false positives appeared. Outcomes from the validation study were indicative of satisfactory transferability, intra- and inter-laboratory variability, and predictive capacity of the ROS assay. Copyright © 2012 John Wiley & Sons, Ltd.

  14. Establishment of Lipofection Protocol for Efficient miR-21 Transfection into Cortical Neurons In Vitro.

    Science.gov (United States)

    Han, Zhaoli; Ge, Xintong; Tan, Jin; Chen, Fanglian; Gao, Huabin; Lei, Ping; Zhang, Jianning

    2015-12-01

    Dysregulated microRNAs in neurons could cause many nervous system diseases. The therapeutic manipulation of these pathogenic microRNAs necessitates novel, efficient delivery systems to facilitate microRNA modulators targeting neurons with minimal off-target effects. The study aimed to establish a lipofection protocol to upregulate expression levels of miR-21 in neurons under different conditions, including different serum-free medium, transfection conditions, and reagent concentration, by evaluating the expression levels of miR-21 and neuron injury. The expression levels of miR-21 were higher in neurons transfected by Neurobasal-A than by DMEM. Expression levels of miR-21 were already the highest at the ratio RNAiMAX:miR-21 = 3:5, but the increase of RNAiMAX's concentration had not caused the further upregulation of expression level of miR-21. Neuron injury was condition dependent and dose dependent after transfection. Compared to S-Neurobasal groups, neurons have a smaller injury in N-Neurobasal groups, and compared to ratios RNAiMAX:miR-21 = 4:5, 5:5, neuron injury was smaller at ratios of RNAiMAX:miR-21 = 1:5, 2:5, 3:5. Without the pretreatment of starvation in vitro, the lipofection protocol was that RNAiMAX/miR-21 agomir complexes were diluted in Neurobasal-A at the ratio of RNAiMAX:miR-21 = 3:5.

  15. Establishing a protocol for element determination in human nail clippings by neutron activation analysis

    International Nuclear Information System (INIS)

    Sanches, Thalita Pinheiro; Saiki, Mitiko

    2011-01-01

    Human nail samples have been analyzed to evaluate occupational exposure, nutritional status and to diagnose certain diseases. However, sampling and washing protocols for nail analyses vary from study to study not allowing comparisons between studies. One of the difficulties in analyzing nail samples is to eliminate only surface contamination without removing elements of interest in this tissue. In the present study, a protocol was defined in order to obtain reliable results of element concentrations in human nail clippings. Nail clippings collected from all 10 fingers or toes were previously pre cleaned using an ethyl alcohol solution to eliminate microbes. Then, the clippings were cut in small pieces and submitted to different reagents for washing by shaking. Neutron activation analysis (NAA) was applied for nail samples analysis which consisted of irradiating aliquots of samples together with synthetic elemental standards in the IEA-R1 nuclear research reactor followed by gamma ray spectrometry. Comparisons made between the results obtained for nails submitted to different reagents for cleaning indicated that the procedure using acetone and Triton X100 solution is more effective than that of nitric acid solution. Analyses in triplicates of a nail sample indicated results with relative standard deviations lower than 15% for most of elements, showing the homogeneity of the prepared sample. Qualitative analyses of different nail polishes showed that the presence of elements determined in the present study is negligible in these products. Quality control of the analytical results indicated that the applied NAA procedure is adequate for human nail analysis. (author)

  16. Establishment of a protocol for determining gastrointestinal transit time in mice using barium and radiopaque markers

    Energy Technology Data Exchange (ETDEWEB)

    Myagmarjaibuu, Bilomaa; Moon, Myeong Ju; Heo, Suk Hee; Jeong, Seo In; Jeong, Yong Yeon; Kang, Heoung Keun [Dept. of Radiology, Chonnam National University Hwasun Hospital, Chonnam National University Medical School, Hwasun (Korea, Republic of); Park, Jong Seong [Dept. of Physiology, Chonnam National University Medical School, Gwangju (Korea, Republic of); Jun, Jae Yeoul [Dept. of Physiology, College of Medicine, Chosun University, Gwangju (Korea, Republic of)

    2013-01-15

    The purpose of this study was to establish a minimally invasive and reproducible protocol for estimating the gastrointestinal (GI) transit time in mice using barium and radiopaque markers. Twenty 5- to 6-week-old Balb/C female mice weighing 19-21 g were used. The animals were divided into three groups: two groups that received loperamide and a control group. The control group (n = 10) animals were administered physiological saline (1.5 mL/kg) orally. The loperamide group I (n = 10) and group II (n = 10) animals were administered 5 mg/kg and 10 mg/kg loperamide orally, respectively. Thirty minutes after receiving the saline or loperamide, the mice was administered 80 μL of barium solution and six iron balls (0.5 mm) via the mouth and the upper esophagus by gavage, respectively. Afterwards, the mice were continuously monitored with fluoroscopic imaging in order to evaluate the swallowing of the barium solution and markers. Serial fluoroscopic images were obtained at 5- or 10-min intervals until all markers had been excreted from the anal canal. For analysis, the GI transit times were subdivided into intestinal transit times (ITTs) and colon transit times (CTTs). The mean ITT was significantly longer in the loperamide groups than in the control group (p < 0.05). The mean ITT in loperamide group II (174.5 ± 32.3) was significantly longer than in loperamide group I (133.2 ± 24.2 minute) (p < 0.05). The mean CTT was significantly longer in loperamide group II than in the control group (p < 0.05). Also, no animal succumbed to death after the experimental procedure. The protocol for our study using radiopaque markers and barium is reproducible and minimally invasive in determining the GI transit time of the mouse model.

  17. Toward establishing model organisms for marine protists: Successful transfection protocols for Parabodo caudatus (Kinetoplastida: Excavata).

    Science.gov (United States)

    Gomaa, Fatma; Garcia, Paulo A; Delaney, Jennifer; Girguis, Peter R; Buie, Cullen R; Edgcomb, Virginia P

    2017-09-01

    We developed protocols for, and demonstrated successful transfection of, the free-living kinetoplastid flagellate Parabodo caudatus with three plasmids carrying a fluorescence reporter gene (pEF-GFP with the EF1 alpha promoter, pUB-GFP with Ubiquitin C promoter, and pEYFP-Mitotrap with CMV promoter). We evaluated three electroporation approaches: (1) a square-wave electroporator designed for eukaryotes, (2) a novel microfluidic transfection system employing hydrodynamically-controlled electric field waveforms, and (3) a traditional exponential decay electroporator. We found the microfluidic device provides a simple and efficient platform to quickly test a wide range of electric field parameters to find the optimal set of conditions for electroporation of target species. It also allows for processing large sample volumes (>10 ml) within minutes, increasing throughput 100 times over cuvettes. Fluorescence signal from the reporter gene was detected a few hours after transfection and persisted for 3 days in cells transfected by pEF-GFP and pUB-GFP plasmids and for at least 5 days post-transfection for cells transfected with pEYFP-Mitotrap. Expression of the reporter genes (GFP and YFP) was also confirmed using reverse transcription-PCR (RT-PCR). This work opens the door for further efforts with this taxon and close relatives toward establishing model systems for genome editing. © 2017 Society for Applied Microbiology and John Wiley & Sons Ltd.

  18. Establishing rational networking using the DL04 quantum secure direct communication protocol

    Science.gov (United States)

    Qin, Huawang; Tang, Wallace K. S.; Tso, Raylin

    2018-06-01

    The first rational quantum secure direct communication scheme is proposed, in which we use the game theory with incomplete information to model the rational behavior of the participant, and give the strategy space and utility function. The rational participant can get his maximal utility when he performs the protocol faithfully, and then the Nash equilibrium of the protocol can be achieved. Compared to the traditional schemes, our scheme will be more practical in the presence of rational participant.

  19. Native grass hydroseed development : establishment protocols for three native Hawaiian plants on roadside areas.

    Science.gov (United States)

    2012-08-01

    The biggest mistake with using native plants on Hawaiis roadways is to assume that native plants do not require : nutrient enhancement or supplemental water to establish on these sites. The establishment of native plants will : require a detailed ...

  20. Robowell: An automated process for monitoring ground water quality using established sampling protocols

    Science.gov (United States)

    Granato, G.E.; Smith, K.P.

    1999-01-01

    Robowell is an automated process for monitoring selected ground water quality properties and constituents by pumping a well or multilevel sampler. Robowell was developed and tested to provide a cost-effective monitoring system that meets protocols expected for manual sampling. The process uses commercially available electronics, instrumentation, and hardware, so it can be configured to monitor ground water quality using the equipment, purge protocol, and monitoring well design most appropriate for the monitoring site and the contaminants of interest. A Robowell prototype was installed on a sewage treatment plant infiltration bed that overlies a well-studied unconfined sand and gravel aquifer at the Massachusetts Military Reservation, Cape Cod, Massachusetts, during a time when two distinct plumes of constituents were released. The prototype was operated from May 10 to November 13, 1996, and quality-assurance/quality-control measurements demonstrated that the data obtained by the automated method was equivalent to data obtained by manual sampling methods using the same sampling protocols. Water level, specific conductance, pH, water temperature, dissolved oxygen, and dissolved ammonium were monitored by the prototype as the wells were purged according to U.S Geological Survey (USGS) ground water sampling protocols. Remote access to the data record, via phone modem communications, indicated the arrival of each plume over a few days and the subsequent geochemical reactions over the following weeks. Real-time availability of the monitoring record provided the information needed to initiate manual sampling efforts in response to changes in measured ground water quality, which proved the method and characterized the screened portion of the plume in detail through time. The methods and the case study described are presented to document the process for future use.

  1. Protocol for the establishment and operation of LTPP sections - Inception report

    CSIR Research Space (South Africa)

    Jones, DJ

    2003-02-01

    Full Text Available for the establishment and operation of LTPP sections - Inception Report iii TABLE OF CONTENTS 1. INTRODUCTION........................................................................................................................ 4 2. REVIEW OF LTPP... States ............................................................................................................... 10 2.3. Australia and New Zealand.......................................................................................... 14 2.4...

  2. Establishment of a Cre recombinase based mutagenesis protocol for markerless gene deletion in Streptococcus suis.

    Science.gov (United States)

    Koczula, A; Willenborg, J; Bertram, R; Takamatsu, D; Valentin-Weigand, P; Goethe, R

    2014-12-01

    The lack of knowledge about pathogenicity mechanisms of Streptococcus (S.) suis is, at least partially, attributed to limited methods for its genetic manipulation. Here, we established a Cre-lox based recombination system for markerless gene deletions in S. suis serotype 2 with high selective pressure and without undesired side effects. Copyright © 2014 Elsevier B.V. All rights reserved.

  3. A two-hypothesis approach to establishing a life detection/biohazard protocol for planetary samples

    Science.gov (United States)

    Conley, Catharine; Steele, Andrew

    2016-07-01

    The COSPAR policy on performing a biohazard assessment on samples brought from Mars to Earth is framed in the context of a concern for false-positive results. However, as noted during the 2012 Workshop for Life Detection in Samples from Mars (ref. Kminek et al., 2014), a more significant concern for planetary samples brought to Earth is false-negative results, because an undetected biohazard could increase risk to the Earth. This is the reason that stringent contamination control must be a high priority for all Category V Restricted Earth Return missions. A useful conceptual framework for addressing these concerns involves two complementary 'null' hypotheses: testing both of them, together, would allow statistical and community confidence to be developed regarding one or the other conclusion. As noted above, false negatives are of primary concern for safety of the Earth, so the 'Earth Safety null hypothesis' -- that must be disproved to assure low risk to the Earth from samples introduced by Category V Restricted Earth Return missions -- is 'There is native life in these samples.' False positives are of primary concern for Astrobiology, so the 'Astrobiology null hypothesis' -- that must be disproved in order to demonstrate the existence of extraterrestrial life is 'There is no life in these samples.' The presence of Earth contamination would render both of these hypotheses more difficult to disprove. Both these hypotheses can be tested following a strict science protocol; analyse, interprete, test the hypotheses and repeat. The science measurements undertaken are then done in an iterative fashion that responds to discovery with both hypotheses testable from interpretation of the scientific data. This is a robust, community involved activity that ensures maximum science return with minimal sample use.

  4. Establishment of a protocol for the gene expression analysis of laser microdissected rat kidney samples with affymetrix genechips

    International Nuclear Information System (INIS)

    Stemmer, Kerstin; Ellinger-Ziegelbauer, Heidrun; Lotz, Kerstin; Ahr, Hans-J.; Dietrich, Daniel R.

    2006-01-01

    Laser microdissection in conjunction with microarray technology allows selective isolation and analysis of specific cell populations, e.g., preneoplastic renal lesions. To date, only limited information is available on sample preparation and preservation techniques that result in both optimal histomorphological preservation of sections and high-quality RNA for microarray analysis. Furthermore, amplification of minute amounts of RNA from microdissected renal samples allowing analysis with genechips has only scantily been addressed to date. The objective of this study was therefore to establish a reliable and reproducible protocol for laser microdissection in conjunction with microarray technology using kidney tissue from Eker rats p.o. treated for 7 days and 6 months with 10 and 1 mg Aristolochic acid/kg bw, respectively. Kidney tissues were preserved in RNAlater or snap frozen. Cryosections were cut and stained with either H and E or cresyl violet for subsequent morphological and RNA quality assessment and laser microdissection. RNA quality was comparable in snap frozen and RNAlater-preserved samples, however, the histomorphological preservation of renal sections was much better following cryopreservation. Moreover, the different staining techniques in combination with sample processing time at room temperature can have an influence on RNA quality. Different RNA amplification protocols were shown to have an impact on gene expression profiles as demonstrated with Affymetrix Rat Genome 230 2 .0 arrays. Considering all the parameters analyzed in this study, a protocol for RNA isolation from laser microdissected samples with subsequent Affymetrix chip hybridization was established that was also successfully applied to preneoplastic lesions laser microdissected from Aristolochic acid-treated rats

  5. Establishment of an efficient in vitro regeneration protocol for rapid and mass propagation of Dendrobium chrysotoxum Lindl. using seed culture.

    Science.gov (United States)

    Nongdam, Potshangbam; Tikendra, Leimapokpam

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species.

  6. Establishment of an Efficient In Vitro Regeneration Protocol for Rapid and Mass Propagation of Dendrobium chrysotoxum Lindl. Using Seed Culture

    Science.gov (United States)

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species. PMID:25401154

  7. Differences in quantitative assessment of myocardial scar and gray zone by LGE-CMR imaging using established gray zone protocols.

    Science.gov (United States)

    Mesubi, Olurotimi; Ego-Osuala, Kelechi; Jeudy, Jean; Purtilo, James; Synowski, Stephen; Abutaleb, Ameer; Niekoop, Michelle; Abdulghani, Mohammed; Asoglu, Ramazan; See, Vincent; Saliaris, Anastasios; Shorofsky, Stephen; Dickfeld, Timm

    2015-02-01

    Late gadolinium enhancement cardiac magnetic resonance (LGE-CMR) imaging is the gold standard for myocardial scar evaluation. Heterogeneous areas of scar ('gray zone'), may serve as arrhythmogenic substrate. Various gray zone protocols have been correlated to clinical outcomes and ventricular tachycardia channels. This study assessed the quantitative differences in gray zone and scar core sizes as defined by previously validated signal intensity (SI) threshold algorithms. High quality LGE-CMR images performed in 41 cardiomyopathy patients [ischemic (33) or non-ischemic (8)] were analyzed using previously validated SI threshold methods [Full Width at Half Maximum (FWHM), n-standard deviation (NSD) and modified-FWHM]. Myocardial scar was defined as scar core and gray zone using SI thresholds based on these methods. Scar core, gray zone and total scar sizes were then computed and compared among these models. The median gray zone mass was 2-3 times larger with FWHM (15 g, IQR: 8-26 g) compared to NSD or modified-FWHM (5 g, IQR: 3-9 g; and 8 g. IQR: 6-12 g respectively, p zone extent (percentage of total scar that was gray zone) also varied significantly among the three methods, 51 % (IQR: 42-61 %), 17 % (IQR: 11-21 %) versus 38 % (IQR: 33-43 %) for FWHM, NSD and modified-FWHM respectively (p zone and scar core. Infarct core and total myocardial scar mass also differ using these methods. Further evaluation of the most accurate quantification method is needed.

  8. Reducing the sampling periods required in protocols for establishing ammonia emissions from pig fattening buildings using measurements and modelling

    NARCIS (Netherlands)

    Mosquera Losada, J.; Ogink, N.W.M.

    2011-01-01

    Ammonia (NH(3)) emission factors for animal housing systems in the Netherlands are based on measurements using standardised measurement protocols. Both the original Green Label (GL) protocol and the newly developed multi-site sampling protocol are based on year-round sampling periods. The objective

  9. Bill authorizing the ratification of the protocol amending the Protocol on transitional provisions annexed to the Treaty on European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community

    International Nuclear Information System (INIS)

    2010-01-01

    After an indication of the European Parliament composition, this text describes the transitional provisions adopted as the Lisbon Treaty did not come into effect before the European elections held in June 2009. The document also provides the protocol text signed by the Members States and which amended the protocol on transitional provisions annexed to the Treaty on the European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community. The last part of the document discusses the administrative and legal consequences of this protocol. It also recalls the history of the negotiations and indicates the present status of signatures and ratifications

  10. An experimental protocol for the establishment of dogs with long-term cellular immune reactions to Leishmania antigens

    Directory of Open Access Journals (Sweden)

    Márcia Cristina Aquino Teixeira

    2011-03-01

    Full Text Available Domestic dogs are considered to be the main reservoirs of zoonotic visceral leishmaniasis. In this work, we evaluated a protocol to induce Leishmania infantum/Leishmania chagasi-specific cellular and humoral immune responses in dogs, which consisted of two injections of Leishmania promastigote lysate followed by a subcutaneous inoculation of viable promastigotes. The primary objective was to establish a canine experimental model to provide positive controls for testing immune responses to Leishmania in laboratory conditions. After inoculation of viable promastigotes, specific proliferative responses of peripheral blood mononuclear cells (PBMCs to either Leishmania lysate or recombinant proteins, the in vitro production of interferon-γ by antigen-stimulated PBMCs and a significant increase in circulating levels of anti-Leishmania antibodies were observed. The immunized dogs also displayed positive delayed-type hypersensitivity reactions to Leishmania crude antigens and to purified recombinant proteins. An important finding that supports the suitability of the dogs as positive controls is that they remained healthy for the entire observation period, i.e., more than seven years after infection. Following the Leishmania antigen lysate injections, the infection of dogs by the subcutaneous route appears to induce a sustained cellular immune response, leading to an asymptomatic infection. This provides a useful model for both the selection of immunogenic Leishmania antigens and for immunobiological studies on their possible immunoprotective activities.

  11. Establishing a protocol for immunocytochemical staining and chromogenic in situ hybridization of Giemsa and Diff-Quick prestained cytological smears

    Directory of Open Access Journals (Sweden)

    Elsa Beraki

    2012-01-01

    Full Text Available Background: Protocols for immunocytochemical staining (ICC and in situ hybridization (ISH of air-dried Diff-Quick or May-Grünwald Giemsa (MGG-stained smears have been difficult to establish. An increasing need to be able to use prestained slides for ICC and ISH in specific cases led to this study, aiming at finding a robust protocol for both methods. Materials and Methods: The material consisted of MGG- and Diff-Quick-stained smears. After diagnosis, one to two diagnostic smears were stored in the department. Any additional smear(s containing diagnostic material were used for this study. The majority were fine needle aspirates (FNAC from the breast, comprising materials from fibroadenomas, fibrocystic disease, and carcinomas. A few were metastatic lesions (carcinomas and malignant melanomas. There were 64 prestained smears. Ten smears were Diff-Quick stained, and 54 were MGG stained. The antibodies used for testing ICC were Ki-67, ER, and PgR, CK MNF116 (pancytokeratin and E-cadherin. HER-2 Dual SISH was used to test ISH. Citrate, TRS, and TE buffers at pH6 and pH9 were tested, as well as, different heating times, microwave powers and antibody concentrations. The ICC was done on the Dako Autostainer (Dako®, Glostrup, Denmark, and HER-2 Dual SISH was done on the Ventana XT-machine (Ventana / Roche® , Strasbourg, France. Results: Optimal results were obtained with the TE buffer at pH 9, for both ICC and ISH. Antibody concentrations generally had to be higher than in the immunohistochemistry (IHC. The optimal microwave heat treatment included an initial high power boiling followed by low power boiling. No post fixation was necessary for ICC, whereas, 20 minutes post fixation in formalin (4% was necessary for ISH. Conclusions: Microwave heat treatment, with initial boiling at high power followed by boiling at low power and TE buffer at pH 9 were the key steps in the procedure. Antibody concentrations has to be adapted for each ICC marker. Post

  12. Establishment and optimization of NMR-based cell metabonomics study protocols for neonatal Sprague-Dawley rat cardiomyocytes.

    Science.gov (United States)

    Zhang, Ming; Sun, Bo; Zhang, Qi; Gao, Rong; Liu, Qiao; Dong, Fangting; Fang, Haiqin; Peng, Shuangqing; Li, Famei; Yan, Xianzhong

    2017-01-15

    A quenching, harvesting, and extraction protocol was optimized for cardiomyocytes NMR metabonomics analysis in this study. Trypsin treatment and direct scraping cells in acetonitrile were compared for sample harvesting. The results showed trypsin treatment cause normalized concentration increasing of phosphocholine and metabolites leakage, since the trypsin-induced membrane broken and long term harvesting procedures. Then the intracellular metabolite extraction efficiency of methanol and acetonitrile were compared. As a result, washing twice with phosphate buffer, direct scraping cells and extracting with acetonitrile were chosen to prepare cardiomyocytes extracts samples for metabonomics studies. This optimized protocol is rapid, effective, and exhibits greater metabolite retention. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Establishment of an efficient plant regeneration culture protocol and achievement of successful genetic transformation in Jatropha curcas L.

    Science.gov (United States)

    Liu, Ying; Liu, Guoxuan; Yang, Yali; Niu, Sufang; Yang, Fuguang; Yang, Shaoxia; Tang, Jianian; Chen, Jianping

    2017-12-01

    An efficient and reproducible protocol is described for shoot-bud regeneration and Agrobacterium tumefaciens-mediated genetic transformation of J. curcas. Treating the explants with high concentrations (5-120 mg/L) of TDZ for short durations (5-80 min) before inoculation culture increased significantly the regeneration frequency and improved the quality of the regenerated buds. The highest shoot-buds induction rate (87.35%) was achieved when petiole explants were treated with 20 mg/L TDZ solution for 20 min and inoculated on hormone-free MS medium for 30 days. Regenerated shoots of 0.5 cm or a little longer were isolated and grafted to seedling stocks of the same species, and then the grafted plantlets were planted on half-strength MS medium containing 0.1 mg/L IBA and 2 mg/L sodium nitroprusside (SNP). This grafting strategy was found to be very effective, to obtain that healthy grafted plantlets ready for acclimatization within 20 days. By the above mentioned protocol and with general Agrobacterium - mediated genetic transformation methods only 65 days were needed to obtain intact transgenic plants.

  14. Concurrent Chemoradiotherapy Followed by Consolidation Chemotherapy With Bi-Weekly Docetaxel and Carboplatin for Stage III Unresectable, Non-Small-Cell Lung Cancer: Clinical Application of a Protocol Used in a Previous Phase II Study

    Energy Technology Data Exchange (ETDEWEB)

    Saitoh, Jun-Ichi, E-mail: junsaito@sannet.ne.jp [Division of Radiation Oncology, Saitama Cancer Center, Saitama (Japan); Saito, Yoshihiro; Kazumoto, Tomoko; Kudo, Shigehiro; Yoshida, Daisaku; Ichikawa, Akihiro [Division of Radiation Oncology, Saitama Cancer Center, Saitama (Japan); Sakai, Hiroshi; Kurimoto, Futoshi [Division of Respiratory Disease, Saitama Cancer Center, Saitama (Japan); Kato, Shingo [Research Center Hospital for Charged Particle Therapy, National Institute of Radiological Sciences, Chiba (Japan); Shibuya, Kei [Department of Radiation Oncology, Gunma University Graduate School of Medicine, Gunma (Japan)

    2012-04-01

    Purpose: To assess the clinical applicability of a protocol evaluated in a previously reported phase II study of concurrent chemoradiotherapy followed by consolidation chemotherapy with bi-weekly docetaxel and carboplatin in patients with stage III, unresectable, non-small-cell lung cancer (NSCLC). Methods and Materials: Between January 2000 and March 2006, 116 previously untreated patients with histologically proven, stage III NSCLC were treated with concurrent chemoradiotherapy. Radiation therapy was administered in 2-Gy daily fractions to a total dose of 60 Gy in combination with docetaxel, 30 mg/m{sup 2}, and carboplatin at an area under the curve value of 3 every 2 weeks during and after radiation therapy. Results: The median survival time for the entire group was 25.5 months. The actuarial 2-year and 5-year overall survival rates were 53% and 31%, respectively. The 3-year cause-specific survival rate was 60% in patients with stage IIIA disease, whereas it was 35% in patients with stage IIIB disease (p = 0.007). The actuarial 2-year and 5-year local control rates were 62% and 55%, respectively. Acute hematologic toxicities of Grade {>=}3 severity were observed in 20.7% of patients, while radiation pneumonitis and esophagitis of Grade {>=}3 severity were observed in 2.6% and 1.7% of patients, respectively. Conclusions: The feasibility of the protocol used in the previous phase II study was reconfirmed in this series, and excellent treatment results were achieved.

  15. Concurrent Chemoradiotherapy Followed by Consolidation Chemotherapy With Bi-Weekly Docetaxel and Carboplatin for Stage III Unresectable, Non-Small-Cell Lung Cancer: Clinical Application of a Protocol Used in a Previous Phase II Study

    International Nuclear Information System (INIS)

    Saitoh, Jun-Ichi; Saito, Yoshihiro; Kazumoto, Tomoko; Kudo, Shigehiro; Yoshida, Daisaku; Ichikawa, Akihiro; Sakai, Hiroshi; Kurimoto, Futoshi; Kato, Shingo; Shibuya, Kei

    2012-01-01

    Purpose: To assess the clinical applicability of a protocol evaluated in a previously reported phase II study of concurrent chemoradiotherapy followed by consolidation chemotherapy with bi-weekly docetaxel and carboplatin in patients with stage III, unresectable, non-small-cell lung cancer (NSCLC). Methods and Materials: Between January 2000 and March 2006, 116 previously untreated patients with histologically proven, stage III NSCLC were treated with concurrent chemoradiotherapy. Radiation therapy was administered in 2-Gy daily fractions to a total dose of 60 Gy in combination with docetaxel, 30 mg/m 2 , and carboplatin at an area under the curve value of 3 every 2 weeks during and after radiation therapy. Results: The median survival time for the entire group was 25.5 months. The actuarial 2-year and 5-year overall survival rates were 53% and 31%, respectively. The 3-year cause-specific survival rate was 60% in patients with stage IIIA disease, whereas it was 35% in patients with stage IIIB disease (p = 0.007). The actuarial 2-year and 5-year local control rates were 62% and 55%, respectively. Acute hematologic toxicities of Grade ≥3 severity were observed in 20.7% of patients, while radiation pneumonitis and esophagitis of Grade ≥3 severity were observed in 2.6% and 1.7% of patients, respectively. Conclusions: The feasibility of the protocol used in the previous phase II study was reconfirmed in this series, and excellent treatment results were achieved.

  16. Junk-food enhances conditioned food cup approach to a previously established food cue, but does not alter cue potentiated feeding; implications for the effects of palatable diets on incentive motivation.

    Science.gov (United States)

    Derman, Rifka C; Ferrario, Carrie R

    2018-03-16

    Efforts to stem the global rise in obesity have been minimally effective, perhaps in part because our understanding of the psychological and behavioral drivers of obesity is limited. It is well established that stimuli that are paired with palatable foods can powerfully influence food-seeking and feeding behaviors. However, how consumption of sugary, fatty "junk-foods" affects these motivational responses to food cues is poorly understood. Here, we determined the effects of short- and long-term "junk-food" consumption on the expression of cue potentiated feeding and conditioned food cup approach to Pavlovian conditioned stimuli (CS). Further, to determine the degree to which effects of "junk-food" were selective to Pavlovian motivational processes, we varied the predictive validity of the CS by including training groups conditioned with unique CS-US contingencies ranging from -1.0 to +1.0. "Junk-food" did not enhance cue potentiated feeding in any group, but expression of this potentiation effect varied with the CS-US contingency independent of diet. In contrast, "junk-food" consistently enhanced conditioned approach to the food cup; this effect was dependent on the previously established CS-US contingency. That is, consumption of "junk-food" following training enhanced approach to the food cup only in response to CSs with previously positive CS-US contingencies. This was accompanied by reduced motivation for the US itself. Together these data show that "junk-food" consumption selectively enhances incentive motivational responses to previously established food CSs, without altering cue potentiated feeding induced by these same CSs, and in the absence of enhanced motivation for food itself. Copyright © 2018 Elsevier Inc. All rights reserved.

  17. Convention on the establishment of a security control in the field of nuclear energy. Protocol on the tribunal established by the convention on the establishment of a security control in the field of nuclear energy

    International Nuclear Information System (INIS)

    1957-01-01

    The governments of Germany, Austria, Belgium, Denmark, France, Greece, Ireland, Iceland, Italy, Luxembourg, Norway, Netherlands, Portugal, United Kingdom, Sweden, Switzerland and Turkey, having resolved to promote the development of the production and uses of nuclear energy in the Member countries of the Organisation for European Economic Co-operation between these countries and the harmonisation of national measures; considering that the joint action undertaken to this end in the Organisation is intended to develop the European nuclear industry for purely peaceful ends and must not further any military purpose; considering that at its meeting of' 18 July, 1956, the Council of the Organisation decided to establish to this effect an international security control; considering that by a Decision dated this day the Council has established, within the Organisation, a European Nuclear Energy Agency with the task of pursuing the joint action undertaken; have agreed the present convention. The governments party to the Convention, desirous of determining in accordance with Article 12 of the Convention the organisation of the Tribunal established by the said Article and the status of its judges; have agreed upon the provisions which are annexed to the Convention

  18. Establishment of an effective acute stroke telemedicine program for Australia: protocol for the Victorian Stroke Telemedicine project.

    Science.gov (United States)

    Cadilhac, Dominique A; Moloczij, Natasha; Denisenko, Sonia; Dewey, Helen; Disler, Peter; Winzar, Bruce; Mosley, Ian; Donnan, Geoffrey A; Bladin, Christopher

    2014-02-01

    Urgent treatment of acute stroke in rural Australia is problematic partly because of limited access to medical specialists. Utilization of telemedicine could improve delivery of acute stroke treatments in rural communities. The study aims to demonstrate enhanced clinical decision making for use of thrombolysis within 4·5 h of ischemic stroke symptom onset in a rural setting using a telemedicine specialist support model. A formative program evaluation research design was used. The Victorian Stroke Telemedicine program was developed and will be evaluated over five stages to ensure successful implementation. The phases include: (a) preimplementation phase to establish the Victorian Stroke Telemedicine program including the clinical pathway, data collection tools, and technology processes; (b) pilot clinical application phase to test the pathway in up to 10 patients; (c) modification phase to refine the program; (d) full clinical implementation phase where the program is maintained for one-year; and (e) a sustainability phase to assess project outcomes over five-years. Qualitative (clinician interviews) and quantitative data (patient, clinician, costs, and technology processes) are collected in each phase. The primary outcome is to achieve a minimum 10% absolute increase in eligible patients treated with thrombolysis. Secondary outcomes are utilization of the telestroke pathway and improvements in processes of stroke care (e.g., time to brain scan). We will report door to telemedicine consultation time, length of telemedicine consultation, clinical utility and acceptability from the perspective of clinicians, and 90-day patient outcomes. This research will provide evidence for an effective telestroke program for use in regional Australian hospitals. © 2013 The Authors. International Journal of Stroke © 2013 World Stroke Organization.

  19. Establishment of an efficient protocol for micropropagation of some pakistani cultivars of date palm (phonex dactylifera l.) using novel inflorescence explants

    International Nuclear Information System (INIS)

    Jatoi, M. A.; Markhand, G. S.; Solangi, N.

    2015-01-01

    An efficient protocol for rapid and large scale In vitro propagation of some Pakistani cultivars of date palm has been established using inflorescence explants at Date Palm Research Institute (DPRI), Shah Abdul Latif University (SALU), Khairpur, Pakistan. Immature inflorescences of desired cultivars of date palm detached from mother palms followed by surface sterilization with low torrent of current tap water and then 30 percentage NaOCl/sub 2/ solution, the outer cover were removed in order to get spike explants and cut into the 2-3 cm small pieces and cultured on modified MS medium supplemented with 0.1 mg l-1 2, 4-D + 0.1 mg l-1 IAA + 5.0 mg l-1 NAA for initiation and establishment of cultures. The obtained somatic embryos were subjected to multiplication medium involved 0.1 mg l-1 NAA + 0.05 mg l-1BA. Rooting was achieved using quarter strength MS medium containing 0.1 mg l-1NAA without activated charcoal (AC) initially and then with 3 g l-1 AC. Strong rooted plantlets with 2-3 leaves were transferred to pots contained sand and peat moss mixture (1:1 v/v) with more than 95 percentage success in acclimatization. The acclimatized plants with at least one compound leaf were shifted to the open field conditions at SALU campus for further studying morphological and fruit characterization to ensure the true-to-type nature of tissue culture derived plantlets. High multiplication efficiency and survival percentage with no any somaclonal variation ensured the efficacy of the protocol developed for the production of elite cultivars of date palm of Pakistan and can be used to optimize production of other cultivars of date palm worldwide. (author)

  20. SU-E-I-78: Establishing a Protocol for Quick Estimation of Thyroid Internal Contamination with 131I in Normal and Emergency Situations

    International Nuclear Information System (INIS)

    Naderi, S Mehdizadeh; Karimipourfard, M; Lotfalizadeh, F; Zamani, E; Molaeimanesh, Z; Sadeghi, M; Sina, S; Faghihi, R; Entezarmahdi, M

    2015-01-01

    Purpose: I-131 is one of the most frequent radionuclides used in nuclear medicine departments. The radiation workers, who manipulate the unsealed radio-toxic iodine, should be monitored for internal contamination. In this study a protocol was established for estimating I-131 activity absorbed in the thyroid glands of the nuclear medicine staff in normal working condition and also in accidents. Methods: I-131 with the activity of 10 μCi was injected inside the thyroid gland of a home-made anthropomorphic neck phantom. The phantom is made up of PMMA as soft tissue, and Aluminium as bone. The dose rate at different distances from the surface of the neck phantom was measured using a scintillator detector for duration of two months. Then, calibration factors were obtained, for converting the dose rate at each distance to the iodine activity inside the thyroid. Results: According to the results of this study, the calibration factors for converting the dose rates (nSv/h) at distances of 0cm, 1cm, 6cm, 11cm, and 16cm to the activity (kBq) inside the thyroid were found to be 0.03, 0.04, 0.14, 0.29, and 0.49 . Conclusion: This method can be effectively used for quick estimation of the I-131 concentration inside the thyroid of the staff for daily checks in normal working conditions and also in accidents

  1. SU-E-I-78: Establishing a Protocol for Quick Estimation of Thyroid Internal Contamination with 131I in Normal and Emergency Situations

    Energy Technology Data Exchange (ETDEWEB)

    Naderi, S Mehdizadeh [Radiation Research Center, Shiraz university, Shiraz, Fars (Iran, Islamic Republic of); Karimipourfard, M; Lotfalizadeh, F [Radiation medicine department, school of mechanical engineering, Shiraz uni, Shiraz, Fars (Iran, Islamic Republic of); Zamani, E; Molaeimanesh, Z; Sadeghi, M; Sina, S; Faghihi, R [Shiraz University, Shiraz, Fars (Iran, Islamic Republic of); Entezarmahdi, M [Shahid Beheshti University, Shiraz, Fars (Iran, Islamic Republic of)

    2015-06-15

    Purpose: I-131 is one of the most frequent radionuclides used in nuclear medicine departments. The radiation workers, who manipulate the unsealed radio-toxic iodine, should be monitored for internal contamination. In this study a protocol was established for estimating I-131 activity absorbed in the thyroid glands of the nuclear medicine staff in normal working condition and also in accidents. Methods: I-131 with the activity of 10 μCi was injected inside the thyroid gland of a home-made anthropomorphic neck phantom. The phantom is made up of PMMA as soft tissue, and Aluminium as bone. The dose rate at different distances from the surface of the neck phantom was measured using a scintillator detector for duration of two months. Then, calibration factors were obtained, for converting the dose rate at each distance to the iodine activity inside the thyroid. Results: According to the results of this study, the calibration factors for converting the dose rates (nSv/h) at distances of 0cm, 1cm, 6cm, 11cm, and 16cm to the activity (kBq) inside the thyroid were found to be 0.03, 0.04, 0.14, 0.29, and 0.49 . Conclusion: This method can be effectively used for quick estimation of the I-131 concentration inside the thyroid of the staff for daily checks in normal working conditions and also in accidents.

  2. Estabelecimento de protocolo para micropropagação de Lippia gracilis Schauer Establishment of protocol for Lippia gracilis Schauer micropropagation

    Directory of Open Access Journals (Sweden)

    M.J.M Marinho

    2011-01-01

    Full Text Available A espécie Lippia gracilis SCHAUER (Verbenaceae é nativa do Nordeste brasileiro e se destaca pela capacidade de acumular nos tricomas glandulares óleos essenciais com atividade antimicrobiana. Tendo em vista que não constam trabalhos na literatura sobre o estabelecimento in vitro dessa espécie, este trabalho teve como objetivo estabelecer protocolo para micropropagação de L. gracilis. Para tanto, ramos contendo folhas foram coletados de plantas matrizes no habitat natural para a confecção de estacas. Em laboratório, os explantes provenientes do processo de estaquia foram assepticamente tratados e inoculados em meio MS, acrescido de fitorreguladores, com o intuito de se estabelecer a melhor dose para o desenvolvimento dos explantes. Em decorrência de altos níveis de contaminação, avaliou-se o efeito da cefalexina. No entanto, apesar do antibiótico ter apresentado diminuição na contaminação bacteriana, a porcentagem de oxidação foi elevada. Portanto, testou-se o carvão ativado, ácido ascórbico, ácido cítrico e metade dos sais de MS quanto a eficiência no controle da oxidação. Concluiu-se que, o antibiótico na concentração utilizada provocou a oxidação dos explantes e os fitorreguladores, bem como os métodos antioxidantes testados, não apresentaram resultados consistentes para o melhor desenvolvimento dos explantes e controle da oxidação, respectivamente.The species Lippia gracilis Schauer (Verbenaceae is native to Northeastern Brazil and has been important for its ability to accumulate essential oils with antimicrobial activity in the glandular trichomes. Since there are no reports in the literature on the micropropagation of this species, the present work aimed to establish a protocol for L. gracilis micropropagation. Thus, branches containing leaves were collected from plant matrices in their natural habitat to prepare cuttings. In the laboratory, explants from cutting were aseptically treated and inoculated

  3. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  4. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  5. From Hype to an Operational Tool: Efforts to Establish a Long-Term Monitoring Protocol of Alluvial Sandbars using 'Structure-from-Motion' Photogrammetry

    Science.gov (United States)

    Rossi, R.; Buscombe, D.; Grams, P. E.; Wheaton, J. M.

    2015-12-01

    Despite recent advances in the use of 'Structure-from-Motion' (SfM) photogrammetry to accurately map landforms, its utility for reliably detecting and monitoring geomorphic change from repeat surveys remains underexplored in fluvial environments. It is unclear how the combination of various image acquisition platforms and techniques, survey scales, vegetation cover, and terrain complexities translate into accuracy and precision metrics for SfM-based construction of digital elevation models (DEMs) of fluvial landforms. Although unmanned aerial vehicles offer the potential to rapidly image large areas, they can be relatively costly, require skilled operators, are vulnerable in adverse weather conditions, and often rely on GPS-positioning to improve their stability. This research details image acquisition techniques for an underrepresented SfM platform: the pole-mounted camera. We highlight image acquisition and post-processing limitations of the SfM method for alluvial sandbars (10s to 100s m2) located in Marble and Grand Canyons in a remote, fluvial landscape with limited field access, strong light gradients, highly variable surface texture and limited ground control. We recommend a pole-based SfM protocol and evaluate it by comparing SfM-derived DEMs against concurrent, total station surveys and TLS derived DEMs. Error models of the sandbar surfaces are developed for a variety of surface characteristics (e.g., bare sand, steep slopes, and areas of shadow). The Geomorphic Change Detection (GCD) Software is used to compare SfM DEMs from before and after the 2014 high flow release from Glen Canyon Dam. Complementing existing total-station based sandbar surveys with potentially more efficient and cost-effective SfM methods will contribute to the understanding of morphodynamic responses of sandbars to high flow releases from Glen Canyon Dam. In addition, the development and implementation of a SfM-based operational protocol for monitoring geomorphic change will provide

  6. Bill authorizing the ratification of the protocol amending the Protocol on transitional provisions annexed to the Treaty on European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community; Projet de loi autorisant la ratification du protocole modifiant le protocole sur les dispositions transitoires annexe au traite sur l'Union europeenne, au traite sur le fonctionnement de l'Union europeenne et au traite instituant la Communaute europeenne de l'energie atomique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    After an indication of the European Parliament composition, this text describes the transitional provisions adopted as the Lisbon Treaty did not come into effect before the European elections held in June 2009. The document also provides the protocol text signed by the Members States and which amended the protocol on transitional provisions annexed to the Treaty on the European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community. The last part of the document discusses the administrative and legal consequences of this protocol. It also recalls the history of the negotiations and indicates the present status of signatures and ratifications

  7. Government Decree No 30/85 approving accession to the Convention for the Establishment of a European Organization for nuclear Research and its Financial Protocol

    International Nuclear Information System (INIS)

    1985-01-01

    By this Decree of 18 July 1985 the Government has approved Portugal's accession to CERN, which now counts 14 Members. The purpose of CERN is to provide for collaboration among European states in nuclear research of a scientific and fundamental character and it has established an international laboratory to carry out research relating to high-energy physics. (NEA) [fr

  8. Optimisation of the measurement protocols of 129I and 129I/127I. Methodology establishment for the measurement in environmental matrices

    International Nuclear Information System (INIS)

    Frechou, C.

    2000-01-01

    129 I, is a natural long-lived isotope, with a half-life of 15,7 million years, also artificially produced in nuclear power plant. It is then released in the liquid and gaseous effluents of the nuclear fuel reprocessing plants. 129 I is integrated in all biological compartments at different activity levels, depending on their distance from the emission source and their ability to metabolize iodine. Performances of the different 129 I and 129 I/ 127 I measurement techniques available: Radiochemical Neutron Activation Analysis, Accelerator Mass Spectrometry, direct γ-X spectrometry and liquid scintillation were evaluated. Associated radiochemical preparation steps of the two first techniques were optimized and adapted to the characteristics of the major environmental matrices. In a first step, the radiochemical protocols were developed and validated. In a second step, intercomparison exercises have been lead on various environmental samples presenting different 129 I activity levels. They showed the good agreement between the results given by the three techniques on different environmental matrices with activities between 0,2 and 200 Bq.kg -1 dry weight. As a conclusion, a methodology for the measurement of 129 I and 129 I/ 127 I ratio in environmental samples is proposed. It includes a decisional diagram taking into account the characteristics of the matrices, the detection limits and the answer delay. A study on the losses of 129 I during the calcination of an algae was lead by direct γ-X spectrometry and application studies were made to measure 129 I levels in different biological compartments issued from various locations: 129 I activity interspecific variation in different species of seaweeds from the French channel coast under the relative influence of La Hague, 129 I levels in bovine thyroids from the Cotentin area and 129 I in vegetal samples collected around the nuclear reprocessing plant of Marcoule. (author)

  9. CONSIDER - Core Outcome Set in IAD Research: study protocol for establishing a core set of outcomes and measurements in incontinence-associated dermatitis research.

    Science.gov (United States)

    Van den Bussche, Karen; De Meyer, Dorien; Van Damme, Nele; Kottner, Jan; Beeckman, Dimitri

    2017-10-01

    This study protocol describes the methodology for the development of a core set of outcomes and a core set of measurements for incontinence-associated dermatitis. Incontinence is a widespread disorder with an important impact on quality of life. One of the most common complications is incontinence-associated dermatitis, resulting from chemical and physical irritation of the skin barrier, triggering inflammation and skin damage. Managing incontinence-associated dermatitis is an important challenge for nurses. Several interventions have been assessed in clinical trials, but heterogeneity in study outcomes complicates the comparability and standardization. To overcome this challenge, the development of a core outcome set, a minimum set of outcomes and measurements to be assessed in clinical research, is needed. A project team, International Steering Committee and panelists will be involved to guide the development of the core outcome set. The framework of the Harmonizing Outcomes Measures for Eczema roadmap endorsed by Cochrane Skin Group Core Outcomes Set Initiative, is used to inform the project design. A systematic literature review, interviews to integrate the patients' perspective and a consensus study with healthcare researchers and providers using the Delphi procedure will be performed. The project was approved by the Ethics review Committee (April 2016). This is the first project that will identify a core outcome set of outcomes and measurements for incontinence-associated dermatitis research. A core outcome set will reduce possible reporting bias, allow results comparisons and statistical pooling across trials and strengthen evidence-based practice and decision-making. This project has been registered in the Core Outcome Measures in Effectiveness Trials (COMET) database and is part of the Cochrane Skin Group Core Outcomes Set Initiative (CSG-COUSIN). © 2016 John Wiley & Sons Ltd.

  10. From Hype to an Operational Tool: Efforts to Establish a Long-Term Monitoring Protocol of Alluvial Sandbars using `Structure-from-Motion' Photogrammetry

    Science.gov (United States)

    Rossi, R.; Buscombe, D.; Grams, P. E.; Schmidt, J. C.; Wheaton, J. M.

    2016-12-01

    Despite recent advances in the use of `Structure-from-Motion' (SfM) photogrammetry to accurately map landforms, its utility for reliably detecting and monitoring geomorphic change from repeat surveys remains underexplored in fluvial environments. It is unclear how the combination of various image acquisition platforms and techniques, survey scales, vegetation cover, and terrain complexities translate into accuracy and precision metrics for SfM-based construction of digital elevation models (DEMs) of fluvial landforms. Although unmanned aerial vehicles offer the potential to rapidly image large areas, they can be relatively costly, require skilled operators, are vulnerable in adverse weather conditions, and often rely on GPS-positioning to improve their stability. This research details image acquisition techniques for an underrepresented SfM platform: the pole-mounted camera. We highlight image acquisition and post-processing limitations of the SfM method for alluvial sandbars (10s to 100s m2) located in Marble and Grand Canyons in a remote, fluvial landscape with limited field access, strong light gradients, highly variable surface texture and limited ground control. We recommend a pole-based SfM protocol and evaluate it by comparing SfM-derived DEMs against concurrent, total station surveys. Error models of the sandbar surfaces are developed for a variety of surface characteristics (e.g., bare sand, steep slopes, and areas of shadow). The Geomorphic Change Detection (GCD) Software is used to compare SfM DEMs from before and after the 2014 high flow release from Glen Canyon Dam. Complementing existing total-station based sandbar surveys with potentially more efficient and cost-effective SfM methods will contribute to the understanding of morphodynamic responses of sandbars to high flow releases from Glen Canyon Dam. In addition, the development and implementation of a SfM-based operational method for monitoring geomorphic change will provide a methodological

  11. A prospective multiple case study of the impact of emerging scientific evidence on established colorectal cancer screening programs: a study protocol.

    Science.gov (United States)

    Geddie, Hannah; Dobrow, Mark J; Hoch, Jeffrey S; Rabeneck, Linda

    2012-06-01

    Health-policy decision making is a complex and dynamic process, for which strong evidentiary support is required. This includes scientifically produced research, as well as information that relates to the context in which the decision takes place. Unlike scientific evidence, this "contextual evidence" is highly variable and often includes information that is not scientifically produced, drawn from sources such as political judgement, program management experience and knowledge, or public values. As the policy decision-making process is variable and difficult to evaluate, it is often unclear how this heterogeneous evidence is identified and incorporated into "evidence-based policy" decisions. Population-based colorectal cancer screening poses an ideal context in which to examine these issues. In Canada, colorectal cancer screening programs have been established in several provinces over the past five years, based on the fecal occult blood test (FOBT) or the fecal immunochemical test. However, as these programs develop, new scientific evidence for screening continues to emerge. Recently published randomized controlled trials suggest that the use of flexible sigmoidoscopy for population-based screening may pose a greater reduction in mortality than the FOBT. This raises the important question of how policy makers will address this evidence, given that screening programs are being established or are already in place. This study will examine these issues prospectively and will focus on how policy makers monitor emerging scientific evidence and how both scientific and contextual evidence are identified and applied for decisions about health system improvement. This study will employ a prospective multiple case study design, involving participants from Ontario, Alberta, Manitoba, Nova Scotia, and Quebec. In each province, data will be collected via document analysis and key informant interviews. Documents will include policy briefs, reports, meeting minutes, media

  12. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  13. Laparoscopy After Previous Laparotomy

    Directory of Open Access Journals (Sweden)

    Zulfo Godinjak

    2006-11-01

    Full Text Available Following the abdominal surgery, extensive adhesions often occur and they can cause difficulties during laparoscopic operations. However, previous laparotomy is not considered to be a contraindication for laparoscopy. The aim of this study is to present that an insertion of Veres needle in the region of umbilicus is a safe method for creating a pneumoperitoneum for laparoscopic operations after previous laparotomy. In the last three years, we have performed 144 laparoscopic operations in patients that previously underwent one or two laparotomies. Pathology of digestive system, genital organs, Cesarean Section or abdominal war injuries were the most common causes of previouslaparotomy. During those operations or during entering into abdominal cavity we have not experienced any complications, while in 7 patients we performed conversion to laparotomy following the diagnostic laparoscopy. In all patients an insertion of Veres needle and trocar insertion in the umbilical region was performed, namely a technique of closed laparoscopy. Not even in one patient adhesions in the region of umbilicus were found, and no abdominal organs were injured.

  14. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  15. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  16. SU-G-TeP2-03: Comparison of Standard Dosimetry Protocol in Japan and AAPM TG-51 Addendum in Order to Establish Optimal Dosimetry for FFF Beam

    Energy Technology Data Exchange (ETDEWEB)

    Matsunaga, T; Adachi, Y [Department of Radiology, Seirei Hamamatsu General Hospital, Hamamatsu, Shizuoka (Japan); Hayashi, N [Graduate School of Health Sciences, Fujita Health University, Tayoake, Aichi (Japan); Nozue, M [Department of Radiation Oncology, Seirei Hamamtsu General Hospital, Hamamatsu, Shizuoka (Japan)

    2016-06-15

    Purpose: Japan Standard Dosimetry of Absorbed dose to water in external beam radiotherapy (JSDP12) is widely used to measure radiation dose in radiotherapy. However, JSDP12 does not take flattening-filter-free (FFF) beam into consideration. In addition, JSDP12 applied TPR20,10 for dose quality index for photon beam. The purpose of this study is to compare JSDP12 with AAPM TG-51 addendum in order to establish optimal dosimetry procedure for FFF beam. Method: We evaluated the ion-recombination factor (ks) and the correction factor of radial beam profile (Prp) in FFF beam dosimetry. The ks was introduced by 2 voltages method and verified by Jaffe’s plot. The Prp was given by both film measurement and calculation of treatment planning system, and compared them. Next, we compared the dose quality indexes (kQ) between TPR20,10 method and PDD(10)x method. Finally we considered optimal dosimetry protocol for FFF photon beam using JSDP12 with referring TG-51 addendum protocols. The FFF photon beams of 6 MV (6X-FFF) and 10 MV (10X-FFF) from TrueBeam were investigated in this study. Results: The ks for 6X-FFF and 10X-FFF beams were 1.005 and 1.010, respectively. The Prp of 0.6 cc ionization chamber for 6X-FFF and 10X-FFF beams (Film, TPS) were (1.004, 1.008) and (1.005, 1.008), respectively. The kQ for 6X-FFF and 10X-FFF beams (JSDP12, TG-51 addendum) were (0.9950, 0.9947) and (0.9851, 0.9845), respectively. The most effective factor for uncertainty in FFF photon beam measurement was Prp for JSDP12 formalism. Total dosimetric differences between JSDP12 and TG-51 addendum for 6X-FFF and 10X-FFF were -0.47% and -0.73%, respectively. Conclusion: The total dosimetric difference between JSDP12 and TG-51 addendum was within 1%. The introduction of kQ given by JSDP is feasible for FFF photon beam dosimetry. However, we think Prp should be considered for optimal dosimetry procedure even if JSDP12 is used for FFF photon beam dosimetry.

  17. Establishing the effectiveness, cost-effectiveness and student experience of a Simulation-based education Training program On the Prevention of Falls (STOP-Falls) among hospitalised inpatients: a protocol for a randomised controlled trial.

    Science.gov (United States)

    Williams, Cylie; Bowles, Kelly-Ann; Kiegaldie, Debra; Maloney, Stephen; Nestel, Debra; Kaplonyi, Jessica; Haines, Terry

    2016-06-02

    Simulation-based education (SBE) is now commonly used across health professional disciplines to teach a range of skills. The evidence base supporting the effectiveness of this approach for improving patient health outcomes is relatively narrow, focused mainly on the development of procedural skills. However, there are other simulation approaches used to support non-procedure specific skills that are in need of further investigation. This cluster, cross-over randomised controlled trial with a concurrent economic evaluation (cost per fall prevented) trial will evaluate the effectiveness, cost-effectiveness and student experience of health professional students undertaking simulation training for the prevention of falls among hospitalised inpatients. This research will target the students within the established undergraduate student placements of Monash University medicine, nursing and allied health across Peninsula Health acute and subacute inpatient wards. The intervention will train the students in how to provide the Safe Recovery program, the only single intervention approach demonstrated to reduce falls in hospitals. This will involve redevelopment of the Safe Recovery program into a one-to-many participant SBE program, so that groups of students learn the communication skills and falls prevention knowledge necessary for delivery of the program. The primary outcome of this research will be patient falls across participating inpatient wards, with secondary outcomes including student satisfaction with the SBE and knowledge gain, ward-level practice change and cost of acute/rehabilitation care for each patient measured using clinical costing data. The Human Research Ethics Committees of Peninsula Health (LRR/15/PH/11) and Monash University (CF15/3523-2015001384) have approved this research. The participant information and consent forms provide information on privacy, storage of results and dissemination. Registration of this trial has been completed with the

  18. Convention on the establishment of a security control in the field of nuclear energy. Protocol on the tribunal established by the convention on the establishment of a security control in the field of nuclear energy; Convention sur l'etablissement d'un controle de securite dans le domaine de l'energie nucleaire. Protocole relatif au tribunal cree par la Convention sur l'etablissement d'un controle de securite dans le domaine de l'energie nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1957-12-20

    The governments of Germany, Austria, Belgium, Denmark, France, Greece, Ireland, Iceland, Italy, Luxembourg, Norway, Netherlands, Portugal, United Kingdom, Sweden, Switzerland and Turkey, having resolved to promote the development of the production and uses of nuclear energy in the Member countries of the Organisation for European Economic Co-operation between these countries and the harmonisation of national measures; considering that the joint action undertaken to this end in the Organisation is intended to develop the European nuclear industry for purely peaceful ends and must not further any military purpose; considering that at its meeting of' 18 July, 1956, the Council of the Organisation decided to establish to this effect an international security control; considering that by a Decision dated this day the Council has established, within the Organisation, a European Nuclear Energy Agency with the task of pursuing the joint action undertaken; have agreed the present convention. The governments party to the Convention, desirous of determining in accordance with Article 12 of the Convention the organisation of the Tribunal established by the said Article and the status of its judges; have agreed upon the provisions which are annexed to the Convention.

  19. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  20. Previously unknown species of Aspergillus.

    Science.gov (United States)

    Gautier, M; Normand, A-C; Ranque, S

    2016-08-01

    The use of multi-locus DNA sequence analysis has led to the description of previously unknown 'cryptic' Aspergillus species, whereas classical morphology-based identification of Aspergillus remains limited to the section or species-complex level. The current literature highlights two main features concerning these 'cryptic' Aspergillus species. First, the prevalence of such species in clinical samples is relatively high compared with emergent filamentous fungal taxa such as Mucorales, Scedosporium or Fusarium. Second, it is clearly important to identify these species in the clinical laboratory because of the high frequency of antifungal drug-resistant isolates of such Aspergillus species. Matrix-assisted laser desorption/ionization-time of flight mass spectrometry (MALDI-TOF MS) has recently been shown to enable the identification of filamentous fungi with an accuracy similar to that of DNA sequence-based methods. As MALDI-TOF MS is well suited to the routine clinical laboratory workflow, it facilitates the identification of these 'cryptic' Aspergillus species at the routine mycology bench. The rapid establishment of enhanced filamentous fungi identification facilities will lead to a better understanding of the epidemiology and clinical importance of these emerging Aspergillus species. Based on routine MALDI-TOF MS-based identification results, we provide original insights into the key interpretation issues of a positive Aspergillus culture from a clinical sample. Which ubiquitous species that are frequently isolated from air samples are rarely involved in human invasive disease? Can both the species and the type of biological sample indicate Aspergillus carriage, colonization or infection in a patient? Highly accurate routine filamentous fungi identification is central to enhance the understanding of these previously unknown Aspergillus species, with a vital impact on further improved patient care. Copyright © 2016 European Society of Clinical Microbiology and

  1. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  2. A Safe Protocol for Amalgam Removal

    Directory of Open Access Journals (Sweden)

    Dana G. Colson

    2012-01-01

    Full Text Available Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body.

  3. Study of QoS control and reliable routing method for utility communication network. Application of differentiated service to the network and alternative route establishment by the IP routing protocol; Denryokuyo IP network no QoS seigyo to shinraisei kakuho no hoho. DiffServ ni yoru QoS seigyo no koka to IP ni yoru fuku root ka no kento

    Energy Technology Data Exchange (ETDEWEB)

    Oba, E.

    2000-05-01

    QoS control method which satisfies utilities communication network requirement and alternative route establishment method which is for sustaining communication during a failure are studied. Applicability of DiffServ (Differentiated Service), one of the most promising QoS control method on IP network and studying energetically in IETF WG, is studied and it is found most application used in the utility communication network except for relaying system information could he accommodated to the DiffServ network. An example of the napping of the utility communication applications to the DiffServ PHB (Per Hop Behavior) is shown in this paper. Regarding to the alternative route, usual IP routing protocol cannot establish alternative route which doesn't have common links and nodes in their paths for a destination. IP address duplication with some modification of routing protocol enables such alternative route establishment. MPLS, distance vector algorithm and link state algorithm are evaluated qualitatively, and as a result, we found MPLS is promising way to establish the route. Quantitative evaluation will be future work. (author)

  4. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  5. Establishing Substantial Equivalence: Transcriptomics

    Science.gov (United States)

    Baudo, María Marcela; Powers, Stephen J.; Mitchell, Rowan A. C.; Shewry, Peter R.

    Regulatory authorities in Western Europe require transgenic crops to be substantially equivalent to conventionally bred forms if they are to be approved for commercial production. One way to establish substantial equivalence is to compare the transcript profiles of developing grain and other tissues of transgenic and conventionally bred lines, in order to identify any unintended effects of the transformation process. We present detailed protocols for transcriptomic comparisons of developing wheat grain and leaf material, and illustrate their use by reference to our own studies of lines transformed to express additional gluten protein genes controlled by their own endosperm-specific promoters. The results show that the transgenes present in these lines (which included those encoding marker genes) did not have any significant unpredicted effects on the expression of endogenous genes and that the transgenic plants were therefore substantially equivalent to the corresponding parental lines.

  6. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  7. Report made on the behalf of the Foreign Affairs Commission on the bill project nr 2932 authorizing the ratification of the protocol modifying the protocol on transitory dispositions attached to the Treaty on the European Union, to the Treaty on the functioning of the European Union, and to the Treaty establishing the European Atomic Energy Community

    International Nuclear Information System (INIS)

    2011-01-01

    This report first describes and comments the consequences of the Lisbon Treaty in terms of composition for the European Parliament, and more particularly the debate about the design of an efficient and representative parliament, the election mode and the seat distribution. Then, it describes how the modification protocol has been elaborated, its content (general architecture, eighteen additional seats for twelve member States and their election modalities), and its implementation (agenda and method)

  8. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  9. Analytical protocols for characterisation of sulphur-free lignin

    NARCIS (Netherlands)

    Gosselink, R.J.A.; Abächerli, A.; Semke, H.; Malherbe, R.; Käuper, P.; Nadif, A.; Dam, van J.E.G.

    2004-01-01

    Interlaboratory tests for chemical characterisation of sulphur-free lignins were performed by five laboratories to develop useful analytical protocols, which are lacking, and identify quality-related properties. Protocols have been established for reproducible determination of the chemical

  10. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  11. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  12. MHC protocols

    National Research Council Canada - National Science Library

    Powis, Stephen H; Vaughan, Robert W

    2003-01-01

    ... because it contains genes encoding components of the complement pathway. The entire human MHC has recently been sequenced (1) and each subregion is now known to contain many other genes, a number of which have immunological functions. The study of polymorphism within the MHC is well established, because the region contains the highly polymorphic HLA genes. HLA polym...

  13. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  14. Inhibition between invasives: a newly introduced predator moderates the impacts of a previously established invasive predator.

    Science.gov (United States)

    Griffen, Blaine D; Guy, Travis; Buck, Julia C

    2008-01-01

    1. With continued globalization, species are being transported and introduced into novel habitats at an accelerating rate. Interactions between invasive species may provide important mechanisms that moderate their impacts on native species. 2. The European green crab Carcinus maenas is an aggressive predator that was introduced to the east coast of North America in the mid-1800 s and is capable of rapid consumption of bivalve prey. A newer invasive predator, the Asian shore crab Hemigrapsus sanguineus, was first discovered on the Atlantic coast in the 1980s, and now inhabits many of the same regions as C. maenas within the Gulf of Maine. Using a series of field and laboratory investigations, we examined the consequences of interactions between these predators. 3. Density patterns of these two species at different spatial scales are consistent with negative interactions. As a result of these interactions, C. maenas alters its diet to consume fewer mussels, its preferred prey, in the presence of H. sanguineus. Decreased mussel consumption in turn leads to lower growth rates for C. maenas, with potential detrimental effects on C. maenas populations. 4. Rather than an invasional meltdown, this study demonstrates that, within the Gulf of Maine, this new invasive predator can moderate the impacts of the older invasive predator.

  15. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  16. Optimisation of the measurement protocols of {sup 129}I and {sup 129}I/{sup 127}I. Methodology establishment for the measurement in environmental matrices; Optimisation des protocoles de mesurage de {sup 129}I et {sup 129}I/{sup 127}I. Etablissement d'une methodologie adaptee aux echantillons de l'environnement

    Energy Technology Data Exchange (ETDEWEB)

    Frechou, C

    2000-07-01

    {sup 129}I, is a natural long-lived isotope, with a half-life of 15,7 million years, also artificially produced in nuclear power plant. It is then released in the liquid and gaseous effluents of the nuclear fuel reprocessing plants. {sup 129}I is integrated in all biological compartments at different activity levels, depending on their distance from the emission source and their ability to metabolize iodine. Performances of the different {sup 129}I and {sup 129}I/{sup 127}I measurement techniques available: Radiochemical Neutron Activation Analysis, Accelerator Mass Spectrometry, direct {gamma}-X spectrometry and liquid scintillation were evaluated. Associated radiochemical preparation steps of the two first techniques were optimized and adapted to the characteristics of the major environmental matrices. In a first step, the radiochemical protocols were developed and validated. In a second step, intercomparison exercises have been lead on various environmental samples presenting different {sup 129}I activity levels. They showed the good agreement between the results given by the three techniques on different environmental matrices with activities between 0,2 and 200 Bq.kg{sup -1} dry weight. As a conclusion, a methodology for the measurement of {sup 129}I and {sup 129}I/{sup 127}I ratio in environmental samples is proposed. It includes a decisional diagram taking into account the characteristics of the matrices, the detection limits and the answer delay. A study on the losses of {sup 129}I during the calcination of an algae was lead by direct {gamma}-X spectrometry and application studies were made to measure {sup 129}I levels in different biological compartments issued from various locations: {sup 129}I activity interspecific variation in different species of seaweeds from the French channel coast under the relative influence of La Hague, {sup 129}I levels in bovine thyroids from the Cotentin area and {sup 129}I in vegetal samples collected around the nuclear

  17. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  18. Establishment of efficient in vitro culture protocol for wheat land ...

    African Journals Online (AJOL)

    ADNAN

    2012-02-07

    Feb 7, 2012 ... etc. MATERIALS AND METHODS. The proposed research was carried out at the Center of ... contained in 25 ml capacity Pyrex test tubes (18 × 150 mm). The cultures were ... After 15 to 20 days of hardening, the plantlets were ...

  19. Establishment of an efficient protocol for micropropagation of stem ...

    African Journals Online (AJOL)

    Microshoots thus formed, were cultured on indole 3-butyric acid (IBA) and half strength basal MS media for induction of roots. Regenerated plantlets with healthy shoots and roots were acclimatized in moist cotton followed by their hardening in soil : vermicompost potting mixture with 90% survival rate. Key words: Tylophora ...

  20. The Pelindaba text and its previous

    International Nuclear Information System (INIS)

    Adeniji, O.

    1996-01-01

    The main body of the Treaty, the preamble, articles 1-22, and the map are reproduced in this issue in the section ''Documentation Relating to Disarmament and International Security''. The complete text, including annexes and protocols, is contained in document A/50/426

  1. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  2. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  3. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  4. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  5. Establishment of a plant regeneration system from callus of ...

    African Journals Online (AJOL)

    STORAGESEVER

    2008-11-19

    Nov 19, 2008 ... An in vitro propagation protocol was established for the Dendrobium Serdang Beauty orchid. The propagation protocol utilized calli tissues that were successfully initiated from protocorm-like bodies. (PLBs) explants, while the leaf and root tip explants died. The percentage of protocorm-like bodies explants ...

  6. Preoperative screening: value of previous tests.

    Science.gov (United States)

    Macpherson, D S; Snow, R; Lofgren, R P

    1990-12-15

    To determine the frequency of tests done in the year before elective surgery that might substitute for preoperative screening tests and to determine the frequency of test results that change from a normal value to a value likely to alter perioperative management. Retrospective cohort analysis of computerized laboratory data (complete blood count, sodium, potassium, and creatinine levels, prothrombin time, and partial thromboplastin time). Urban tertiary care Veterans Affairs Hospital. Consecutive sample of 1109 patients who had elective surgery in 1988. At admission, 7549 preoperative tests were done, 47% of which duplicated tests performed in the previous year. Of 3096 previous results that were normal as defined by hospital reference range and done closest to the time of but before admission (median interval, 2 months), 13 (0.4%; 95% CI, 0.2% to 0.7%), repeat values were outside a range considered acceptable for surgery. Most of the abnormalities were predictable from the patient's history, and most were not noted in the medical record. Of 461 previous tests that were abnormal, 78 (17%; CI, 13% to 20%) repeat values at admission were outside a range considered acceptable for surgery (P less than 0.001, frequency of clinically important abnormalities of patients with normal previous results with those with abnormal previous results). Physicians evaluating patients preoperatively could safely substitute the previous test results analyzed in this study for preoperative screening tests if the previous tests are normal and no obvious indication for retesting is present.

  7. The urban density premium across establishments

    OpenAIRE

    R. Jason Faberman; Matthew Freedman

    2013-01-01

    We use longitudinal microdata to estimate the urban density premium for U.S. establishments, controlling for observed establishment characteristics and dynamic establishment behavior. Consistent with previous studies, we estimate a density premium between 6 and 10 percent, even after controlling for establishment composition, local skill mix, and the endogeneity of location choice. More importantly, we find that the estimated density premium is realized almost entirely at birth and is constan...

  8. Polyethylene glycol 3350 based colon cleaning protocol: 2 d vs 4 d head to head comparison.

    Science.gov (United States)

    Elitsur, Rotem; Butcher, Lisa; Vicki, Lund; Elitsur, Yoram

    2013-04-16

    To compare between 2 and 4 d colon cleansing protocols. Children who were scheduled for colonoscopy procedure (2010-2012) for various medical reasons, were recruited from the pediatric gastroenterology clinic at Marshall University School of Medicine, Huntington, WV. Exclusion criteria were patients who were allergic to the medication used in the protocols [polyethylene glycol (PEG) 3350, Bisacodyl], or children with metabolic or renal diseases. Two PEG 3350 protocols for 4 d (A) and 2 d (B) were prescribed as previously described. A questionnaire describing the volume of PEG consumed, clinical data, and side effects were recorded. Colon preparation was graded by two observers according to previously described method. Rate of adequate colon preparation. A total of 78 patients were considered for final calculation (group A: 40, group B: 38). Age and stool consistency at the last day was comparable in both groups, but the number of stools/day was significantly higher in group B (P = 0.001). Adequate colon preparation was reached in 57.5% (A) and 73.6% (B), respectively (P = 0.206). Side effects were minimal and comparable in both groups. There was no difference in children's age, stool characteristics, or side effects between the children with adequate or inadequate colon preparation. Correlation and agreement between observers was excellent (Pearson correlation = 0.972, kappa = 1.0). No difference between protocols was observed, but the 2 d protocol was superior for its shorter time. Direct comparison between different colon cleansing protocols is crucial in order to establish the "gold standard" protocol for children.

  9. Automatic electromagnetic valve for previous vacuum

    International Nuclear Information System (INIS)

    Granados, C. E.; Martin, F.

    1959-01-01

    A valve which permits the maintenance of an installation vacuum when electric current fails is described. It also lets the air in the previous vacuum bomb to prevent the oil ascending in the vacuum tubes. (Author)

  10. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  11. 77 FR 36281 - Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol

    Science.gov (United States)

    2012-06-18

    ...] Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol AGENCY... Register notice informs the public that OIG: (1) Intends to update the Provider Self-Disclosure Protocol... Provider Self-Disclosure Protocol (the Protocol) to establish a process for health care providers to...

  12. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  13. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  14. Desensitization to clopidogrel: a tailor-made protocol.

    Science.gov (United States)

    Barreira, P; Cadinha, S; Malheiro, D; Moreira da Silva, J P

    2014-01-01

    Clopidogrel is an antiplatelet drug widely used for treatment and prevention of a variety of cardiovascular diseases. We report a successful desensitization to clopidogrel in a 70-year-old Caucasian man with delayed hypersensitivity (HS) reaction. He developed lip, hand and foot swelling, erythematous papular non-pruritic lesions and arthralgias 2 weeks after starting treatment with clopidogrel 75 mg/d. A 3-hour desensitization protocol was started, achieving a cumulative dose of 154 mg without any reaction, and a daily dose of 75 mg was recommended. On the 4th day, the patient developed skin lesions similar to the previously described. He was treated with topical steroids and oral antihistamines, and the daily dose of clopidogrel was reduced to 20 mg. A new desensitization protocol was established, with a slow dose increment, according to the patient's response. It was only possible to achieve the dose of 75 mg/d after 2 months. Although well tolerated by most patients, HS reactions with clopidogrel may occur and desensitization is rising as a safe alternative in those patients. In delayed reactions with cutaneous lesions, a slower desensitization protocol may be necessary, as in this case.

  15. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  16. 77 FR 70176 - Previous Participation Certification

    Science.gov (United States)

    2012-11-23

    ... participants' previous participation in government programs and ensure that the past record is acceptable prior... information is designed to be 100 percent automated and digital submission of all data and certifications is... government programs and ensure that the past record is acceptable prior to granting approval to participate...

  17. On the Tengiz petroleum deposit previous study

    International Nuclear Information System (INIS)

    Nysangaliev, A.N.; Kuspangaliev, T.K.

    1997-01-01

    Tengiz petroleum deposit previous study is described. Some consideration about structure of productive formation, specific characteristic properties of petroleum-bearing collectors are presented. Recommendation on their detail study and using of experience on exploration and development of petroleum deposit which have analogy on most important geological and industrial parameters are given. (author)

  18. Subsequent pregnancy outcome after previous foetal death

    NARCIS (Netherlands)

    Nijkamp, J. W.; Korteweg, F. J.; Holm, J. P.; Timmer, A.; Erwich, J. J. H. M.; van Pampus, M. G.

    Objective: A history of foetal death is a risk factor for complications and foetal death in subsequent pregnancies as most previous risk factors remain present and an underlying cause of death may recur. The purpose of this study was to evaluate subsequent pregnancy outcome after foetal death and to

  19. Establishment Registration & Device Listing

    Data.gov (United States)

    U.S. Department of Health & Human Services — This searchable database contains establishments (engaged in the manufacture, preparation, propagation, compounding, assembly, or processing of medical devices...

  20. Robust and Scalable DTLS Session Establishment

    OpenAIRE

    Tiloca, Marco; Gehrmann, Christian; Seitz, Ludwig

    2016-01-01

    The Datagram Transport Layer Security (DTLS) protocol is highly vulnerable to a form of denial-of-service attack (DoS), aimed at establishing a high number of invalid, half-open, secure sessions. Moreover, even when the efficient pre-shared key provisioning mode is considered, the key storage on the server side scales poorly with the number of clients. SICS Swedish ICT has designed a security architecture that efficiently addresses both issues without breaking the current standard.

  1. Hepatitis B immunisation in persons not previously exposed to hepatitis B or with unknown exposure status

    DEFF Research Database (Denmark)

    Mathew, Joseph L; El Dib, Regina; Mathew, Preethy J

    2008-01-01

    The benefits and harms of hepatitis B vaccination in persons not previously exposed to hepatitis B infection or with unknown exposure status have not been established.......The benefits and harms of hepatitis B vaccination in persons not previously exposed to hepatitis B infection or with unknown exposure status have not been established....

  2. Subsequent childbirth after a previous traumatic birth.

    Science.gov (United States)

    Beck, Cheryl Tatano; Watson, Sue

    2010-01-01

    Nine percent of new mothers in the United States who participated in the Listening to Mothers II Postpartum Survey screened positive for meeting the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition criteria for posttraumatic stress disorder after childbirth. Women who have had a traumatic birth experience report fewer subsequent children and a longer length of time before their second baby. Childbirth-related posttraumatic stress disorder impacts couples' physical relationship, communication, conflict, emotions, and bonding with their children. The purpose of this study was to describe the meaning of women's experiences of a subsequent childbirth after a previous traumatic birth. Phenomenology was the research design used. An international sample of 35 women participated in this Internet study. Women were asked, "Please describe in as much detail as you can remember your subsequent pregnancy, labor, and delivery following your previous traumatic birth." Colaizzi's phenomenological data analysis approach was used to analyze the stories of the 35 women. Data analysis yielded four themes: (a) riding the turbulent wave of panic during pregnancy; (b) strategizing: attempts to reclaim their body and complete the journey to motherhood; (c) bringing reverence to the birthing process and empowering women; and (d) still elusive: the longed-for healing birth experience. Subsequent childbirth after a previous birth trauma has the potential to either heal or retraumatize women. During pregnancy, women need permission and encouragement to grieve their prior traumatic births to help remove the burden of their invisible pain.

  3. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  4. A case series of re-establishment of neuromuscular block with rocuronium after sugammadex reversal.

    Science.gov (United States)

    Iwasaki, Hajime; Sasakawa, Tomoki; Takahoko, Kenichi; Takagi, Shunichi; Nakatsuka, Hideki; Suzuki, Takahiro; Iwasaki, Hiroshi

    2016-06-01

    We report the use of rocuronium to re-establish neuromuscular block after reversal with sugammadex. The aim of this study was to investigate the relationship between the dose of rocuronium needed to re-establish neuromuscular block and the time interval between sugammadex administration and re-administration of rocuronium. Patients who required re-establishment of neuromuscular block within 12 h after the reversal of rocuronium-induced neuromuscular block with sugammadex were included. After inducing general anesthesia and placing the neuromuscular monitor, the protocol to re-establish neuromuscular block was as follows. An initial rocuronium dose of 0.6 mg/kg was followed by additional 0.3 mg/kg doses every 2 min until train-of-four responses were abolished. A total of 11 patients were enrolled in this study. Intervals between sugammadex and second rocuronium were 12-465 min. Total dose of rocuronium needed to re-establish neuromuscular block was 0.6-1.2 mg/kg. 0.6 mg/kg rocuronium re-established neuromuscular block in all patients who received initial sugammadex more than 3 h previously. However, when the interval between sugammadex and second rocuronium was less than 2 h, more than 0.6 mg/kg rocuronium was necessary to re-establish neuromuscular block.

  5. Comparison of IAEA protocols for clinical electron beam dosimetry

    International Nuclear Information System (INIS)

    Novotny, J.; Soukup, M.

    2002-01-01

    In most beam calibration protocols so far used in clinical practice, the method recommended for the determination of absorbed dose to water in high-energy electron beams is based on either an exposure or an air kerma calibration factor of an ionisation chamber in a C0 60 gamma-ray or 2 MV x-ray beam. These protocols are complex and the overall uncertainty in the absorbed dose to water under reference conditions is about 3-4%. The new generation of protocols, namely IAEA TRS 398, are based on absorbed dose-to-water standards in photon beams from Co 60 and accelerator beams. The possible errors in absorbed dose determination in reference conditions in practical clinical dosimetry caused by replacement of TRS 277 and TRS 381 protocols for a new TRS 398 protocol were carefully studied for clinical electron beams in energy range 6-20 MeV. All measurements were performed on Varian CLINAC 2100 C linear accelerator. The electron beam energy ranged from 6 to 20 MeV. Basically three different detectors were used for measurements: PTW Roos plane-parallel ionization chamber, calibrated PTW 30002 Farmer type, ionization, Scanditronix electron diode detector. Measurements of central axis percentage depth doses were made by diode using Wellhoefer WP700 beam scanner in 40 cm x 40 cm x 50 cm water phantom. A reference chamber or semiconductor diode mounted on electron treatment cone was used to correct beam output variations for a chamber or diode measurements during scanning. Absolute dose measurements were carried out with Roos plane-parallel chamber connected to PTW UNIDOS electrometer always for preselected number of monitor units. In a new IAEA dosimetry protocol clinical reference dosimetry for electron beam is performed at depth of d ref = 0.6R 50 - 0.1 [cm] instead of d max as in previous ones. To check the stability of electron beams for energy and to establish d ref and standard deviation for reference depth position, the depth dose curves obtained during the quality

  6. Establishing software quality assurance

    International Nuclear Information System (INIS)

    Malsbury, J.

    1983-01-01

    This paper is concerned with four questions about establishing software QA: What is software QA. Why have software QA. What is the role of software QA. What is necessary to ensure the success of software QA

  7. Blood Establishment Registration Database

    Data.gov (United States)

    U.S. Department of Health & Human Services — This application provides information for active, inactive, and pre-registered firms. Query options are by FEI, Applicant Name, Establishment Name, Other Names,...

  8. Managing previously disposed waste to today's standards

    International Nuclear Information System (INIS)

    1990-01-01

    A Radioactive Waste Management Complex (RWMC) was established at the Idaho National Engineering Laboratory (INEL) in 1952 for controlled disposal of radioactive waste generated at the INEL. Between 1954 and 1970 waste characterized by long lived, alpha emitting radionuclides from the Rocky Flats Plant was also buried at this site. Migration of radionuclides and other hazardous substances from the buried Migration of radionuclides and other hazardous substances from the buried waste has recently been detected. A Buried Waste Program (BWP) was established to manage cleanup of the buried waste. This program has four objectives: (1) determine contaminant sources, (2) determine extent of contamination, (3) mitigate migration, and (4) recommend an alternative for long term management of the waste. Activities designed to meet these objectives have been under way since the inception of the program. The regulatory environment governing these activities is evolving. Pursuant to permitting activities under the Resource Conservation and Recovery Act (RCRA), the Department of Energy (DOE) and the Environmental Protection Agency (EPA) entered into a Consent Order Compliance Agreement (COCA) for cleanup of past practice disposal units at the INEL. Subsequent to identification of the RWMC as a release site, cleanup activities proceeded under dual regulatory coverage of RCRA and the Atomic Energy Act. DOE, EPA, and the State of Idaho are negotiating a RCRA/Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) Interagency Agreement (IAG) for management of waste disposal sites at the INEL as a result of the November 1989 listing of the INEL on the National Priority List (NPL). Decision making for selection of cleanup technology will be conducted under the CERCLA process supplemented as required to meet the requirements of the National Environmental Policy Act (NEPA). 7 figs

  9. Establishment of prairies

    International Nuclear Information System (INIS)

    Lotero Cadavid, J.

    2001-01-01

    Are analyzed the establishment of prairies, such as the selection of the species, the factors of the environment, the impact in the establishment and forage production and its relation to the soil, the precipitation, the temperature, the light and the biotic factors. It is indicated that the selection of the species to settle down, is directly related with the climate and the soil and they group to be tolerant to drought, tolerant to flood soils, tolerant to humid soils, tolerant to soils very acids, moderately acids and saline. It is noticed that a bad establishment of the grasses can be due to the bad quality of the seed, a temperature and unfavorable humidity can cause low germination; equally seeds planted very deeply in heavy soils with excess of humidity. Considerations are made about the establishment and growth of the prairies in connection with the germination, cultures, sowing density and sowing on time, as well as for the soil preparation, the sowing in terrestrial mechanic and non mechanic and the use of cultivations forms of low cost and fertilization systems; equally the establishment of leguminous in mixture with gramineous, the renovation of prairies and the establishment of pastures

  10. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  11. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  12. Books average previous decade of economic misery.

    Science.gov (United States)

    Bentley, R Alexander; Acerbi, Alberto; Ormerod, Paul; Lampos, Vasileios

    2014-01-01

    For the 20(th) century since the Depression, we find a strong correlation between a 'literary misery index' derived from English language books and a moving average of the previous decade of the annual U.S. economic misery index, which is the sum of inflation and unemployment rates. We find a peak in the goodness of fit at 11 years for the moving average. The fit between the two misery indices holds when using different techniques to measure the literary misery index, and this fit is significantly better than other possible correlations with different emotion indices. To check the robustness of the results, we also analysed books written in German language and obtained very similar correlations with the German economic misery index. The results suggest that millions of books published every year average the authors' shared economic experiences over the past decade.

  13. Books Average Previous Decade of Economic Misery

    Science.gov (United States)

    Bentley, R. Alexander; Acerbi, Alberto; Ormerod, Paul; Lampos, Vasileios

    2014-01-01

    For the 20th century since the Depression, we find a strong correlation between a ‘literary misery index’ derived from English language books and a moving average of the previous decade of the annual U.S. economic misery index, which is the sum of inflation and unemployment rates. We find a peak in the goodness of fit at 11 years for the moving average. The fit between the two misery indices holds when using different techniques to measure the literary misery index, and this fit is significantly better than other possible correlations with different emotion indices. To check the robustness of the results, we also analysed books written in German language and obtained very similar correlations with the German economic misery index. The results suggest that millions of books published every year average the authors' shared economic experiences over the past decade. PMID:24416159

  14. An Experimental Protocol for Maternal Pulmonary Exposure in Developmental Toxicology

    DEFF Research Database (Denmark)

    Jackson, Petra; Lund, Søren P.; Kristiansen, Gitte

    2011-01-01

    To establish a protocol for studying effects of pulmonary exposure in developmental toxicity studies, the effects of intratracheal sham instillation under short-term isoflurane anaesthesia were evaluated with a protocol including multiple instillations during gestation. Twelve time-mated mice (C5...

  15. Improving active Mealy machine learning for protocol conformance testing

    NARCIS (Netherlands)

    Aarts, F.; Kuppens, H.; Tretmans, J.; Vaandrager, F.; Verwer, S.

    2014-01-01

    Using a well-known industrial case study from the verification literature, the bounded retransmission protocol, we show how active learning can be used to establish the correctness of protocol implementation I relative to a given reference implementation R. Using active learning, we learn a model M

  16. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  17. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  18. Underestimation of Severity of Previous Whiplash Injuries

    Science.gov (United States)

    Naqui, SZH; Lovell, SJ; Lovell, ME

    2008-01-01

    INTRODUCTION We noted a report that more significant symptoms may be expressed after second whiplash injuries by a suggested cumulative effect, including degeneration. We wondered if patients were underestimating the severity of their earlier injury. PATIENTS AND METHODS We studied recent medicolegal reports, to assess subjects with a second whiplash injury. They had been asked whether their earlier injury was worse, the same or lesser in severity. RESULTS From the study cohort, 101 patients (87%) felt that they had fully recovered from their first injury and 15 (13%) had not. Seventy-six subjects considered their first injury of lesser severity, 24 worse and 16 the same. Of the 24 that felt the violence of their first accident was worse, only 8 had worse symptoms, and 16 felt their symptoms were mainly the same or less than their symptoms from their second injury. Statistical analysis of the data revealed that the proportion of those claiming a difference who said the previous injury was lesser was 76% (95% CI 66–84%). The observed proportion with a lesser injury was considerably higher than the 50% anticipated. CONCLUSIONS We feel that subjects may underestimate the severity of an earlier injury and associated symptoms. Reasons for this may include secondary gain rather than any proposed cumulative effect. PMID:18201501

  19. [Electronic cigarettes - effects on health. Previous reports].

    Science.gov (United States)

    Napierała, Marta; Kulza, Maksymilian; Wachowiak, Anna; Jabłecka, Katarzyna; Florek, Ewa

    2014-01-01

    Currently very popular in the market of tobacco products have gained electronic cigarettes (ang. E-cigarettes). These products are considered to be potentially less harmful in compared to traditional tobacco products. However, current reports indicate that the statements of the producers regarding to the composition of the e- liquids not always are sufficient, and consumers often do not have reliable information on the quality of the product used by them. This paper contain a review of previous reports on the composition of e-cigarettes and their impact on health. Most of the observed health effects was related to symptoms of the respiratory tract, mouth, throat, neurological complications and sensory organs. Particularly hazardous effects of the e-cigarettes were: pneumonia, congestive heart failure, confusion, convulsions, hypotension, aspiration pneumonia, face second-degree burns, blindness, chest pain and rapid heartbeat. In the literature there is no information relating to passive exposure by the aerosols released during e-cigarette smoking. Furthermore, the information regarding to the use of these products in the long term are not also available.

  20. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  1. Developing optimized CT scan protocols: Phantom measurements of image quality

    International Nuclear Information System (INIS)

    Zarb, Francis; Rainford, Louise; McEntee, Mark F.

    2011-01-01

    Purpose: The increasing frequency of computerized tomography (CT) examinations is well documented, leading to concern about potential radiation risks for patients. However, the consequences of not performing the CT examination and missing injuries and disease are potentially serious, impacting upon correct patient management. The ALARA principle of dose optimization must be employed for all justified CT examinations. Dose indicators displayed on the CT console as either CT dose index (CTDI) and/or dose length product (DLP), are used to indicate dose and can quantify improvements achieved through optimization. Key scan parameters contributing to dose have been identified in previous literature and in previous work by our group. The aim of this study was to optimize the scan parameters of mA; kV and pitch, whilst maintaining image quality and reducing dose. This research was conducted using psychophysical image quality measurements on a CT quality assurance (QA) phantom establishing the impact of dose optimization on image quality parameters. Method: Current CT scan parameters for head (posterior fossa and cerebrum), abdomen and chest examinations were collected from 57% of CT suites available nationally in Malta (n = 4). Current scan protocols were used to image a Catphan 600 CT QA phantom whereby image quality was assessed. Each scan parameter: mA; kV and pitch were systematically reduced until the contrast resolution (CR), spatial resolution (SR) and noise were significantly lowered. The Catphan 600 images, produced by the range of protocols, were evaluated by 2 expert observers assessing CR, SR and noise. The protocol considered as the optimization threshold was just above the setting that resulted in a significant reduction in CR and noise but not affecting SR at the 95% confidence interval. Results: The limit of optimization threshold was determined for each CT suite. Employing optimized parameters, CTDI and DLP were both significantly reduced (p ≤ 0.001) by

  2. Establishing a University Foundation.

    Science.gov (United States)

    Lemish, Donald L.

    A handbook on how to establish a university foundation is presented. It presupposes that a foundation will be used as the umbrella organization for receiving all private gifts, restricted and unrestricted, for the benefit of a public college or university; and hence it chiefly addresses readers from public colleges and universities. Information is…

  3. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  4. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  5. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  6. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  7. Differential effects of rapamycin and dexamethasone in mouse models of established allergic asthma.

    Directory of Open Access Journals (Sweden)

    Elizabeth M Mushaben

    Full Text Available The mammalian target of rapamycin (mTOR plays an important role in cell growth/differentiation, integrating environmental cues, and regulating immune responses. Our lab previously demonstrated that inhibition of mTOR with rapamycin prevented house dust mite (HDM-induced allergic asthma in mice. Here, we utilized two treatment protocols to investigate whether rapamycin, compared to the steroid, dexamethasone, could inhibit allergic responses during the later stages of the disease process, namely allergen re-exposure and/or during progression of chronic allergic disease. In protocol 1, BALB/c mice were sensitized to HDM (three i.p. injections and administered two intranasal HDM exposures. After 6 weeks of rest/recovery, mice were re-exposed to HDM while being treated with rapamycin or dexamethasone. In protocol 2, mice were exposed to HDM for 3 or 6 weeks and treated with rapamycin or dexamethasone during weeks 4-6. Characteristic features of allergic asthma, including IgE, goblet cells, airway hyperreactivity (AHR, inflammatory cells, cytokines/chemokines, and T cell responses were assessed. In protocol 1, both rapamycin and dexamethasone suppressed goblet cells and total CD4(+ T cells including activated, effector, and regulatory T cells in the lung tissue, with no effect on AHR or total inflammatory cell numbers in the bronchoalveolar lavage fluid. Rapamycin also suppressed IgE, although IL-4 and eotaxin 1 levels were augmented. In protocol 2, both drugs suppressed total CD4(+ T cells, including activated, effector, and regulatory T cells and IgE levels. IL-4, eotaxin, and inflammatory cell numbers were increased after rapamycin and no effect on AHR was observed. Dexamethasone suppressed inflammatory cell numbers, especially eosinophils, but had limited effects on AHR. We conclude that while mTOR signaling is critical during the early phases of allergic asthma, its role is much more limited once disease is established.

  8. An optimized DNA extraction protocol for benthic Didymosphenia geminata.

    Science.gov (United States)

    Uyua, Noelia Mariel; Manrique, Julieta Marina; Jones, Leandro Roberto

    2014-09-01

    Didymosphenia geminata mats display few cells in relation to extracellular material and contain polysaccharides and heavy metals that interfere with molecular studies. We describe an optimized DNA extraction protocol that help to overcome these difficulties. Our protocol outperformed five previously described DNA extraction techniques. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Comparison of protocols for genomic DNA extraction from 'velame ...

    African Journals Online (AJOL)

    usuario

    2013-07-24

    Jul 24, 2013 ... involving C. linearifolius, we compared the efficiency of six protocols for genomic DNA extraction previously ... phytic, with diverse aspect and floristics, average rainfall between ..... The variation observed for DNA concentrations estimated with .... performed with protocol 1 (data not shown), or still, bands.

  10. Radioiodine treatment of recurrent hyperthyroidism in patients previously treated for Graves' disease by subtotal thyroidectomy

    DEFF Research Database (Denmark)

    Vestergaard, H; Laurberg, P

    1992-01-01

    showed a higher sensitivity to radioiodine, with more cases of early hypothyroidism, than non-operated patients. However, after 50 months of follow-up the outcome was identical. The results indicate that frequent assessment is necessary after radioiodine treatment of previously operated patients, since......Radioiodine therapy is often employed for treatment of patients with relapse of hyperthyroidism due to Graves' disease, after previous thyroid surgery. Little is known about the outcome of this treatment compared to patients with no previous surgery. A total of 20 patients who had received surgical...... treatment for Graves' hyperthyroidism 1-46 years previously and with relapse of the hyperthyroidism, and 25 patients with hyperthyroidism due to Graves' disease and no previous thyroid surgery were treated with radioiodine, following the same protocol. Early after treatment the previously operated patients...

  11. Typing DNA profiles from previously enhanced fingerprints using direct PCR.

    Science.gov (United States)

    Templeton, Jennifer E L; Taylor, Duncan; Handt, Oliva; Linacre, Adrian

    2017-07-01

    Fingermarks are a source of human identification both through the ridge patterns and DNA profiling. Typing nuclear STR DNA markers from previously enhanced fingermarks provides an alternative method of utilising the limited fingermark deposit that can be left behind during a criminal act. Dusting with fingerprint powders is a standard method used in classical fingermark enhancement and can affect DNA data. The ability to generate informative DNA profiles from powdered fingerprints using direct PCR swabs was investigated. Direct PCR was used as the opportunity to generate usable DNA profiles after performing any of the standard DNA extraction processes is minimal. Omitting the extraction step will, for many samples, be the key to success if there is limited sample DNA. DNA profiles were generated by direct PCR from 160 fingermarks after treatment with one of the following dactyloscopic fingerprint powders: white hadonite; silver aluminium; HiFi Volcano silk black; or black magnetic fingerprint powder. This was achieved by a combination of an optimised double-swabbing technique and swab media, omission of the extraction step to minimise loss of critical low-template DNA, and additional AmpliTaq Gold ® DNA polymerase to boost the PCR. Ninety eight out of 160 samples (61%) were considered 'up-loadable' to the Australian National Criminal Investigation DNA Database (NCIDD). The method described required a minimum of working steps, equipment and reagents, and was completed within 4h. Direct PCR allows the generation of DNA profiles from enhanced prints without the need to increase PCR cycle numbers beyond manufacturer's recommendations. Particular emphasis was placed on preventing contamination by applying strict protocols and avoiding the use of previously used fingerprint brushes. Based on this extensive survey, the data provided indicate minimal effects of any of these four powders on the chance of obtaining DNA profiles from enhanced fingermarks. Copyright © 2017

  12. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  13. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  14. Atomic Weapons Establishment Bill

    International Nuclear Information System (INIS)

    Clark, Alan; Dalyell, Tam; Haynes, Frank

    1990-01-01

    The Bill debated concerns the government's proposal for the future organisations of the atomic weapons establishment in the United Kingdom. The proposals arise from a full review carried out in 1989 and include points raised by the Select Committee on the Trident programme. Studies of productivity, pay and conditions, information systems and long term manufacturing strategy have been started to enable recommendations of the reorganisation of the establishments to be made. The details of the Bill were debated for just over two hours. The debate is reported verbatim. The main issues were over the principle of contractorisation, possible staff redundancies, conditions of employment, safety and security. The proposal that the Bill be read a second time was carried. (UK)

  15. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  16. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  17. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  18. Establishment of heart teams in Portugal.

    Science.gov (United States)

    Sousa Uva, M; Leite Moreira, A; Gavina, C; Pereira, H; Lopes, M G

    2014-01-01

    Whenever several therapeutic options exist, multidisciplinary decision-making is beneficial for the patient and for society at large. The main obstacles to the establishment of heart teams in Portugal are organizational and logistical. Implementing a heart team approach entails definition of the situations requiring multidisciplinary discussion, creation of clear lines of communication, written protocols and obtaining patient informed consent. The European Society of Cardiology guidelines define the clinical scenarios where intervention of the heart team is recommended. Copyright © 2013 Sociedade Portuguesa de Cardiologia. Published by Elsevier España. All rights reserved.

  19. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  20. Secular Religious Establishment

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2013-01-01

    Secularism as a political doctrine claims that religion and politics should be separated. The compatibility question is whether secularism can accept some forms of religious establishment in the form of institutional linkages between state and organised religion. I argue that the answer...... to the compatibility question is not obvious and requires a systematic analysis of secularism. Based on a distinction between a general concept and specific conceptions of secularism I offer a general structure for conceptions of secularism that incorporates both a) basic values, e.g. political equality and freedom...

  1. Fast-track protocols in devascularization for cirrhotic portal hypertension

    Directory of Open Access Journals (Sweden)

    Yang Fei

    2015-06-01

    Full Text Available Summary Introduction/objective: fast-tract surgery (FTS has been rapidly embraced by surgeons as a mechanism for improving patient care and driving down complications and costs. The aim of this study was to determine if any improvement in outcomes occurred after FTS protocol for selective double portazygous disconnection with preserving vagus (SDPDPV compared with non-FTS postoperative care. Methods: patients eligible for SDPDPV in the period January 2012-April 2014 were randomly selected for the FTS group or non-FTS group. A designed protocol was used in the FTS group with emphasis on an interdisciplinary approach. The non-FTS group was treated using previously established standard procedures. The number of postoperative complications, time of functional recovery and duration of hospital stay were recorded. Results: patients in the FTS group (n=59 and non-FTS group (n=57 did not differ in terms of preoperative data and operative details (p>0.05. The FTS procedure led to significantly better control and faster restoration of gastrointestinal functions, food tolerance, rehabilitation and hospital discharge (p<0.05. Postoperative complications, including nausea/vomiting, severe ascites, wound infection, urinary tract infection and pulmonary infection were all significantly lower in the FTS group (p<0.05. According to the postoperative morbidity classification used by Clavien, overall complications and grade I complications were both significantly lower in the FTS group compared with the non-FTS group (p<0.05. Conclusion: adopting the FTS protocol helped to recover gastrointestinal functions, to reduce frequency of postoperative complications and to reduce hospital stay. The FTS strategy is safe and effective in improving postoperative outcomes.

  2. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  3. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  4. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  5. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  6. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  7. Establishing Political Deliberation Systems

    DEFF Research Database (Denmark)

    Rose, Jeremy; Sæbø, Øystein

    2008-01-01

    The extension and transformation of political participation is dependent on widespread deliberation supported by information and communication technologies.  The most commonly found examples of these eParticipation systems are political discussion forums.  Though much of the discussion...... of these technologies is conducted in the eGovernment and (particularly) the eDemocracy literature, political discussion forums present a distinct set of design and management challenges which relate directly to IS concerns. In this article we analyze problems in establishing political deliberation systems under five...... headings: stakeholder engagement, web platform design, web platform management, political process re-shaping and evaluation and improvement. We review the existing literature and present a longitudinal case study of a political discussion forum: the Norwegian DemokratiTorget (Democracy Square).  We define...

  8. Causality re-established.

    Science.gov (United States)

    D'Ariano, Giacomo Mauro

    2018-07-13

    Causality has never gained the status of a 'law' or 'principle' in physics. Some recent literature has even popularized the false idea that causality is a notion that should be banned from theory. Such misconception relies on an alleged universality of the reversibility of the laws of physics, based either on the determinism of classical theory, or on the multiverse interpretation of quantum theory, in both cases motivated by mere interpretational requirements for realism of the theory. Here, I will show that a properly defined unambiguous notion of causality is a theorem of quantum theory, which is also a falsifiable proposition of the theory. Such a notion of causality appeared in the literature within the framework of operational probabilistic theories. It is a genuinely theoretical notion, corresponding to establishing a definite partial order among events, in the same way as we do by using the future causal cone on Minkowski space. The notion of causality is logically completely independent of the misidentified concept of 'determinism', and, being a consequence of quantum theory, is ubiquitous in physics. In addition, as classical theory can be regarded as a restriction of quantum theory, causality holds also in the classical case, although the determinism of the theory trivializes it. I then conclude by arguing that causality naturally establishes an arrow of time. This implies that the scenario of the 'block Universe' and the connected 'past hypothesis' are incompatible with causality, and thus with quantum theory: they are both doomed to remain mere interpretations and, as such, are not falsifiable, similar to the hypothesis of 'super-determinism'.This article is part of a discussion meeting issue 'Foundations of quantum mechanics and their impact on contemporary society'. © 2018 The Author(s).

  9. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  10. Proteomics Analysis Reveals Previously Uncharacterized Virulence Factors in Vibrio proteolyticus

    Directory of Open Access Journals (Sweden)

    Ann Ray

    2016-07-01

    Full Text Available Members of the genus Vibrio include many pathogens of humans and marine animals that share genetic information via horizontal gene transfer. Hence, the Vibrio pan-genome carries the potential to establish new pathogenic strains by sharing virulence determinants, many of which have yet to be characterized. Here, we investigated the virulence properties of Vibrio proteolyticus, a Gram-negative marine bacterium previously identified as part of the Vibrio consortium isolated from diseased corals. We found that V. proteolyticus causes actin cytoskeleton rearrangements followed by cell lysis in HeLa cells in a contact-independent manner. In search of the responsible virulence factor involved, we determined the V. proteolyticus secretome. This proteomics approach revealed various putative virulence factors, including active type VI secretion systems and effectors with virulence toxin domains; however, these type VI secretion systems were not responsible for the observed cytotoxic effects. Further examination of the V. proteolyticus secretome led us to hypothesize and subsequently demonstrate that a secreted hemolysin, belonging to a previously uncharacterized clan of the leukocidin superfamily, was the toxin responsible for the V. proteolyticus-mediated cytotoxicity in both HeLa cells and macrophages. Clearly, there remains an armory of yet-to-be-discovered virulence factors in the Vibrio pan-genome that will undoubtedly provide a wealth of knowledge on how a pathogen can manipulate host cells.

  11. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  12. Protocol for the verification of minimum criteria

    International Nuclear Information System (INIS)

    Gaggiano, M.; Spiccia, P.; Gaetano Arnetta, P.

    2014-01-01

    This Protocol has been prepared with reference to the provisions of article 8 of the Legislative Decree of May 26, 2000 No. 187. Quality controls of radiological equipment fit within the larger 'quality assurance Program' and are intended to ensure the correct operation of the same and the maintenance of that State. The pursuit of this objective guarantees that the radiological equipment subjected to those controls also meets the minimum criteria of acceptability set out in annex V of the aforementioned legislative decree establishing the conditions necessary to allow the functions to which each radiological equipment was designed, built and for which it is used. The Protocol is established for the purpose of quality control of radiological equipment of Cone Beam Computer Tomography type and reference document, in the sense that compliance with stated tolerances also ensures the subsistence minimum acceptability requirements, where applicable.

  13. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  14. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  15. Risoe Research Establishment, Denmark

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1973-07-01

    On the poetic Roskilde Fjord, 40 kilometers from Copenhagen, and near Roskilde, capital of Denmark in the 12th century, stands the Risoe Research Establishment of the Danish Atomic Energy Commission. ere 700 men and women are engaged in searching for ways in which atomic energy can be used to make the world a better and healthier place. The work at Risoe comprises fundamental research, reactor technology and other technological studies, agricultural research and health and safety studies. Nuclear power stations are scheduled to be operative in Denmark some time between 1975 and 1980, and the planning of these stations and development of the many processes this will involve has become a major task at Risoe. Special conditions have to be fulfilled in selecting the site of an atomic research station, and the barren Risoe peninsula had them all: safety, because the site was free from buildings to permit continuous control; closeness to the scientific institutions of the capital, Copenhagen; social amenities in Roskilde; finally, access to an a adequate water supply. his special series of photos covering some aspects of the work and safety conditions at Risoe was commissioned by WHO. (author)

  16. Risoe Research Establishment, Denmark

    International Nuclear Information System (INIS)

    1973-01-01

    On the poetic Roskilde Fjord, 40 kilometers from Copenhagen, and near Roskilde, capital of Denmark in the 12th century, stands the Risoe Research Establishment of the Danish Atomic Energy Commission. ere 700 men and women are engaged in searching for ways in which atomic energy can be used to make the world a better and healthier place. The work at Risoe comprises fundamental research, reactor technology and other technological studies, agricultural research and health and safety studies. Nuclear power stations are scheduled to be operative in Denmark some time between 1975 and 1980, and the planning of these stations and development of the many processes this will involve has become a major task at Risoe. Special conditions have to be fulfilled in selecting the site of an atomic research station, and the barren Risoe peninsula had them all: safety, because the site was free from buildings to permit continuous control; closeness to the scientific institutions of the capital, Copenhagen; social amenities in Roskilde; finally, access to an a adequate water supply. his special series of photos covering some aspects of the work and safety conditions at Risoe was commissioned by WHO. (author)

  17. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  18. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  19. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  20. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  1. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  2. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  3. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    Energy Technology Data Exchange (ETDEWEB)

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  4. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  5. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  6. A novel cognitive palatability assessment protocol for dogs.

    Science.gov (United States)

    Araujo, J A; Milgram, N W

    2004-07-01

    Assessment of canine palatability is important for both the pet food and pharmaceutical industries; however, the current palatability assessment protocols are limited in their utility. The most common technique, the two-pan test, does not control for the satiating effects of food and may not be useful for long-term palatability analysis because nutritional or caloric characteristics of the diets may interfere with the results. Furthermore, the large quantities of foods consumed may be detrimental to the health of animals that do not self-limit their food intake. The purpose of this study was to determine whether a cognitive protocol could be used to determine food palatability in dogs. Five beagle dogs were trained on a three-choice object-discrimination learning task. After establishing object preferences, the preferred object was associated with no reward, a second object was associated with the dog's normal laboratory diet (Purina Agribrands Canine Lab Chow No. 5006; Agribrands Purina Canada, Inc., Woodstock, ON, Canada), and the third object was associated with a commercial (Hill's P/D; Hill's Pet Nutrition Inc., Topeka, KS) diet. In the discrimination-training phase, dogs were trained until they learned to avoid the no-reward object. They were subsequently given an additional 20 test sessions, which were used to determine food preference. In the reversal phase, which involved reversal learning, the object-food associations were modified, such that the object that was previously associated with Hill's P/D diet was now associated with the normal laboratory diet and vice versa. Once the dogs learned to avoid the no-reward object, they were tested for an additional 20 sessions. All subjects learned to avoid the no-reward object during the initial learning, and the number of choices to the object associated with the Hill's P/D diet was greater than the number of choices to the objects associated with the dry laboratory diet (P food-choice associations were reversed

  7. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2008-04-01

    terms of the concatenated protocol parameters. New source-to-destination routes are sought that optimize cross-layer interdependencies to achieve the "best available" performance in the WSN. The protocol design, modified from a known reactive protocol, adapts the achievable performance to the transient network conditions and resource levels. Control of network behavior is realized through the conditional rates of the MVPPs. Optimal cross-layer protocol parameters are determined by stochastic dynamic programming conditions derived from models of transient packetized sensor data flows. Moreover, the defining conditions for WSN configurations, grouping sensor nodes into clusters and establishing data aggregation at processing nodes within those clusters, lead to computationally tractable solutions to the stochastic differential equations that describe network dynamics. Closed-form solution characteristics provide an alternative to the "directed diffusion" methods for resource-efficient WSN protocols published previously by other researchers. Performance verification of the resulting cross-layer designs is found by embedding the optimality conditions for the protocols in actual WSN scenarios replicated in a wireless network simulation environment. Performance tradeoffs among protocol parameters remain for a sequel to the paper.

  8. A method for acetylcholinesterase staining of brain sections previously processed for receptor autoradiography.

    Science.gov (United States)

    Lim, M M; Hammock, E A D; Young, L J

    2004-02-01

    Receptor autoradiography using selective radiolabeled ligands allows visualization of brain receptor distribution and density on film. The resolution of specific brain regions on the film often can be difficult to discern owing to the general spread of the radioactive label and the lack of neuroanatomical landmarks on film. Receptor binding is a chemically harsh protocol that can render the tissue virtually unstainable by Nissl and other conventional stains used to delineate neuroanatomical boundaries of brain regions. We describe a method for acetylcholinesterase (AChE) staining of slides previously processed for receptor binding. AChE staining is a useful tool for delineating major brain nuclei and tracts. AChE staining on sections that have been processed for receptor autoradiography provides a direct comparison of brain regions for more precise neuroanatomical description. We report a detailed thiocholine protocol that is a modification of the Koelle-Friedenwald method to amplify the AChE signal in brain sections previously processed for autoradiography. We also describe several temporal and experimental factors that can affect the density and clarity of the AChE signal when using this protocol.

  9. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  10. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  11. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  12. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  13. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  14. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  15. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  16. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  17. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  18. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  19. Mediastinal involvement in lymphangiomatosis: a previously unreported MRI sign

    Energy Technology Data Exchange (ETDEWEB)

    Shah, Vikas; Shah, Sachit; Barnacle, Alex; McHugh, Kieran [Great Ormond Street Hospital for Children, Department of Radiology, London (United Kingdom); Sebire, Neil J. [Great Ormond Street Hospital for Children, Department of Histopathology, London (United Kingdom); Brock, Penelope [Great Ormond Street Hospital for Children, Department of Oncology, London (United Kingdom); Harper, John I. [Great Ormond Street Hospital for Children, Department of Dermatology, London (United Kingdom)

    2011-08-15

    Multifocal lymphangiomatosis is a rare systemic disorder affecting children. Due to its rarity and wide spectrum of clinical, histological and imaging features, establishing the diagnosis of multifocal lymphangiomatosis can be challenging. The purpose of this study was to describe a new imaging sign in this disorder: paraspinal soft tissue and signal abnormality at MRI. We retrospectively reviewed the imaging, clinical and histopathological findings in a cohort of eight children with thoracic involvement from this condition. Evidence of paraspinal chest disease was identified at MRI and CT in all eight of these children. The changes comprise heterogeneous intermediate-to-high signal parallel to the thoracic vertebrae on T2-weighted sequences at MRI, with abnormal paraspinal soft tissue at CT and plain radiography. Multifocal lymphangiomatosis is a rare disorder with a broad range of clinicopathological and imaging features. MRI allows complete evaluation of disease extent without the use of ionising radiation and has allowed us to describe a previously unreported imaging sign in this disorder, namely, heterogeneous hyperintense signal in abnormal paraspinal tissue on T2-weighted images. (orig.)

  20. Establishment of fruit bat cells (Rousettus aegyptiacus as a model system for the investigation of filoviral infection.

    Directory of Open Access Journals (Sweden)

    Verena Krähling

    Full Text Available BACKGROUND: The fruit bat species Rousettus aegyptiacus was identified as a potential reservoir for the highly pathogenic filovirus Marburg virus. To establish a basis for a molecular understanding of the biology of filoviruses in the reservoir host, we have adapted a set of molecular tools for investigation of filovirus replication in a recently developed cell line, R06E, derived from the species Rousettus aegyptiacus. METHODOLOGY/PRINCIPAL FINDINGS: Upon infection with Ebola or Marburg viruses, R06E cells produced viral titers comparable to VeroE6 cells, as shown by TCID(50 analysis. Electron microscopic analysis of infected cells revealed morphological signs of filovirus infection as described for human- and monkey-derived cell lines. Using R06E cells, we detected an unusually high amount of intracellular viral proteins, which correlated with the accumulation of high numbers of filoviral nucleocapsids in the cytoplasm. We established protocols to produce Marburg infectious virus-like particles from R06E cells, which were then used to infect naïve target cells to investigate primary transcription. This was not possible with other cell lines previously tested. Moreover, we established protocols to reliably rescue recombinant Marburg viruses from R06E cells. CONCLUSION/SIGNIFICANCE: These data indicated that R06E cells are highly suitable to investigate the biology of filoviruses in cells derived from their presumed reservoir.

  1. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  2. Protocols on prenatal care for pregnant women with Zika infection and children with microcephaly: nutritional approach

    Directory of Open Access Journals (Sweden)

    Rachel de Sá Barreto Luna Callou Cruz

    Full Text Available Abstract This summary aimed to synthesize the protocol guidelines of Pernambuco, the Ministry of Health and the Centers for Disease Control and Prevention which deal with health care related to Zika virus infection during pregnancy and the preliminary procedures for surveillance on microcephaly cases including nutritional care. With the increase of number of cases on this event since August, 2015, it was necessary to reorganize the prenatal care which is offered to pregnant women, including the protocols in order to reduce the chances of a possible contamination of the virus, to detect previously suspected cases as well as perform follow up on confirmed cases. The gaps in the knowledge of this morbidity, it should be noted that the information and recommendations are subject to revision due to possible incorporation of new knowledge and other evidence, as well as the need for adequacy of surveillance actions in new epidemiological scenarios. It is known that cases of nutritional deficiencies are capable of producing malformation of the Central Nervous System, including microcephaly. In the analysis of the protocols, there were no changes as to the nutritional recommendations already established for the low-risk pregnant women. The authors presented a hypothesis and conceptually, as a prevention measurement, the inclusion of prenatal care to prevent and control isolated or multiple deficiencies associated to microcephaly, such as protein, vitamin A, iodine, folate, B12, vitamin D, biotin, zinc and selenium.

  3. [Carbapenem antibiotics in hospitalised paediatric patients. Adherence to a therapeutic protocol].

    Science.gov (United States)

    Montesinos-Sanchis, Elena; Moraga-Llop, Fernando A; Soler-Palacín, Pere; Oliveras-Arenas, María; Larrosa Escartín, M Nieves; Martínez Gómez, Xavier; Figueras-Nadal, Concepción

    2014-12-01

    To describe the use of carbapenems in children hospitalised outside intensive care and onco-haematology units, and assess adherence to a therapeutic protocol. A retrospective observational study was conducted on the use of carbapenems between January 2009 and December 2010. The study included children with a community-acquired infectious disease or a health care-associated infectious disease, and who were admitted to paediatric areas of the Vall d'Hebron University Hospital (Barcelona, Spain), other than intensive care, neonatology and onco-haematology units. Clinical data were collected and antibiotic consumption data were provided by the Pharmacy Department. A total of 51 episodes fulfilled the inclusion criteria. Carbapenem as initial empirical treatment was indicated in 31.4%, and applied as rescue therapy in the remainder. The instructions of the protocol were adhered to in 70.6% of the empirical and 87.5% of the targeted prescriptions (77.6% overall). A better match was found for empirical carbapenem in patients with a previous admission or underlying condition. Factors such as diagnosis, age or antibiotic use prior to admission did not affect the empirical indication of carbapenem. The establishment of a treatment protocol with carbapenem indications in our centre since 2007 has yielded significantly better results on the appropriateness of the prescription than those obtained in other studies. Copyright © 2012 Elsevier España, S.L.U. y Sociedad Española de Enfermedades Infecciosas y Microbiología Clínica. All rights reserved.

  4. The introduction of a protocol for the use of biobrane for facial burns in children.

    Science.gov (United States)

    Rogers, A D; Adams, S; Rode, H

    2011-01-01

    BIOBRANE HAS BECOME AN INDISPENSIBLE DRESSING WITH THREE ESTABLISHED INDICATIONS IN ACUTE BURNS CARE AT OUR INSTITUTION: (1) as the definitive dressing of superficial partial thickness facial burns, (2) after tangential excision of deep burns when autograft or cadaver skin is unavailable, and (3) for graft reduction. This paper details our initial experience of Biobrane for the management of superficial partial thickness facial burns in children and the protocol that was compiled for its optimal use. A retrospective analysis of theatre records, case notes and photographs was performed to evaluate our experience with Biobrane over a one-year period. Endpoints included length of stay, analgesic requirements, time to application of Biobrane, healing times, and aesthetic results. Historical controls were used to compare the results with our previous standard of care. 87 patients with superficial partial thickness burns of the face had Biobrane applied during this period. By adhering to the protocol we were able to demonstrate significant reductions in hospital stay, healing time, analgesic requirements, nursing care, with excellent cosmetic results. The protocol is widely accepted by all involved in the optimal management of these patients, including parents, anaesthetists, and nursing staff.

  5. A Calculus for Control Flow Analysis of Security Protocols

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Nielson, Hanne Riis; Nielson, Flemming

    2004-01-01

    The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying...... analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description...

  6. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  7. Establishment probability in newly founded populations

    Directory of Open Access Journals (Sweden)

    Gusset Markus

    2012-06-01

    Full Text Available Abstract Background Establishment success in newly founded populations relies on reaching the established phase, which is defined by characteristic fluctuations of the population’s state variables. Stochastic population models can be used to quantify the establishment probability of newly founded populations; however, so far no simple but robust method for doing so existed. To determine a critical initial number of individuals that need to be released to reach the established phase, we used a novel application of the “Wissel plot”, where –ln(1 – P0(t is plotted against time t. This plot is based on the equation P0t=1–c1e–ω1t, which relates the probability of extinction by time t, P0(t, to two constants: c1 describes the probability of a newly founded population to reach the established phase, whereas ω1 describes the population’s probability of extinction per short time interval once established. Results For illustration, we applied the method to a previously developed stochastic population model of the endangered African wild dog (Lycaon pictus. A newly founded population reaches the established phase if the intercept of the (extrapolated linear parts of the “Wissel plot” with the y-axis, which is –ln(c1, is negative. For wild dogs in our model, this is the case if a critical initial number of four packs, consisting of eight individuals each, are released. Conclusions The method we present to quantify the establishment probability of newly founded populations is generic and inferences thus are transferable to other systems across the field of conservation biology. In contrast to other methods, our approach disaggregates the components of a population’s viability by distinguishing establishment from persistence.

  8. Drug Establishments Current Registration Site

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Drug Establishments Current Registration Site (DECRS) is a database of current information submitted by drug firms to register establishments (facilities) which...

  9. Reliability of single aliquot regenerative protocol (SAR) for dose estimation in quartz at different burial temperatures: A simulation study

    International Nuclear Information System (INIS)

    Koul, D.K.; Pagonis, V.; Patil, P.

    2016-01-01

    The single aliquot regenerative protocol (SAR) is a well-established technique for estimating naturally acquired radiation doses in quartz. This simulation work examines the reliability of SAR protocol for samples which experienced different ambient temperatures in nature in the range of −10 to 40 °C. The contribution of various experimental variables used in SAR protocols to the accuracy and precision of the method is simulated for different ambient temperatures. Specifically the effects of paleo-dose, test dose, pre-heating temperature and cut-heat temperature on the accuracy of equivalent dose (ED) estimation are simulated by using random combinations of the concentrations of traps and centers using a previously published comprehensive quartz model. The findings suggest that the ambient temperature has a significant bearing on the reliability of natural dose estimation using SAR protocol, especially for ambient temperatures above 0 °C. The main source of these inaccuracies seems to be thermal sensitization of the quartz samples caused by the well-known thermal transfer of holes between luminescence centers in quartz. The simulations suggest that most of this inaccuracy in the dose estimation can be removed by delivering the laboratory doses in pulses (pulsed irradiation procedures). - Highlights: • Ambient temperatures affect the reliability of SAR. • It overestimates the dose with increase in burial temperature and burial time periods. • Elevated temperature irradiation does not correct for these overestimations. • Inaccuracies in dose estimation can be removed by incorporating pulsed irradiation procedures.

  10. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chaojing; Zhang Quan

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  11. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  12. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  13. Establishment, maintenance, and re-establishment of the safe and efficient steady-following state

    International Nuclear Information System (INIS)

    Pan Deng; Zheng Ying-Ping

    2015-01-01

    We present an integrated mathematical model of vehicle-following control for the establishment, maintenance, and re-establishment of the previous or new safe and efficient steady-following state. The hyperbolic functions are introduced to establish the corresponding mathematical models, which can describe the behavioral adjustment of the following vehicle steered by a well-experienced driver under complex vehicle following situations. According to the proposed mathematical models, the control laws of the following vehicle adjusting its own behavior can be calculated for its moving in safety, efficiency, and smoothness (comfort). Simulation results show that the safe and efficient steady-following state can be well established, maintained, and re-established by its own smooth (comfortable) behavioral adjustment with the synchronous control of the following vehicle’s velocity, acceleration, and the actual following distance. (paper)

  14. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  15. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  16. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  17. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  18. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  19. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  20. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  1. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  2. The protein protocols handbook

    National Research Council Canada - National Science Library

    Walker, John M

    2002-01-01

    .... The new chapters cover with many rapidly developing areas, particularly the application of mass spectrometry in protein characterization, as well as the now well-established 2-D PAGE technique in proteomics...

  3. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    Science.gov (United States)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  4. Impact of previously disadvantaged land-users on sustainable ...

    African Journals Online (AJOL)

    Impact of previously disadvantaged land-users on sustainable agricultural ... about previously disadvantaged land users involved in communal farming systems ... of input, capital, marketing, information and land use planning, with effect on ...

  5. Report made on the behalf of the Foreign Affairs Commission on the bill project nr 2932 authorizing the ratification of the protocol modifying the protocol on transitory dispositions attached to the Treaty on the European Union, to the Treaty on the functioning of the European Union, and to the Treaty establishing the European Atomic Energy Community; Rapport fait au nom de la Commission des Affaires Etrangeres sur le Projet de Loi n. 2932, autorisant la ratification du protocole modifiant le protocole sur les dispositions transitoires annexe au traite sur l'Union europeenne, au traite sur le fonctionnement de l'Union europeenne et au traite instituant la Communaute europeenne de l'energie atomique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    This report first describes and comments the consequences of the Lisbon Treaty in terms of composition for the European Parliament, and more particularly the debate about the design of an efficient and representative parliament, the election mode and the seat distribution. Then, it describes how the modification protocol has been elaborated, its content (general architecture, eighteen additional seats for twelve member States and their election modalities), and its implementation (agenda and method)

  6. 22 CFR 40.91 - Certain aliens previously removed.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Certain aliens previously removed. 40.91... IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Aliens Previously Removed § 40.91 Certain aliens previously removed. (a) 5-year bar. An alien who has been found inadmissible, whether as a result...

  7. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  8. Information required from States, including 'small quantities protocol' status, under the Protocol Additional to Safeguards Agreements

    International Nuclear Information System (INIS)

    Tuley, N.

    1999-01-01

    The Model, or Additional, Protocol to the Model Safeguards Agreement, INFCIRC/153, contains, inter alia, provisions for expanded declarations from Member States to the IAEA. These provisions include earlier design information declarations and information on fuel cycles activities, such a mining and milling, that were not previously part of safeguards. The session discusses the extent of the expanded declarations and provides examples of the forms that will be used to provide the information to the Agency. (author)

  9. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  10. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  11. Determining root correspondence between previously and newly detected objects

    Science.gov (United States)

    Paglieroni, David W.; Beer, N Reginald

    2014-06-17

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  12. Chicken Induced Pluripotent Stem Cells: Establishment and Characterization.

    Science.gov (United States)

    Fuet, Aurelie; Pain, Bertrand

    2017-01-01

    In mammals, the introduction of the OSKM (Oct4, Sox2, Klf4, and c-Myc) genes into somatic cells has allowed generating induced pluripotent stem (iPS) cells. So far, this process has been only clearly demonstrated in mammals. Here, using chicken as an avian model, we describe a set of protocols allowing the establishment, characterization, maintenance, differentiation, and injection of putative reprogrammed chicken Induced Pluripotent Stem (iPS) cells.

  13. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  14. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  15. Previous Mental Disorders and Subsequent Onset of Chronic Back or Neck Pain : Findings From 19 Countries

    NARCIS (Netherlands)

    Viana, Maria Carmen; Lim, Carmen C W; Garcia Pereira, Flavia; Aguilar-Gaxiola, Sergio; Alonso, Jordi; Bruffaerts, Ronny; de Jonge, Peter; Caldas-de-Almeida, Jose Miguel; O'Neill, Siobhan; Stein, Dan J; Al-Hamzawi, Ali; Benjet, Corina; Cardoso, Graça; Florescu, Silvia; de Girolamo, Giovanni; Haro, Josep Maria; Hu, Chiyi; Kovess-Masfety, Viviane; Levinson, Daphna; Piazza, Marina; Posada-Villa, José; Rabczenko, Daniel; Kessler, Ronald C; Scott, Kate M

    Associations between depression/anxiety and pain are well established, but its directionality is not clear. We examined the associations between temporally previous mental disorders and subsequent self-reported chronic back/neck pain onset, and investigated the variation in the strength of

  16. Testing objects in Computerized Axial Tomography. Contributions to the Spanish Protocol on quality control in radiodiagnostics

    International Nuclear Information System (INIS)

    Villaescusa, J.I.; Campayo, J.M.

    1995-01-01

    In the provisional version of the Spanish Protocol about the technical aspects of Quality Control in Radiodiagnostic,SEFM-SEPR 1993, it is dedicated a section to Computerized Axial tomography, establishing a total of eleven technical parameters of the equipment for examination. The present work describes the practical use of the Protocol using various types of Test Object. The authors also propose new tests that should be considered in the final version of the Spanish Protocol. (Author)

  17. Core Outcome Domains for early phase clinical trials of sound-, psychology-, and pharmacology-based interventions to manage chronic subjective tinnitus in adults: the COMIT'ID study protocol for using a Delphi process and face-to-face meetings to establish consensus.

    Science.gov (United States)

    Fackrell, Kathryn; Smith, Harriet; Colley, Veronica; Thacker, Brian; Horobin, Adele; Haider, Haúla F; Londero, Alain; Mazurek, Birgit; Hall, Deborah A

    2017-08-23

    The reporting of outcomes in clinical trials of subjective tinnitus indicates that many different tinnitus-related complaints are of interest to investigators, from perceptual attributes of the sound (e.g. loudness) to psychosocial impacts (e.g. quality of life). Even when considering one type of intervention strategy for subjective tinnitus, there is no agreement about what is critically important for deciding whether a treatment is effective. The main purpose of this observational study is, therefore to, develop Core Outcome Domain Sets for the three different intervention strategies (sound, psychological, and pharmacological) for adults with chronic subjective tinnitus that should be measured and reported in every clinical trial of these interventions. Secondary objectives are to identify the strengths and limitations of our study design for recruiting and reducing attrition of participants, and to explore uptake of the core outcomes. The 'Core Outcome Measures in Tinnitus: International Delphi' (COMIT'ID) study will use a mixed-methods approach that incorporates input from health care users at the pre-Delphi stage, a modified three-round Delphi survey and final consensus meetings (one for each intervention). The meetings will generate recommendations by stakeholder representatives on agreed Core Outcome Domain Sets specific to each intervention. A subsequent step will establish a common cross-cutting Core Outcome Domain Set by identifying the common outcome domains included in all three intervention-specific Core Outcome Domain Sets. To address the secondary objectives, we will gather feedback from participants about their experience of taking part in the Delphi process. We aspire to conduct an observational cohort study to evaluate uptake of the core outcomes in published studies at 7 years following Core Outcome Set publication. The COMIT'ID study aims to develop a Core Outcome Domain Set that is agreed as critically important for deciding whether a

  18. Life-history traits in an evergreen Mediterranean oak respond differentially to previous experimental environments

    Directory of Open Access Journals (Sweden)

    J. M. Rey Benayas

    2008-06-01

    Full Text Available Living organisms respond both to current and previous environments, which can have important consequences on population dynamics. However, there is little experimental evidence based on long-term field studies of the effects of previous environments on the performance of individuals. We tested the hypothesis that trees that establish under different environmental conditions perform differently under similar post-establishment conditions. We used the slow-growing, evergreen Mediterranean oak Quercus ilex subsp. rotundifolia as target species. We analyzed the effects of previous environments, competition effects and tradeoffs among life-history traits (survival, growth, and reproduction. We enhanced seedling establishment for three years by reducing abiotic environmental harshness by means of summer irrigation and artificial shading in 12 experimental plots, while four plots remained as controls. Then these treatments were interrupted for ten years. Seedlings under ameliorated environmental conditions survived and grew faster during early establishment. During the post-management period, previous treatments 1 did not have any effect on survival, 2 experienced a slower above-ground growth, 3 decreased root biomass as indicated from reflectivity of Ground Penetration Radar, 4 increased acorn production mostly through a greater canopy volume and 5 increased acorn production effort. The trees exhibited a combination of effects related to acclimation for coping with abiotic stress and effects of intra-specific competition. In accordance with our hypothesis, tree performance overall depended on previous environmental conditions, and the response was different for different life-history traits. We recommend early management because it increased plot cover, shortened the time to attain sexual maturity and increased the amount of acorn production. Plots such as those assessed in this study may act as sources of propagules in deforested

  19. Evolving Ceremonial Protocol in Chieftaincy at Duayaw-Nkwanta in ...

    African Journals Online (AJOL)

    ANDCORPgh changing the world

    2016-05-30

    May 30, 2016 ... As Opoku remarks aptly, “the Akan live with the spirits of their dead. They ... the established protocol of the chieftaincy institution, such as the performance of ... participant observation and audio-visual recording of the anniversary celebration, ...... Interaction through music: The dynamics of music making.

  20. Formal Security Analysis of the MaCAN Protocol

    DEFF Research Database (Denmark)

    Bruni, Alessandro; Sojka, Michal; Nielson, Flemming

    2014-01-01

    analysis identifies two flaws in the original protocol: one creates unavailability concerns during key establishment, and the other allows re-using authenticated signals for different purposes. We propose and analyse a modification that improves its behaviour while fitting the constraints of CAN bus...

  1. Effects of previous intrusion pressure on territorial responses in nightingales

    NARCIS (Netherlands)

    Sprau, P.; Roth, T.; Amrhrein, V.; Naguib, M.

    2014-01-01

    In territorial animals, establishing and defending a territory against rivals is commonly a prerequisite for successful reproduction. Yet, often, non-territorial males that are seeking to establish their own territory may intrude into occupied territories and persistently challenge residents in

  2. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  3. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  4. Shoulder muscle endurance: the development of a standardized and reliable protocol

    Directory of Open Access Journals (Sweden)

    Roy Jean-Sébastien

    2011-01-01

    Full Text Available Abstract Background Shoulder muscle fatigue has been proposed as a possible link to explain the association between repetitive arm use and the development of rotator cuff disorders. To our knowledge, no standardized clinical endurance protocol has been developed to evaluate the effects of muscle fatigue on shoulder function. Such a test could improve clinical examination of individuals with shoulder disorders. Therefore, the purpose of this study was to establish a reliable protocol for objective assessment of shoulder muscle endurance. Methods An endurance protocol was developed on a stationary dynamometer (Biodex System 3. The endurance protocol was performed in isotonic mode with the resistance set at 50% of each subject's peak torque as measured for shoulder external (ER and internal rotation (IR. Each subject performed 60 continuous repetitions of IR/ER rotation. The endurance protocol was performed by 36 healthy individuals on two separate occasions at least two days apart. Maximal isometric shoulder strength tests were performed before and after the fatigue protocol to evaluate the effects of the endurance protocol and its reliability. Paired t-tests were used to evaluate the reduction in shoulder strength due to the protocol, while intraclass correlation coefficients (ICC and minimal detectable change (MDC were used to evaluate its reliability. Results Maximal isometric strength was significantly decreased after the endurance protocol (P 0.84. Conclusions Changes in muscular performance observed during and after the muscular endurance protocol suggests that the protocol did result in muscular fatigue. Furthermore, this study established that the resultant effects of fatigue of the proposed isotonic protocol were reproducible over time. The protocol was performed without difficulty by all volunteers and took less than 10 minutes to perform, suggesting that it might be feasible for clinical practice. This protocol could be used to induce

  5. Colon cleansing protocol in children: research conditions vs. clinical practice.

    Science.gov (United States)

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  6. What Triggers the Establishment of a Works Council?

    OpenAIRE

    Jens Mohrenweiser; Paul Marginson; Uschi Backes-Gellner

    2009-01-01

    This paper analyses events that trigger the establishment of a works council and the actor or agent who triggers it. The paper extends previous research in two dimensions. First, we examine specific events that motivate workers to establish a works council, such as a change of owner, founding a spin-off, a firm-acquisition or a radical restructuring. These events express risk protection as workers’ primary motivation for establishing a works council. Second, we analyse the actor or agent who ...

  7. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    Full Text Available Objective: The main objective was to evaluate the cost-effectiveness of protocol use of palivizumab in premature established by consensus in our Hospital comparing it based on the recommendations of various Scientific Societies. As a secondary objective risk factors and severity of hospitalized patients attending the established protocol in our Hospital were analyzed. Methods: The study period was 4 seasons with the expanded protocol (retrospective data versus 2 with restricted or agreed protocol (prospective data. The perspective of the study was the Health System, including the costs of hospitalization and palivizumab our center. The calculation of the effectiveness was determined with the admission rate of premature patients stratified by weeks of gestational age <29, <32; and <35. For the analysis of risk factors and severity in patients admitted seasons with the new protocol are collected prospectively clinical data and environmental and social factors. Results: In the range of gestational age <29 years old and <32 greater effectiveness of the extended protocol was not demonstrated against the consensus. Only more effective for EG <35 in the accumulated data and comparing seasons 12/13 and 08/09 to 13/14 for individual data was observed. This range has an associated incremental cost effectiveness ratio of € 53 250,07 (range: € 14 793,39 to € 90 446,47 for singles data and € 50 525,53 (€ 28 688.22 to € 211 575,65 for accumulated. The establishment of this protocol in our center meant an average saving per season € 169 911,51. A cost- effectiveness of the extended protocol appropriate relationship is found if the cost of palivizumab per patient was less than € 1 206,67 (calculated for maximum use of the vial and a higher rate of hospitalization of 9.21%. Children entering the season with the new protocol (season 12/13 and 13/14 are 63.4% in children under 3 months and 90% are term infants who do not belong to any population at

  8. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  9. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    Science.gov (United States)

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  10. Base-line studies for DAE establishments

    International Nuclear Information System (INIS)

    Puranik, V.D.

    2012-01-01

    to ensure that the seasonal variations in parameters are considered. The data is generated for an area covering at least 30 km radium around the proposed location of the facility, in a manner, such that very dense data is generated close to the location and it becomes gradually sparce for the distant areas. Base-line data is generated with the help of local universities and institutions under constant interaction and supervision of the departmental personnel. The work is carried out as per the set protocols laid down by the department for such purposes. The protocols conform to the international practices for carrying out such work. The studies include measurement of concentrations of naturally occurring and man-made radionuclides and also heavy toxic metals and other pollutants in various environmental matrices such as air sub soil water, surface water, soil, sediment, biota and locally consumed food items including meat, fish, milk, eggs, vegetables and cereals. Studies on density and variety of flora and fauna in the region are carried out. Health status and demographic status is recorded in detail. Hydrogeological studies are carried out to establish ground water movement at the location. Based on the data so generated, a Remote Sensing and Geographic Information System is prepared to collate the data. For coastal locations, studies of the nearby marine environment are also carried out. The baseline data is a valuable set of information of the environmental status of a location prevailing before the start of the departmental activity. Its importance is two fold - firstly because, it can not be generated after the start of the activity at the given location and secondly because it is the most authentic data set which can be referred later to assess the environmental impact of the facility by way of evaluating the changes in the environmental parameters, if any. (author)

  11. New Protocol Based on UHPLC-MS/MS for Quantitation of Metabolites in Xylose-Fermenting Yeasts

    Science.gov (United States)

    Campos, Christiane Gonçalves; Veras, Henrique César Teixeira; de Aquino Ribeiro, José Antônio; Costa, Patrícia Pinto Kalil Gonçalves; Araújo, Katiúscia Pereira; Rodrigues, Clenilson Martins; de Almeida, João Ricardo Moreira; Abdelnur, Patrícia Verardi

    2017-12-01

    Xylose fermentation is a bottleneck in second-generation ethanol production. As such, a comprehensive understanding of xylose metabolism in naturally xylose-fermenting yeasts is essential for prospection and construction of recombinant yeast strains. The objective of the current study was to establish a reliable metabolomics protocol for quantification of key metabolites of xylose catabolism pathways in yeast, and to apply this protocol to Spathaspora arborariae. Ultra-high performance liquid chromatography coupled to tandem mass spectrometry (UHPLC-MS/MS) was used to quantify metabolites, and afterwards, sample preparation was optimized to examine yeast intracellular metabolites. S. arborariae was cultivated using xylose as a carbon source under aerobic and oxygen-limited conditions. Ion pair chromatography (IPC) and hydrophilic interaction liquid chromatography-tandem mass spectrometry (HILIC-MS/MS) were shown to efficiently quantify 14 and 5 metabolites, respectively, in a more rapid chromatographic protocol than previously described. Thirteen and eleven metabolites were quantified in S. arborariae under aerobic and oxygen-limited conditions, respectively. This targeted metabolomics protocol is shown here to quantify a total of 19 metabolites, including sugars, phosphates, coenzymes, monosaccharides, and alcohols, from xylose catabolism pathways (glycolysis, pentose phosphate pathway, and tricarboxylic acid cycle) in yeast. Furthermore, to our knowledge, this is the first time that intracellular metabolites have been quantified in S. arborariae after xylose consumption. The results indicated that fine control of oxygen levels during fermentation is necessary to optimize ethanol production by S. arborariae. The protocol presented here may be applied to other yeast species and could support yeast genetic engineering to improve second generation ethanol production. [Figure not available: see fulltext.

  12. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  13. Development of a protocol that allows safe consumption of the hypoallergenic apple cultivar Santana

    OpenAIRE

    Maas, van der, M.P.; Schenk, M.F.

    2009-01-01

    The apple (Malus ×domestica) cultivar Santana was shown to have a low allergenicity in a previously reported clinical trial. A protocol was developed to validate these results outside a clinical setting and to market the Santana as a hypoallergenic apple for large-scale consumption. This protocol was designed to ensure safe consumption of the Santana by consumers suffering from apple allergy. We tested the protocol in a pilot in 100 supermarket stores and evaluated in an internet-based survey...

  14. 49 CFR 173.23 - Previously authorized packaging.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Previously authorized packaging. 173.23 Section... REQUIREMENTS FOR SHIPMENTS AND PACKAGINGS Preparation of Hazardous Materials for Transportation § 173.23 Previously authorized packaging. (a) When the regulations specify a packaging with a specification marking...

  15. 28 CFR 10.5 - Incorporation of papers previously filed.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Incorporation of papers previously filed... CARRYING ON ACTIVITIES WITHIN THE UNITED STATES Registration Statement § 10.5 Incorporation of papers previously filed. Papers and documents already filed with the Attorney General pursuant to the said act and...

  16. 75 FR 76056 - FEDERAL REGISTER CITATION OF PREVIOUS ANNOUNCEMENT:

    Science.gov (United States)

    2010-12-07

    ... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting FEDERAL REGISTER CITATION OF PREVIOUS ANNOUNCEMENT: STATUS: Closed meeting. PLACE: 100 F Street, NE., Washington, DC. DATE AND TIME OF PREVIOUSLY ANNOUNCED MEETING: Thursday, December 9, 2010 at 2 p.m. CHANGE IN THE MEETING: Time change. The closed...

  17. How to establish a company

    OpenAIRE

    Konečný, Viktor

    2010-01-01

    This diploma thesis is focused on a franchising business establishment, particularly on the business establishment of a fictive coffe house which could become a well known franchising concept on the Czech market. Primary advantage of franchise compared to the other types of business cooperation is mainly risk reduction for the investor (franchisee) who obtains proven model of the business. For the franchisor the franchise means an easier way how to widen his business without taking higher lab...

  18. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  19. No discrimination against previous mates in a sexually cannibalistic spider

    Science.gov (United States)

    Fromhage, Lutz; Schneider, Jutta M.

    2005-09-01

    In several animal species, females discriminate against previous mates in subsequent mating decisions, increasing the potential for multiple paternity. In spiders, female choice may take the form of selective sexual cannibalism, which has been shown to bias paternity in favor of particular males. If cannibalistic attacks function to restrict a male's paternity, females may have little interest to remate with males having survived such an attack. We therefore studied the possibility of female discrimination against previous mates in sexually cannibalistic Argiope bruennichi, where females almost always attack their mate at the onset of copulation. We compared mating latency and copulation duration of males having experienced a previous copulation either with the same or with a different female, but found no evidence for discrimination against previous mates. However, males copulated significantly shorter when inserting into a used, compared to a previously unused, genital pore of the female.

  20. Implant breast reconstruction after salvage mastectomy in previously irradiated patients.

    Science.gov (United States)

    Persichetti, Paolo; Cagli, Barbara; Simone, Pierfranco; Cogliandro, Annalisa; Fortunato, Lucio; Altomare, Vittorio; Trodella, Lucio

    2009-04-01

    The most common surgical approach in case of local tumor recurrence after quadrantectomy and radiotherapy is salvage mastectomy. Breast reconstruction is the subsequent phase of the treatment and the plastic surgeon has to operate on previously irradiated and manipulated tissues. The medical literature highlights that breast reconstruction with tissue expanders is not a pursuable option, considering previous radiotherapy a contraindication. The purpose of this retrospective study is to evaluate the influence of previous radiotherapy on 2-stage breast reconstruction (tissue expander/implant). Only patients with analogous timing of radiation therapy and the same demolitive and reconstructive procedures were recruited. The results of this study prove that, after salvage mastectomy in previously irradiated patients, implant reconstruction is still possible. Further comparative studies are, of course, advisable to draw any conclusion on the possibility to perform implant reconstruction in previously irradiated patients.

  1. Concrete Security for Entity Recognition: The Jane Doe Protocol

    DEFF Research Database (Denmark)

    Lucks, Stefan; Zenner, Erik; Weimerskirch, Andre

    2008-01-01

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal...

  2. Evaluation of an adult insulin infusion protocol at an academic medical center.

    Science.gov (United States)

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of

  3. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  4. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  5. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  6. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  7. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  8. Massive transfusion protocols: current best practice

    Directory of Open Access Journals (Sweden)

    Hsu YM

    2016-03-01

    Full Text Available Yen-Michael S Hsu,1 Thorsten Haas,2 Melissa M Cushing1 1Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, NY, USA; 2Department of Anesthesia, University Children's Hospital Zurich, Zurich, Switzerland Abstract: Massive transfusion protocols (MTPs are established to provide rapid blood replacement in a setting of severe hemorrhage. Early optimal blood transfusion is essential to sustain organ perfusion and oxygenation. There are many variables to consider when establishing an MTP, and studies have prospectively evaluated different scenarios and patient populations to establish the best practices to attain improved patient outcomes. The establishment and utilization of an optimal MTP is challenging given the ever-changing patient status during resuscitation efforts. Much of the MTP literature comes from the trauma population, due to the fact that massive hemorrhage is the leading cause of preventable trauma-related death. As we come to further understand the positive and negative clinical impacts of transfusion-related factors, massive transfusion practice can be further refined. This article will first discuss specific MTPs targeting different patient populations and current relevant international guidelines. Then, we will examine a wide selection of therapeutic products to support MTPs, including newly available products and the most suitable of the traditional products. Lastly, we will discuss the best design for an MTP, including ratio-based MTPs and MTPs based on the use of point-of-care coagulation diagnostic tools. Keywords: hemorrhage, MTP, antifibrinolytics, coagulopathy, trauma, ratio, logistics, guidelines, hemostatic

  9. Establishing and managing a periodontal biobank for research: the sharing of experience.

    Science.gov (United States)

    Vaithilingam, R D; Safii, S H; Baharuddin, N A; Karen-Ng, L P; Saub, R; Ariffin, F; Ramli, H; Sharifuddin, A; Hidayat, M F H; Raman, R; Chan, Y K; Rani, N A; Rahim, R A; Shahruddin, N; Cheong, S C; Bartold, P M; Zain, R B

    2015-01-01

    Periodontal bio-repositories, which allow banking of clinically validated human data and biological samples, provide an opportunity to derive biomarkers for periodontal diagnosis, prognosis and therapeutic activities which are expected to improve patient management. This article presents the establishing of the Malaysian Periodontal Database and Biobank System (MPDBS) which was initiated in 2011 with the aim to facilitate periodontal research. Partnerships were established with collaborating centres. Policies on specimen access, authorship and acknowledgement policies were agreed upon by all participating centres before the initiation of the periodontal biobank. Ethical approval for the collection of samples and data were obtained from institutional ethics review boards. A broad-based approach for informed consent was used, which covered areas related to quality of life impacts, genetics and molecular aspects of periodontal disease. Sample collection and processing was performed using a standardized protocol. Biobanking resources such as equipment and freezers were shared with the Malaysian Oral Cancer Database and Tissue Bank System (MOCDTBS). In the development of the MPDBS, challenges that were previously faced by the MOCDTBS were considered. Future challenges in terms of ethical and legal issues will be faced when international collaborations necessitate the transportation of specimens across borders. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  10. Establishment of immortalized human erythroid progenitor cell lines able to produce enucleated red blood cells.

    Directory of Open Access Journals (Sweden)

    Ryo Kurita

    Full Text Available Transfusion of red blood cells (RBCs is a standard and indispensable therapy in current clinical practice. In vitro production of RBCs offers a potential means to overcome a shortage of transfusable RBCs in some clinical situations and also to provide a source of cells free from possible infection or contamination by microorganisms. Thus, in vitro production of RBCs may become a standard procedure in the future. We previously reported the successful establishment of immortalized mouse erythroid progenitor cell lines that were able to produce mature RBCs very efficiently. Here, we have developed a reliable protocol for establishing immortalized human erythroid progenitor cell lines that are able to produce enucleated RBCs. These immortalized cell lines produce functional hemoglobin and express erythroid-specific markers, and these markers are upregulated following induction of differentiation in vitro. Most importantly, these immortalized cell lines all produce enucleated RBCs after induction of differentiation in vitro, although the efficiency of producing enucleated RBCs remains to be improved further. To the best of our knowledge, this is the first demonstration of the feasibility of using immortalized human erythroid progenitor cell lines as an ex vivo source for production of enucleated RBCs.

  11. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  12. SDL-Based Protocol Validation for the Integrated Safety Communication Network in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Jung-hun; Kim, Dong-hoon; Lee, Dong-young; Park, Sung-woo

    2006-01-01

    The communication protocol in nuclear power plants needs to be validated systematically to avoid the critical situation that may be caused by its own faults. We establish the methodology to validate the protocol designed for the Integrated Safety Communication Networks (ISCN) of Korea Nuclear Instrumentation and Control System (KNICS). The ISCN protocol is specified using the formal description technique called the SDL. The validation of ISCN protocol is done via the Simulator and Validator, both of which are main functions provided by the SDL

  13. Establishment and use of national registries for actinide elements in humans

    International Nuclear Information System (INIS)

    1996-05-01

    This TECDOC covers all aspects of the establishment and use of registries for actinide elements in Member States. These aspects include assessing the need for such registries; defining scope of the work and developing objectives; administration; organization and staffing; policies; practices; procedures; protocols; registration and enrollment; data collection and evaluation; establishing and analytical laboratory; publication of results and application of findings. Not all aspects will be relevant to all Member States establishing such registries. 1 tab

  14. Establishment and use of national registries for actinide elements in humans

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-01

    This TECDOC covers all aspects of the establishment and use of registries for actinide elements in Member States. These aspects include assessing the need for such registries; defining scope of the work and developing objectives; administration; organization and staffing; policies; practices; procedures; protocols; registration and enrollment; data collection and evaluation; establishing and analytical laboratory; publication of results and application of findings. Not all aspects will be relevant to all Member States establishing such registries. 1 tab.

  15. Desensitization protocol enabling pediatric crossmatch-positive renal transplantation: successful HLA-antibody-incompatible renal transplantation of two highly sensitized children.

    Science.gov (United States)

    Adamusiak, Anna M; Stojanovic, Jelena; Shaw, Olivia; Vaughan, Robert; Sebire, Neil J; Drage, Martin; Kessaris, Nicos; Marks, Stephen D; Mamode, Nizam

    2017-02-01

    Renal transplantation improves quality of life (QoL) and survival in children requiring renal replacement therapy (RRT). Sensitization with development of a broad-spectrum of anti-HLA antibodies as a result of previous transplantation or after receiving blood products is an increasing problem. There are no published reports of desensitization protocols in children allowing renal transplantation from HLA-antibody-incompatible living donors. We adopted our well-established adult desensitization protocol for this purpose and undertook HLA antibody-incompatible living donor renal transplants in two children: a 14-year-old girl and a 13-year-old boy. After 2 and 1.5 years of follow-up, respectively, both patients have stable renal allograft function despite a rise in donor-specific antibodies in one case. HLA-incompatible transplantation should be considered in selected cases for sensitized children.

  16. Personality disorders in previously detained adolescent females: a prospective study

    NARCIS (Netherlands)

    Krabbendam, A.; Colins, O.F.; Doreleijers, T.A.H.; van der Molen, E.; Beekman, A.T.F.; Vermeiren, R.R.J.M.

    2015-01-01

    This longitudinal study investigated the predictive value of trauma and mental health problems for the development of antisocial personality disorder (ASPD) and borderline personality disorder (BPD) in previously detained women. The participants were 229 detained adolescent females who were assessed

  17. Payload specialist Reinhard Furrer show evidence of previous blood sampling

    Science.gov (United States)

    1985-01-01

    Payload specialist Reinhard Furrer shows evidence of previous blood sampling while Wubbo J. Ockels, Dutch payload specialist (only partially visible), extends his right arm after a sample has been taken. Both men show bruises on their arms.

  18. Choice of contraception after previous operative delivery at a family ...

    African Journals Online (AJOL)

    Choice of contraception after previous operative delivery at a family planning clinic in Northern Nigeria. Amina Mohammed‑Durosinlorun, Joel Adze, Stephen Bature, Caleb Mohammed, Matthew Taingson, Amina Abubakar, Austin Ojabo, Lydia Airede ...

  19. Previous utilization of service does not improve timely booking in ...

    African Journals Online (AJOL)

    Previous utilization of service does not improve timely booking in antenatal care: Cross sectional study ... Journal Home > Vol 24, No 3 (2010) > ... Results: Past experience on antenatal care service utilization did not come out as a predictor for ...

  20. Establishing the isolated Standard Model

    International Nuclear Information System (INIS)

    Wells, James D.; Zhang, Zhengkang; Zhao, Yue

    2017-02-01

    The goal of this article is to initiate a discussion on what it takes to claim ''there is no new physics at the weak scale,'' namely that the Standard Model (SM) is ''isolated.'' The lack of discovery of beyond the SM (BSM) physics suggests that this may be the case. But to truly establish this statement requires proving all ''connected'' BSM theories are false, which presents a significant challenge. We propose a general approach to quantitatively assess the current status and future prospects of establishing the isolated SM (ISM), which we give a reasonable definition of. We consider broad elements of BSM theories, and show many examples where current experimental results are not sufficient to verify the ISM. In some cases, there is a clear roadmap for the future experimental program, which we outline, while in other cases, further efforts - both theoretical and experimental - are needed in order to robustly claim the establishment of the ISM in the absence of new physics discoveries.

  1. Atomic Weapons Establishment Bill [Money

    International Nuclear Information System (INIS)

    Bennett, A.F.; Cryer, Bob; Carlisle, Kenneth; Dean, Paul.

    1990-01-01

    The debate concerns the authorisation of payment of the money required to reorganise the atomic weapons establishment in the United Kingdom provided for in the Atomic Weapons Establishment Bill in progress through Parliament. In the Bill the contractorisation of the establishment is recommended and some sort of Government owned company operated scheme set up. The debate lasted about half an hour and is reported verbatim. The issues raised concerned the actual sums likely to be incurred in the formation of a Company to carry out the designated activities of the Bill. These are connected with the research, development, production or maintenance of nuclear devices and the premises needed. The government spokesman suggested the sums required to support the Bill would not be large and the resolution was agreed to without a vote. (UK)

  2. Fish quality – linking previous infections to the quality of consumers’ fillet

    DEFF Research Database (Denmark)

    The quality of the fish meat is dependent upon a wide range of biological and non-biological factors. In the present study it has been established that previous infections by Vibrio anguillarum in rainbow trout (Oncorhynchus mykiss) influence the quality of the fish meat (fillet) at slaughter more...... than after the fish have recovered from the infection. The texture of the fillet analysed by sensory analysis showed changes, which could be explained by previous tissue damage caused by the infection. These changes indicated formation of scars in affected tissue during the processes of tissue repair......, which gave rise to a more fibrous, tougher and flaky texture of the fillets....

  3. A previous hamstring injury affects kicking mechanics in soccer players.

    Science.gov (United States)

    Navandar, Archit; Veiga, Santiago; Torres, Gonzalo; Chorro, David; Navarro, Enrique

    2018-01-10

    Although the kicking skill is influenced by limb dominance and sex, how a previous hamstring injury affects kicking has not been studied in detail. Thus, the objective of this study was to evaluate the effect of sex and limb dominance on kicking in limbs with and without a previous hamstring injury. 45 professional players (males: n=19, previously injured players=4, age=21.16 ± 2.00 years; females: n=19, previously injured players=10, age=22.15 ± 4.50 years) performed 5 kicks each with their preferred and non-preferred limb at a target 7m away, which were recorded with a three-dimensional motion capture system. Kinematic and kinetic variables were extracted for the backswing, leg cocking, leg acceleration and follow through phases. A shorter backswing (20.20 ± 3.49% vs 25.64 ± 4.57%), and differences in knee flexion angle (58 ± 10o vs 72 ± 14o) and hip flexion velocity (8 ± 0rad/s vs 10 ± 2rad/s) were observed in previously injured, non-preferred limb kicks for females. A lower peak hip linear velocity (3.50 ± 0.84m/s vs 4.10 ± 0.45m/s) was observed in previously injured, preferred limb kicks of females. These differences occurred in the backswing and leg-cocking phases where the hamstring muscles were the most active. A variation in the functioning of the hamstring muscles and that of the gluteus maximus and iliopsoas in the case of a previous injury could account for the differences observed in the kicking pattern. Therefore, the effects of a previous hamstring injury must be considered while designing rehabilitation programs to re-educate kicking movement.

  4. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  5. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  6. Blind quantum computation protocol in which Alice only makes measurements

    Science.gov (United States)

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-05-01

    Blind quantum computation is a new secure quantum computing protocol which enables Alice (who does not have sufficient quantum technology) to delegate her quantum computation to Bob (who has a full-fledged quantum computer) in such a way that Bob cannot learn anything about Alice's input, output, and algorithm. In previous protocols, Alice needs to have a device which generates quantum states, such as single-photon states. Here we propose another type of blind computing protocol where Alice does only measurements, such as the polarization measurements with a threshold detector. In several experimental setups, such as optical systems, the measurement of a state is much easier than the generation of a single-qubit state. Therefore our protocols ease Alice's burden. Furthermore, the security of our protocol is based on the no-signaling principle, which is more fundamental than quantum physics. Finally, our protocols are device independent in the sense that Alice does not need to trust her measurement device in order to guarantee the security.

  7. Methods to establish flaw tolerances

    International Nuclear Information System (INIS)

    Varga, T.

    1978-01-01

    Three conventional methods used to establish flaw tolerances are compared with new approaches using fracture mechanics. The conventional methods are those based on (a) non-destructive testing methods; (b) fabrication and quality assurance experience; and (c) service and damage experience. Pre-requisites of fracture mechanics methods are outlined, and summaries given of linear elastic mechanics (LEFM) and elastoplastic fracture mechanics (EPFM). The latter includes discussion of C.O.D.(crack opening displacement), the J-integral and equivalent energy. Proposals are made for establishing flaw tolerances. (U.K.)

  8. Acoustic comfort in eating establishments

    DEFF Research Database (Denmark)

    Svensson, David; Jeong, Cheol-Ho; Brunskog, Jonas

    2014-01-01

    The subjective concept of acoustic comfort in eating establishments has been investigated in this study. The goal was to develop a predictive model for the acoustic comfort, by means of simple objective parameters, while also examining which other subjective acoustic parameters could help explain...... the feeling of acoustic comfort. Through several layers of anal ysis, acoustic comfort was found to be rather complex, and could not be explained entirely by common subjective parameters such as annoyance, intelligibility or privacy. A predictive model for the mean acoustic comfort for an eating establishment...

  9. Protocols development for security and privacy of radio frequency identification systems

    Science.gov (United States)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  10. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  11. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  12. Spectrophotometric determination of uranium by previous extraction chromatography separation in polimetalic mineral, phosphorites and technological licours

    International Nuclear Information System (INIS)

    Moreno Bermudez, J.; Cabrera Quevedo, C.; Alfonso Mendez, L.; Rodriguez Aguilera, M.

    1994-01-01

    The development of an analytical procedure for spectrophotometric determination of uranium in polimetalic mineral, phosphorites and technological licours is described. The method is based on the previous separation of interfering elements by extraction chromatography and on spectrophotometric determination of uranium (IV) with arsenazo III in concentrated hydrochloric acid. Tributyl phosphate impregnate on politetrafluoroethylene is used as stationary phase and 5.5 M nitric acid is used as movie phase. The influence of matrix-component elements was studies. The development procedure was applied to real samples, being the results compared with those obtained by other well established analytical methods like gamma-spectrometry, laser fluorimetric, spectrophotometry previous uranium separation by liquid liquid extraction and anion exchange. The reproducibility is evaluated and the detection limited has been established for each studied matrix. A procedure for correcting the thorium interference has been developed for samples with a Th/ 3U8O higher than 0.2

  13. A Novel Re-keying Function Protocol (NRFP For Wireless Sensor Network Security

    Directory of Open Access Journals (Sweden)

    Naif Alsharabi

    2008-12-01

    Full Text Available This paper describes a novel re-keying function protocol (NRFP for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs, covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  14. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  15. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  16. Establishment of an in vitro micropropagation protocol for Boscia senegalensis (Pers.) Lam. ex Poir.

    Science.gov (United States)

    Khalafalla, Mutasim M; Daffalla, Hussien M; Abdellatef, Eltayb; Agabna, Elsadig; El-Shemy, Hany A

    2011-04-01

    This report describes in vitro micropropagation of Boscia senegalensis, so-called famine foods, that helped the people in Darfur and Kordofan, Sudan survive during the 1984-1985 famine. Four types of explants prepared from green mature zygotic embryos were cultured on Murashige and Skoog (MS) medium augmented with 1-5 mg/L 6-benzyladenine (BA). The highest number of shoots per explant (14.3±0.9) was achieved on MS medium supplemented with 3 mg/L BA, while the highest shoot length [(3.5±0.4) cm] was obtained with 1 mg/L BA. The shoot cluster, when subcultured to its same medium, significantly increased the rate of shoot multiplication by the end of the third subculture. The maximum mean number of shoots per explant (86.5±3.6) was produced after three multiplication cycles on 3 mg/L BA-supplemented medium. In vitro induced shoots were excised and rooted on half strength MS medium fortified with 0.25 mg/L indole-3-butyric acid (IBA) to obtain complete plantlets. B. senegalensis-regenerated plantlets obtained in vitro for the first time, were hardened and 95% survived under greenhouse conditions.

  17. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2010-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4's physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist...

  18. Dose rates of antimicrobial substances in boar semen preservation-time to establish new protocols.

    Science.gov (United States)

    Schulze, M; Grobbel, M; Riesenbeck, A; Brüning, S; Schaefer, J; Jung, M; Grossfeld, R

    2017-06-01

    To achieve a standardized number of spermatozoa in the final AI dose, varying amounts of extender fluid with a fixed concentration of antimicrobial substances are currently added to boar ejaculates. This practice ignores the different degrees of dilution of the antimicrobials in the end product. In calculating the final concentration of gentamicin in AI doses from 27,538 processed boar ejaculates, we demonstrated varying gentamicin concentrations in the resultant extended boar semen samples. The median concentration was 220.37 mg/L. In 25 of the samples (0.09%), the gentamicin concentration fell below 5 mg/L, which is close to or below the epidemiological cut-off value for many bacteria. We calculated the minimum inhibitory concentration of gentamicin for bacteria isolated from raw and extended ejaculates. Five of the isolates from extended ejaculates exceeded the maximum test concentration of 512 mg/L. As a result, we are presenting an alternative method of boar semen preservation whereby a particular combination of gentamicin concentrate and antibiotic-free extender is incorporated that standardizes the antibiotic concentration in the diluted semen. The addition of standardized antibiotic concentrations did not negatively affect sperm quality when compared to the use of ready-to-use extenders. In conclusion, an end volume-based and standardized addition of gentamicin to boar ejaculates can be a helpful alternative to prevent insufficient dosage of antibiotics in liquid preserved boar semen without affecting semen quality. © 2017 Blackwell Verlag GmbH.

  19. Protocol for the establishment and operation of LTPP sections - 1st draft

    CSIR Research Space (South Africa)

    Jones, DJ

    2003-03-01

    Full Text Available stream_source_info Jones2_2003.pdf.txt stream_content_type text/plain stream_size 81 Content-Encoding ISO-8859-1 stream_name Jones2_2003.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ...

  20. Secondary recurrent miscarriage is associated with previous male birth.

    LENUS (Irish Health Repository)

    Ooi, Poh Veh

    2012-01-31

    Secondary recurrent miscarriage (RM) is defined as three or more consecutive pregnancy losses after delivery of a viable infant. Previous reports suggest that a firstborn male child is associated with less favourable subsequent reproductive potential, possibly due to maternal immunisation against male-specific minor histocompatibility antigens. In a retrospective cohort study of 85 cases of secondary RM we aimed to determine if secondary RM was associated with (i) gender of previous child, maternal age, or duration of miscarriage history, and (ii) increased risk of pregnancy complications. Fifty-three women (62.0%; 53\\/85) gave birth to a male child prior to RM compared to 32 (38.0%; 32\\/85) who gave birth to a female child (p=0.002). The majority (91.7%; 78\\/85) had uncomplicated, term deliveries and normal birth weight neonates, with one quarter of the women previously delivered by Caesarean section. All had routine RM investigations and 19.0% (16\\/85) had an abnormal result. Fifty-seven women conceived again and 33.3% (19\\/57) miscarried, but there was no significant difference in failure rates between those with a previous male or female child (13\\/32 vs. 6\\/25, p=0.2). When patients with abnormal results were excluded, or when women with only one previous child were considered, there was still no difference in these rates. A previous male birth may be associated with an increased risk of secondary RM but numbers preclude concluding whether this increases recurrence risk. The suggested association with previous male birth provides a basis for further investigations at a molecular level.

  1. Secondary recurrent miscarriage is associated with previous male birth.

    LENUS (Irish Health Repository)

    Ooi, Poh Veh

    2011-01-01

    Secondary recurrent miscarriage (RM) is defined as three or more consecutive pregnancy losses after delivery of a viable infant. Previous reports suggest that a firstborn male child is associated with less favourable subsequent reproductive potential, possibly due to maternal immunisation against male-specific minor histocompatibility antigens. In a retrospective cohort study of 85 cases of secondary RM we aimed to determine if secondary RM was associated with (i) gender of previous child, maternal age, or duration of miscarriage history, and (ii) increased risk of pregnancy complications. Fifty-three women (62.0%; 53\\/85) gave birth to a male child prior to RM compared to 32 (38.0%; 32\\/85) who gave birth to a female child (p=0.002). The majority (91.7%; 78\\/85) had uncomplicated, term deliveries and normal birth weight neonates, with one quarter of the women previously delivered by Caesarean section. All had routine RM investigations and 19.0% (16\\/85) had an abnormal result. Fifty-seven women conceived again and 33.3% (19\\/57) miscarried, but there was no significant difference in failure rates between those with a previous male or female child (13\\/32 vs. 6\\/25, p=0.2). When patients with abnormal results were excluded, or when women with only one previous child were considered, there was still no difference in these rates. A previous male birth may be associated with an increased risk of secondary RM but numbers preclude concluding whether this increases recurrence risk. The suggested association with previous male birth provides a basis for further investigations at a molecular level.

  2. Establishing Time for Professional Learning

    Science.gov (United States)

    Journal of Staff Development, 2013

    2013-01-01

    Time for collaborative learning is an essential resource for educators working to implement college- and career-ready standards. The pages in this article include tools from the workbook "Establishing Time for Professional Learning." The tools support a complete process to help educators effectively find and use time. The following…

  3. A well-established profession

    DEFF Research Database (Denmark)

    Braae, Ellen Marie; Hare, Richard Andrew

    2011-01-01

    It was during the economic boom of the 1960s that the demand for landscape architects began to explode in Denmark as the expanding welfare state brought about rapid physical changes. At this time the country’s first specific education for landscape architects was established and 2010 marked the 5...

  4. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    Science.gov (United States)

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P open heart surgery.

  5. A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One

    Directory of Open Access Journals (Sweden)

    Siniša Tomović

    2016-01-01

    Full Text Available The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication protocol suitable for the considered scenario which jointly employs the learning parity with noise (LPN problem and a paradigm of random selection is proposed. It is shown that the proposed protocol is secure against active attacking scenarios and so called GRS man-in-the-middle (MIM attacking scenarios. In comparison with the related previously reported authentication protocols the proposed one provides reduction of the implementation complexity and at least the same level of the cryptographic security.

  6. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  7. Effectiveness of sound therapy in patients with tinnitus resistant to previous treatments: importance of adjustments

    Directory of Open Access Journals (Sweden)

    Flavia Alencar de Barros Suzuki

    Full Text Available ABSTRACT INTRODUCTION: The difficulty in choosing the appropriate therapy for chronic tinnitus relates to the variable impact on the quality of life of affected patients and, thus, requires individualization of treatment. OBJECTIVE: To evaluate the effectiveness of using sound generators with individual adjustments to relieve tinnitus in patients unresponsive to previous treatments. METHODS: A prospective study of 10 patients with chronic tinnitus who were unresponsive to previous drug treatments, five males and five females, with ages ranging from 41 to 78 years. Bilateral sound generators (Reach 62 or Mind 9 models were used daily for at least 6 h during 18 months. The patients were evaluated at the beginning, after 1 month and at each 3 months until 18 months through acuphenometry, minimum masking level, the Tinnitus Handicap Inventory, visual analog scale, and the Hospital Anxiety and Depression Scale. The sound generators were adjusted at each visit. RESULTS: There was a reduction of Tinnitus Handicap Inventory in nine patients using a protocol with a customized approach, independent of psychoacoustic characteristics of tinnitus. The best response to treatment occurred in those with whistle-type tinnitus. A correlation among the adjustments and tinnitus loudness and minimum masking level was found. Only one patient, who had indication of depression by Hospital Anxiety and Depression Scale, did not respond to sound therapy. CONCLUSION: There was improvement in quality of life (Tinnitus Handicap Inventory, with good response to sound therapy using customized settings in patients who did not respond to previous treatments for tinnitus.

  8. An in vivo investigative protocol for HDR prostate brachytherapy using urethral and rectal thermoluminescence dosimetry

    International Nuclear Information System (INIS)

    Toye, Warren; Das, Ram; Kron, Tomas; Franich, Rick; Johnston, Peter; Duchesne, Gillian

    2009-01-01

    Purpose: To develop an in vivo dosimetry based investigative action level relevant for a corrective protocol for HDR brachytherapy boost treatment. Methods and materials: The dose delivered to points within the urethra and rectum was measured using TLD in vivo dosimetry in 56 patients. Comparisons between the urethral and rectal measurements and TPS calculations showed differences, which are related to the relative position of the implant and TLD trains, and allowed shifts of implant position relative to the prostate to be estimated. Results and conclusions: Analysis of rectal dose measurements is consistent with implant movement, which was previously only identified with the urethral data. Shift corrected doses were compared with results from the TPS. Comparison of peak doses to the urethra and rectum has been assessed against the proposed corrective protocol to limit overdosing these critical structures. An initial investigative level of 20% difference between measured and TPS peak dose was established, which corresponds to 1/3 of patients which was practical for the caseload. These patients were assessed resulting in corrective action being applied for one patient. Multiple triggering for selective investigative action is outlined. The use of a single in vivo measurement in the first fraction optimizes patient benefit at acceptable cost.

  9. Quality Assurance Protocol for AFCI Advanced Structural Materials Testing

    Energy Technology Data Exchange (ETDEWEB)

    Busby, Jeremy T [ORNL

    2009-05-01

    The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded

  10. Quality Assurance Protocol for AFCI Advanced Structural Materials Testing

    International Nuclear Information System (INIS)

    Busby, Jeremy T.

    2009-01-01

    The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded

  11. Erlotinib-induced rash spares previously irradiated skin

    International Nuclear Information System (INIS)

    Lips, Irene M.; Vonk, Ernest J.A.; Koster, Mariska E.Y.; Houwing, Ronald H.

    2011-01-01

    Erlotinib is an epidermal growth factor receptor inhibitor prescribed to patients with locally advanced or metastasized non-small cell lung carcinoma after failure of at least one earlier chemotherapy treatment. Approximately 75% of the patients treated with erlotinib develop acneiform skin rashes. A patient treated with erlotinib 3 months after finishing concomitant treatment with chemotherapy and radiotherapy for non-small cell lung cancer is presented. Unexpectedly, the part of the skin that had been included in his previously radiotherapy field was completely spared from the erlotinib-induced acneiform skin rash. The exact mechanism of erlotinib-induced rash sparing in previously irradiated skin is unclear. The underlying mechanism of this phenomenon needs to be explored further, because the number of patients being treated with a combination of both therapeutic modalities is increasing. The therapeutic effect of erlotinib in the area of the previously irradiated lesion should be assessed. (orig.)

  12. Reasoning with Previous Decisions: Beyond the Doctrine of Precedent

    DEFF Research Database (Denmark)

    Komárek, Jan

    2013-01-01

    in different jurisdictions use previous judicial decisions in their argument, we need to move beyond the concept of precedent to a wider notion, which would embrace practices and theories in legal systems outside the Common law tradition. This article presents the concept of ‘reasoning with previous decisions...... law method’, but they are no less rational and intellectually sophisticated. The reason for the rather conceited attitude of some comparatists is in the dominance of the common law paradigm of precedent and the accompanying ‘case law method’. If we want to understand how courts and lawyers......’ as such an alternative and develops its basic models. The article first points out several shortcomings inherent in limiting the inquiry into reasoning with previous decisions by the common law paradigm (1). On the basis of numerous examples provided in section (1), I will present two basic models of reasoning...

  13. [Prevalence of previously diagnosed diabetes mellitus in Mexico.

    Science.gov (United States)

    Rojas-Martínez, Rosalba; Basto-Abreu, Ana; Aguilar-Salinas, Carlos A; Zárate-Rojas, Emiliano; Villalpando, Salvador; Barrientos-Gutiérrez, Tonatiuh

    2018-01-01

    To compare the prevalence of previously diagnosed diabetes in 2016 with previous national surveys and to describe treatment and its complications. Mexico's national surveys Ensa 2000, Ensanut 2006, 2012 and 2016 were used. For 2016, logistic regression models and measures of central tendency and dispersion were obtained. The prevalence of previously diagnosed diabetes in 2016 was 9.4%. The increase of 2.2% relative to 2012 was not significant and only observed in patients older than 60 years. While preventive measures have increased, the access to medical treatment and lifestyle has not changed. The treatment has been modified, with an increase in insulin and decrease in hypoglycaemic agents. Population aging, lack of screening actions and the increase in diabetes complications will lead to an increase on the burden of disease. Policy measures targeting primary and secondary prevention of diabetes are crucial.

  14. Cardiovascular magnetic resonance in adults with previous cardiovascular surgery.

    Science.gov (United States)

    von Knobelsdorff-Brenkenhoff, Florian; Trauzeddel, Ralf Felix; Schulz-Menger, Jeanette

    2014-03-01

    Cardiovascular magnetic resonance (CMR) is a versatile non-invasive imaging modality that serves a broad spectrum of indications in clinical cardiology and has proven evidence. Most of the numerous applications are appropriate in patients with previous cardiovascular surgery in the same manner as in non-surgical subjects. However, some specifics have to be considered. This review article is intended to provide information about the application of CMR in adults with previous cardiovascular surgery. In particular, the two main scenarios, i.e. following coronary artery bypass surgery and following heart valve surgery, are highlighted. Furthermore, several pictorial descriptions of other potential indications for CMR after cardiovascular surgery are given.

  15. Quantification of circulating endothelial progenitor cells using the modified ISHAGE protocol.

    Directory of Open Access Journals (Sweden)

    Caroline Schmidt-Lucke

    2010-11-01

    Full Text Available Circulating endothelial progenitor cells (EPC, involved in endothelial regeneration, neovascularisation, and determination of prognosis in cardiovascular disease can be characterised with functional assays or using immunofluorescence and flow cytometry. Combinations of markers, including CD34+KDR+ or CD133+KDR+, are used. This approach, however may not consider all characteristics of EPC. The lack of a standardised protocol with regards to reagents and gating strategies may account for the widespread inter-laboratory variations in quantification of EPC. We, therefore developed a novel protocol adapted from the standardised so-called ISHAGE protocol for enumeration of haematopoietic stem cells to enable comparison of clinical and laboratory data.In 25 control subjects, 65 patients with coronary artery disease (CAD; 40 stable CAD, 25 acute coronary syndrome/acute myocardial infarction (ACS, EPC were quantified using the following approach: Whole blood was incubated with CD45, KDR, and CD34. The ISHAGE sequential strategy was used, and finally, CD45(dimCD34(+ cells were quantified for KDR. A minimum of 100 CD34(+ events were collected. For comparison, CD45(+CD34(+ and CD45(-CD34(+ were analysed simultaneously. The number of CD45(dimCD34(+KDR(+ cells only were significantly higher in healthy controls compared to patients with CAD or ACS (p = 0.005 each, p<0.001 for trend. An inverse correlation of CD45(dimCD34(+KDR(+ with disease activity (r = -0.475, p<0.001 was confirmed. Only CD45(dimCD34(+KDR(+ correlated inversely with the number of diseased coronaries (r = -0.344; p<0.005. In a second study, a 4-week de-novo treatment of atorvastatin in stable CAD evoked an increase only of CD45(dimCD34(+KDR(+ EPC (p<0.05. CD45(+CD34(+KDR(+ and CD45(-CD34(+KDR(+ were indifferent between the three groups.Our newly established protocol adopted from the standardised ISHAGE protocol achieved higher accuracy in EPC enumeration confirming previous

  16. Development of Characterization Protocol for Mixed Liquid Radioactive Waste Classification

    International Nuclear Information System (INIS)

    Norasalwa Zakaria; Syed Asraf Wafa; Wo, Y.M.; Sarimah Mahat; Mohamad Annuar Assadat Husain

    2017-01-01

    Mixed organic liquid waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclide posed specific challenges in its management. Often, this waste becomes legacy waste in many nuclear facilities and being considered as 'problematic' waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using analytical procedures involving gross alpha beta, and gamma spectrometry. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste. (author)

  17. Development of characterization protocol for mixed liquid radioactive waste classification

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, Norasalwa, E-mail: norasalwa@nuclearmalaysia.gov.my [Waste Technology Development Centre, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wafa, Syed Asraf [Radioisotop Technology and Innovation, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wo, Yii Mei [Radiochemistry and Environment, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Mahat, Sarimah [Material Technology Group, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia)

    2015-04-29

    Mixed liquid organic waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclides posed specific challenges in its management. Often, these wastes become legacy waste in many nuclear facilities and being considered as ‘problematic’ waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using various analytical procedures including gross alpha/ gross beta, gamma spectrometry, and LSC method. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste.

  18. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    Science.gov (United States)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  19. Establishment of ITER: Relevant documents

    International Nuclear Information System (INIS)

    1988-01-01

    At the Geneva Summit Meeting in November, 1985, a proposal was made by the Soviet Union to build a next-generation tokamak experiment on a collaborative basis involving the world's four major fusion blocks. In October, 1986, after consulting with Japan and the European Community, the United States responded with a proposal on how to implement such an activity. Ensuing diplomatic and technical discussions resulted in the establishment, under the auspices of the IAEA, of the International Thermonuclear Experimental Reactor Conceptual Design Activities. This tome represents a collection of all documents relating to the establishment of ITER, beginning with the initial meeting of the ITER Quadripartite Initiative Committee in Vienna on 15-16 March, 1987, through the meeting of the Provisional ITER Council, also in Vienna, on 8-9 February, 1988

  20. Establishment for Nuclear Equipment: Overview

    International Nuclear Information System (INIS)

    Pracz, J.

    2000-01-01

    Full text: The main objective of the activity of the Establishment for Nuclear Equipment (ZdAJ) in 1999 was to obtain the ISO 9001 certificate. Work on this problem has been successfully completed. The changes introduced in agreement with requirements of ISO in supervising the construction, manufacturing and servicing eliminate possible deficiencies of our products and will pay in the future. Two new important ventures have been undertaken: design of an accelerator with two photon energies and a reconstruction of simulator directed towards better geometrical parameters. The completion of the improvements in accelerator is foreseen for the year 2002. The changes comprise almost all sub-assemblies of the device. The modernized simulator will be installed in the hospital already in the year 2000 - the ameliorations concern mainly the arm of the apparatus, collimator, driving gears and control system. Of course - apart from this, the routine production activity of the Establishment was continued in 1999. (author)

  1. [Effect of a multidisciplinar protocol on the clinical results obtained after bariatric surgery].

    Science.gov (United States)

    Cánovas Gaillemin, B; Sastre Martos, J; Moreno Segura, G; Llamazares Iglesias, O; Familiar Casado, C; Abad de Castro, S; López Pardo, R; Sánchez-Cabezudo Muñoz, M A

    2011-01-01

    Bariatric surgery has been shown to be an effective therapy for weight loss in patients with severe obesity, and the implementation of a multidisciplinar management protocol is recommended. To assess the usefulness of the implementation of a management protocol in obesity surgery based on the Spanish Consensus Document of the SEEDO. Retrospective comparative study of the outcomes in patients previously operated (51 patients) and after the implementation of the protocol (66 patients). The following data were gathered: anthropometry, pre-and post-surgery comorbidities, post-surgical nutritional and surgical complications, validated Quality of Life questionnaire, and dietary habits. Withdrawals (l7.6%) and alcoholism (5.8%) were higher in patients pre- versus post-implementation of the protocol (4.5% vs. 3%, respectively), the differences being statistically significant. The mortality rate was 2% in the pre-protocol group and 0% in the postprotocol group. The dietary habits were better in the post-protocol group, the pre-protocol group presenting a higher percentage of feeding-behavior disorders (5.1%) although not reaching a statistical significance. The improvement in quality of life was higher in the post-protocol group for all items, but only reaching statistical significance in sexual activity (p = 0.004). In the pre-protocol group, 70.5% of the patients had more than one nutritional complication vs. 32.8% in the post-protocol group (p 50% in 81.3% in the pre-protocol group vs. 74.8% in the pos-protocol group) or the comorbidities. Bariatric surgery achieves excellent outcomes in weight loss, comorbidities, and quality of life, but presents nutritional, surgical, and psychiatric complications that require a protocol-based and multidisciplinary approach. Our protocol improves the outcomes regarding the withdrawal rates, feeding-behavior disorders, dietary habits, nutritional complications, and quality of life.

  2. Squamous cell carcinoma arising in previously burned or irradiated skin

    International Nuclear Information System (INIS)

    Edwards, M.J.; Hirsch, R.M.; Broadwater, J.R.; Netscher, D.T.; Ames, F.C.

    1989-01-01

    Squamous cell carcinoma (SCC) arising in previously burned or irradiated skin was reviewed in 66 patients treated between 1944 and 1986. Healing of the initial injury was complicated in 70% of patients. Mean interval from initial injury to diagnosis of SCC was 37 years. The overwhelming majority of patients presented with a chronic intractable ulcer in previously injured skin. The regional relapse rate after surgical excision was very high, 58% of all patients. Predominant patterns of recurrence were in local skin and regional lymph nodes (93% of recurrences). Survival rates at 5, 10, and 20 years were 52%, 34%, and 23%, respectively. Five-year survival rates in previously burned and irradiated patients were not significantly different (53% and 50%, respectively). This review, one of the largest reported series, better defines SCC arising in previously burned or irradiated skin as a locally aggressive disease that is distinct from SCC arising in sunlight-damaged skin. An increased awareness of the significance of chronic ulceration in scar tissue may allow earlier diagnosis. Regional disease control and survival depend on surgical resection of all known disease and may require radical lymph node dissection or amputation

  3. Outcome Of Pregnancy Following A Previous Lower Segment ...

    African Journals Online (AJOL)

    Background: A previous ceasarean section is an important variable that influences patient management in subsequent pregnancies. A trial of vaginal delivery in such patients is a feasible alternative to a secondary section, thus aiding to reduce the ceasarean section rate and its associated co-morbidities. Objective: To ...

  4. 24 CFR 1710.552 - Previously accepted state filings.

    Science.gov (United States)

    2010-04-01

    ... of Substantially Equivalent State Law § 1710.552 Previously accepted state filings. (a) Materials... and contracts or agreements contain notice of purchaser's revocation rights. In addition see § 1715.15..., unless the developer is obligated to do so in the contract. (b) If any such filing becomes inactive or...

  5. The job satisfaction of principals of previously disadvantaged schools

    African Journals Online (AJOL)

    The aim of this study was to identify influences on the job satisfaction of previously disadvantaged ..... I am still riding the cloud … I hope it lasts. .... as a way of creating a climate and culture in schools where individuals are willing to explore.

  6. Haemophilus influenzae type f meningitis in a previously healthy boy

    DEFF Research Database (Denmark)

    Ronit, Andreas; Berg, Ronan M G; Bruunsgaard, Helle

    2013-01-01

    Non-serotype b strains of Haemophilus influenzae are extremely rare causes of acute bacterial meningitis in immunocompetent individuals. We report a case of acute bacterial meningitis in a 14-year-old boy, who was previously healthy and had been immunised against H influenzae serotype b (Hib...

  7. Research Note Effects of previous cultivation on regeneration of ...

    African Journals Online (AJOL)

    We investigated the effects of previous cultivation on regeneration potential under miombo woodlands in a resettlement area, a spatial product of Zimbabwe's land reforms. We predicted that cultivation would affect population structure, regeneration, recruitment and potential grazing capacity of rangelands. Plant attributes ...

  8. Cryptococcal meningitis in a previously healthy child | Chimowa ...

    African Journals Online (AJOL)

    An 8-year-old previously healthy female presented with a 3 weeks history of headache, neck stiffness, deafness, fever and vomiting and was diagnosed with cryptococcal meningitis. She had documented hearing loss and was referred to tertiary-level care after treatment with fluconazole did not improve her neurological ...

  9. Investigation of previously derived Hyades, Coma, and M67 reddenings

    International Nuclear Information System (INIS)

    Taylor, B.J.

    1980-01-01

    New Hyades polarimetry and field star photometry have been obtained to check the Hyades reddening, which was found to be nonzero in a previous paper. The new Hyades polarimetry implies essentially zero reddening; this is also true of polarimetry published by Behr (which was incorrectly interpreted in the previous paper). Four photometric techniques which are presumed to be insensitive to blanketing are used to compare the Hyades to nearby field stars; these four techniques also yield essentially zero reddening. When all of these results are combined with others which the author has previously published and a simultaneous solution for the Hyades, Coma, and M67 reddenings is made, the results are E (B-V) =3 +- 2 (sigma) mmag, -1 +- 3 (sigma) mmag, and 46 +- 6 (sigma) mmag, respectively. No support for a nonzero Hyades reddening is offered by the new results. When the newly obtained reddenings for the Hyades, Coma, and M67 are compared with results from techniques given by Crawford and by users of the David Dunlap Observatory photometric system, no differences between the new and other reddenings are found which are larger than about 2 sigma. The author had previously found that the M67 main-sequence stars have about the same blanketing as that of Coma and less blanketing than the Hyades; this conclusion is essentially unchanged by the revised reddenings

  10. Rapid fish stock depletion in previously unexploited seamounts: the ...

    African Journals Online (AJOL)

    Rapid fish stock depletion in previously unexploited seamounts: the case of Beryx splendens from the Sierra Leone Rise (Gulf of Guinea) ... A spectral analysis and red-noise spectra procedure (REDFIT) algorithm was used to identify the red-noise spectrum from the gaps in the observed time-series of catch per unit effort by ...

  11. 18 CFR 154.302 - Previously submitted material.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Previously submitted material. 154.302 Section 154.302 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... concurrently with the rate change filing. There must be furnished to the Director, Office of Energy Market...

  12. Process cells dismantling of EUREX pant: previous activities

    International Nuclear Information System (INIS)

    Gili, M.

    1998-01-01

    In the '98-'99 period some process cells of the EUREX pant will be dismantled, in order to place there the liquid wastes conditioning plant 'CORA'. This report resumes the previous activities (plant rinsing campaigns and inactive Cell 014 dismantling), run in the past three years and the drawn experience [it

  13. The job satisfaction of principals of previously disadvantaged schools

    African Journals Online (AJOL)

    The aim of this study was to identify influences on the job satisfaction of previously disadvantaged school principals in North-West Province. Evans's theory of job satisfaction, morale and motivation was useful as a conceptual framework. A mixedmethods explanatory research design was important in discovering issues with ...

  14. Obstructive pulmonary disease in patients with previous tuberculosis ...

    African Journals Online (AJOL)

    Obstructive pulmonary disease in patients with previous tuberculosis: Pathophysiology of a community-based cohort. B.W. Allwood, R Gillespie, M Galperin-Aizenberg, M Bateman, H Olckers, L Taborda-Barata, G.L. Calligaro, Q Said-Hartley, R van Zyl-Smit, C.B. Cooper, E van Rikxoort, J Goldin, N Beyers, E.D. Bateman ...

  15. Abiraterone in metastatic prostate cancer without previous chemotherapy

    NARCIS (Netherlands)

    Ryan, Charles J.; Smith, Matthew R.; de Bono, Johann S.; Molina, Arturo; Logothetis, Christopher J.; de Souza, Paul; Fizazi, Karim; Mainwaring, Paul; Piulats, Josep M.; Ng, Siobhan; Carles, Joan; Mulders, Peter F. A.; Basch, Ethan; Small, Eric J.; Saad, Fred; Schrijvers, Dirk; van Poppel, Hendrik; Mukherjee, Som D.; Suttmann, Henrik; Gerritsen, Winald R.; Flaig, Thomas W.; George, Daniel J.; Yu, Evan Y.; Efstathiou, Eleni; Pantuck, Allan; Winquist, Eric; Higano, Celestia S.; Taplin, Mary-Ellen; Park, Youn; Kheoh, Thian; Griffin, Thomas; Scher, Howard I.; Rathkopf, Dana E.; Boyce, A.; Costello, A.; Davis, I.; Ganju, V.; Horvath, L.; Lynch, R.; Marx, G.; Parnis, F.; Shapiro, J.; Singhal, N.; Slancar, M.; van Hazel, G.; Wong, S.; Yip, D.; Carpentier, P.; Luyten, D.; de Reijke, T.

    2013-01-01

    Abiraterone acetate, an androgen biosynthesis inhibitor, improves overall survival in patients with metastatic castration-resistant prostate cancer after chemotherapy. We evaluated this agent in patients who had not received previous chemotherapy. In this double-blind study, we randomly assigned

  16. Response to health insurance by previously uninsured rural children.

    Science.gov (United States)

    Tilford, J M; Robbins, J M; Shema, S J; Farmer, F L

    1999-08-01

    To examine the healthcare utilization and costs of previously uninsured rural children. Four years of claims data from a school-based health insurance program located in the Mississippi Delta. All children who were not Medicaid-eligible or were uninsured, were eligible for limited benefits under the program. The 1987 National Medical Expenditure Survey (NMES) was used to compare utilization of services. The study represents a natural experiment in the provision of insurance benefits to a previously uninsured population. Premiums for the claims cost were set with little or no information on expected use of services. Claims from the insurer were used to form a panel data set. Mixed model logistic and linear regressions were estimated to determine the response to insurance for several categories of health services. The use of services increased over time and approached the level of utilization in the NMES. Conditional medical expenditures also increased over time. Actuarial estimates of claims cost greatly exceeded actual claims cost. The provision of a limited medical, dental, and optical benefit package cost approximately $20-$24 per member per month in claims paid. An important uncertainty in providing health insurance to previously uninsured populations is whether a pent-up demand exists for health services. Evidence of a pent-up demand for medical services was not supported in this study of rural school-age children. States considering partnerships with private insurers to implement the State Children's Health Insurance Program could lower premium costs by assembling basic data on previously uninsured children.

  17. Establishing the isolated Standard Model

    Energy Technology Data Exchange (ETDEWEB)

    Wells, James D.; Zhang, Zhengkang [Michigan Univ., Ann Arbor, MI (United States). Michigan Center for Theoretical Physics; Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Zhao, Yue [Michigan Univ., Ann Arbor, MI (United States). Michigan Center for Theoretical Physics

    2017-02-15

    The goal of this article is to initiate a discussion on what it takes to claim ''there is no new physics at the weak scale,'' namely that the Standard Model (SM) is ''isolated.'' The lack of discovery of beyond the SM (BSM) physics suggests that this may be the case. But to truly establish this statement requires proving all ''connected'' BSM theories are false, which presents a significant challenge. We propose a general approach to quantitatively assess the current status and future prospects of establishing the isolated SM (ISM), which we give a reasonable definition of. We consider broad elements of BSM theories, and show many examples where current experimental results are not sufficient to verify the ISM. In some cases, there is a clear roadmap for the future experimental program, which we outline, while in other cases, further efforts - both theoretical and experimental - are needed in order to robustly claim the establishment of the ISM in the absence of new physics discoveries.

  18. Treatment of Established Status Epilepticus.

    Science.gov (United States)

    Falco-Walter, Jessica J; Bleck, Thomas

    2016-04-25

    Status epilepticus is the most severe form of epilepsy, with a high mortality rate and high health care costs. Status epilepticus is divided into four stages: early, established, refractory, and super-refractory. While initial treatment with benzodiazepines has become standard of care for early status epilepticus, treatment after benzodiazepine failure (established status epilepticus (ESE)) is incompletely studied. Effective treatment of ESE is critical as morbidity and mortality increases dramatically the longer convulsive status epilepticus persists. Phenytoin/fosphenytoin, valproic acid, levetiracetam, phenobarbital, and lacosamide are the most frequently prescribed antiseizure medications for treatment of ESE. To date there are no class 1 data to support pharmacologic recommendations of one agent over another. We review each of these medications, their pharmacology, the scientific evidence in support and against each in the available literature, adverse effects and safety profiles, dosing recommendations, and limitations of the available evidence. We also discuss future directions including the established status epilepticus treatment trial (ESETT). Substantial further research is urgently needed to identify these patients (particularly those with non-convulsive status epilepticus), elucidate the most efficacious antiseizure treatment with head-to-head randomized prospective trials, and determine whether this differs for convulsive vs. non-convulsive ESE.

  19. Treatment of Established Status Epilepticus

    Science.gov (United States)

    Falco-Walter, Jessica J.; Bleck, Thomas

    2016-01-01

    Status epilepticus is the most severe form of epilepsy, with a high mortality rate and high health care costs. Status epilepticus is divided into four stages: early, established, refractory, and super-refractory. While initial treatment with benzodiazepines has become standard of care for early status epilepticus, treatment after benzodiazepine failure (established status epilepticus (ESE)) is incompletely studied. Effective treatment of ESE is critical as morbidity and mortality increases dramatically the longer convulsive status epilepticus persists. Phenytoin/fosphenytoin, valproic acid, levetiracetam, phenobarbital, and lacosamide are the most frequently prescribed antiseizure medications for treatment of ESE. To date there are no class 1 data to support pharmacologic recommendations of one agent over another. We review each of these medications, their pharmacology, the scientific evidence in support and against each in the available literature, adverse effects and safety profiles, dosing recommendations, and limitations of the available evidence. We also discuss future directions including the established status epilepticus treatment trial (ESETT). Substantial further research is urgently needed to identify these patients (particularly those with non-convulsive status epilepticus), elucidate the most efficacious antiseizure treatment with head-to-head randomized prospective trials, and determine whether this differs for convulsive vs. non-convulsive ESE. PMID:27120626

  20. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    Science.gov (United States)

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  1. The impact of the Family Communication Coordinator (FCC) Protocol on the role stress of hospital chaplains.

    Science.gov (United States)

    Dodd-McCue, Diane; Tartaglia, Alexander

    2005-01-01

    The Family Communication Coordinator (FCC) Protocol was implemented to provide early family intervention and to facilitate effective communications during potential organ donation cases. Previous studies found the Protocol associated with improved donor outcome measures and with reduced role stress for ICU nurses caring for potential donors. The present study examines the impact of the Protocol on the perceived role stress of hospital chaplains serving as FCCs. All hospital chaplains serving as FCCs at an academic teaching hospital were surveyed. Their perceptions of job dimensions, role stress, job satisfaction, and commitment were measured; interviews and secondary data supplemented the surveys. The findings demonstrate that the FCC Protocol is associated with improved role stress, specifically role ambiguity and role conflict, among hospital chaplains serving as FCCs. Additionally, the findings suggest that satisfaction with the Protocol may be associated with experience with the Protocol.

  2. Reoperative sentinel lymph node biopsy after previous mastectomy.

    Science.gov (United States)

    Karam, Amer; Stempel, Michelle; Cody, Hiram S; Port, Elisa R

    2008-10-01

    Sentinel lymph node (SLN) biopsy is the standard of care for axillary staging in breast cancer, but many clinical scenarios questioning the validity of SLN biopsy remain. Here we describe our experience with reoperative-SLN (re-SLN) biopsy after previous mastectomy. Review of the SLN database from September 1996 to December 2007 yielded 20 procedures done in the setting of previous mastectomy. SLN biopsy was performed using radioisotope with or without blue dye injection superior to the mastectomy incision, in the skin flap in all patients. In 17 of 20 patients (85%), re-SLN biopsy was performed for local or regional recurrence after mastectomy. Re-SLN biopsy was successful in 13 of 20 patients (65%) after previous mastectomy. Of the 13 patients, 2 had positive re-SLN, and completion axillary dissection was performed, with 1 having additional positive nodes. In the 11 patients with negative re-SLN, 2 patients underwent completion axillary dissection demonstrating additional negative nodes. One patient with a negative re-SLN experienced chest wall recurrence combined with axillary recurrence 11 months after re-SLN biopsy. All others remained free of local or axillary recurrence. Re-SLN biopsy was unsuccessful in 7 of 20 patients (35%). In three of seven patients, axillary dissection was performed, yielding positive nodes in two of the three. The remaining four of seven patients all had previous modified radical mastectomy, so underwent no additional axillary surgery. In this small series, re-SLN was successful after previous mastectomy, and this procedure may play some role when axillary staging is warranted after mastectomy.

  3. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  4. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  5. Chest magnetic resonance imaging: a protocol suggestion

    Directory of Open Access Journals (Sweden)

    Bruno Hochhegger

    2015-12-01

    Full Text Available Abstract In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation.

  6. A protocol for a systematic review for perioperative pregabalin use

    Directory of Open Access Journals (Sweden)

    Eipe Naveen

    2012-09-01

    Full Text Available Abstract Background Perioperative pain management has recently been revolutionized with the recognition of novel mechanisms and introduction of newer drugs. Many randomized trials have studied the use of the gabapentinoid anti-epileptic, pregabalin, in acute pain. Published systematic reviews suggest that using pregabalin for perioperative pain management may decrease analgesic requirements and pain scores, at the expense of troublesome side effects. A major limitation of the extant reviews is the lack of rigorous investigation of clinical characteristics that would maximize the benefit harms ratio in favor of surgical patients. We posit that effects of pregabalin for perioperative pain management vary by the type of surgical pain model and propose this systematic review protocol to update previous systematic reviews and investigate the heterogeneity in findings across subgroups of surgical pain models. Methods/Design Using a peer-reviewed search strategy, we will search key databases for clinical trials on perioperative pregabalin use in adults. The electronic searches will be supplemented by scanning the reference lists of included studies. No limits of language, country or year will be imposed. Outcomes will include pain; use of co-analgesia, particularly opioids; enhanced recovery; and drug-related harms. We will focus on the identification of surgical models and patient characteristics that have shown benefit and adverse effects from pregabalin. Two clinical experts will independently screen the studies for inclusion using eligibility criteria established a priori. Data extracted by the reviewers will then be verified. Publication bias will be assessed, as will risk of bias using the Cochrane Risk of Bias tool. Meta-analysis and meta-regression are planned if the studies are deemed statistically, methodologically and clinically homogenous. Evidence will be graded for its strength for a select number of outcomes. Discussion We will explore

  7. On the need of improved Accelerated Degradation Protocols (ADPs)

    DEFF Research Database (Denmark)

    Pizzutilo, E.; Geiger, S.; Grote, J. P.

    2016-01-01

    protocol covering the whole potential range from 0.6 to 1.5 VRHE. The latter is typically not addressed in literature. This finding is explained by taking into account platinum catalyzed carbon corrosion and transient platinum dissolution. Based on the obtained results, the question is raised...... protocols that are commonly used in the fuel cell community to simulate load cycle and start-stop conditions in proton exchange membrane fuel cells (PEMFCs). In contrast to previous assumptions, claiming a separation between carbon corrosion and platinum dissolution, in both standard protocols platinum...... dissolution and carbon corrosion are present at low rates, which is also reflected by a comparably low ECSA decrease. On the other hand, a huge increase in rate of both processes is observed during transitions from low to high potential regimes experienced by a PEMFC in operation, here studied in a third...

  8. Submission to the British Columbia government on the Kyoto Protocol

    International Nuclear Information System (INIS)

    2002-09-01

    The Business Council provided its comments concerning the Kyoto Protocol and climate change to the government of British Columbia, recommending that a clear position be established quickly on the matter. The adopted position should also be disseminated broadly to allow stake holders sufficient time to prepare for the upcoming meetings of the Joint Ministers and First Ministers. The federal government has announced that the decision on whether to ratify the Kyoto Protocol will be made before the end of 2002, and this decision will have numerous effects on the people of British Columbia, businesses, workers, and consumers alike. The Business Council of British Columbia believes that the unique interests of the province can best be protected by a proactive approach. Actions plans are being prepared by several of the other provinces and territories, who have already stated their position concerning the Kyoto Protocol. The long-term risks of climate change for British Columbia have not been determined nor have the elements of a provincial approach. The following elements should be included in British Columbia's position on the Kyoto Protocol, according to the Business Council of British Columbia: (1) a credible and cost-effective implementation plan that does not unduly burden the province and other jurisdictions must be developed before Canada decides to ratify the Protocol. British Columbia should go on the record stating it does not support the ratification of the Kyoto Protocol in its present form. (2) the province should advocate for a national approach to climate change that can be achieved within a reasonable time frame, reflects the long-term nature of the problem, and is in agreement with the economic development objectives of British Columbia, (3) a plan detailing how the province intends to deal with the growth of greenhouse gas emissions should supplement and support the position of the province on the Kyoto Protocol. Consumers and business should be engaged

  9. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  10. Developing of the protocol for electron beam food irradiation facility

    International Nuclear Information System (INIS)

    Petreska, Svetlana

    2012-01-01

    By establishing the needs for institution of new technologies in the process of food processing, in this case a randomized choice of electron beam accelerator facility, arises the need for designing a protocol for safe and secure performance of the facility. The protocol encompasses safety and security measures for protection from ionizing radiation of the individuals who work at the facility, as well as, the population and the environment in the immediate neighborhood of the facility. Thus, the adopted approach is the establishment of appropriate systems responding to the protocol. Dosimetry system, which includes appropriate procedures for accurate measure and recording of the absorbed dose values, according to the provisions for protection from ionizing radiation. Ionizing radiation protection system and providing the safety and security of the facility for food processing by means of ionizing radiation. System for providing quality and safety control of the facility for food processing by means of ionizing radiation. Pursuant to the designed a protocol for safe and secure performance of the facility for electron beam food processing, contributes to protection against ionizing radiation as occupationally exposed persons as well the population. (Author)

  11. Sponge-Like: A New Protocol for Preparing Bacterial Ghosts

    Directory of Open Access Journals (Sweden)

    Amro A. Amara

    2013-01-01

    Full Text Available Bacterial Ghosts (BGs received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3 pLysS (Promega was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC. Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ. Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications.

  12. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  13. Using the modified Delphi method to establish a new Chinese clinical consensus of the treatments for cervical radiculopathy.

    Science.gov (United States)

    Zang, Lei; Fan, Ning; Hai, Yong; Lu, S B; Su, Q J; Yang, J C; Du, Peng; Gao, Y J

    2015-06-01

    Although cervical radiculopathy is very common, there is no standard treatment for this condition, with little high-level evidence available to guide the treatment choice. Thus, this study aimed to review the current data on the management of cervical radiculopathy; and, further, to establish a new Chinese clinical consensus of the treatments for cervical radiculopathy using the Delphi method. First, a systematic review of the previously established treatment guidelines and of articles related to cervical radiculopathy was conducted to establish a protocol for the clinical consensus of the treatment for cervical radiculopathy. Second, from February 2012 to June 2014, we performed a modified Delphi survey in which the current professional opinions from 30 experienced experts, representing almost all of the Chinese provinces, were gathered. Three rounds were performed, and consensus was defined as ≥70% agreement. Consensus of the treatments for cervical radiculopathy was reached on seven aspects, including the proportion of patients requiring only non-surgical therapies; the effectiveness of neck immobilization, physiotherapy, pharmacologic treatment; surgical indications; contraindications; surgery. The modified Delphi study conducted herein reached a consensus concerning several treatment issues for cervical radiculopathy. In the absence of high-level evidence, at present, these expert opinion findings will help guide health care providers to define the appropriate treatment in their regions. Items with no consensus provide excellent areas for future research.

  14. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  15. [Fatal amnioinfusion with previous choriocarcinoma in a parturient woman].

    Science.gov (United States)

    Hrgović, Z; Bukovic, D; Mrcela, M; Hrgović, I; Siebzehnrübl, E; Karelovic, D

    2004-04-01

    The case of 36-year-old tercipare is described who developed choriocharcinoma in a previous pregnancy. During the first term labour the patient developed cardiac arrest, so reanimation and sectio cesarea was performed. A male new-born was delivered in good condition, but even after intensive therapy and reanimation occurred death of parturient woman with picture of disseminate intravascular coagulopathia (DIK). On autopsy and on histology there was no sign of malignant disease, so it was not possible to connect previous choricarcinoma with amniotic fluid embolism. Maybe was place of choriocarcinoma "locus minoris resistentiae" which later resulted with failure in placentation what was hard to prove. On autopsy we found embolia of lung with a microthrombosis of terminal circulation with punctiformis bleeding in mucous, what stands for DIK.

  16. Challenging previous conceptions of vegetarianism and eating disorders.

    Science.gov (United States)

    Fisak, B; Peterson, R D; Tantleff-Dunn, S; Molnar, J M

    2006-12-01

    The purpose of this study was to replicate and expand upon previous research that has examined the potential association between vegetarianism and disordered eating. Limitations of previous research studies are addressed, including possible low reliability of measures of eating pathology within vegetarian samples, use of only a few dietary restraint measures, and a paucity of research examining potential differences in body image and food choice motives of vegetarians versus nonvegetarians. Two hundred and fifty-six college students completed a number of measures of eating pathology and body image, and a food choice motives questionnaire. Interestingly, no significant differences were found between vegetarians and nonvegetarians in measures of eating pathology or body image. However, significant differences in food choice motives were found. Implications for both researchers and clinicians are discussed.

  17. Previously unreported abnormalities in Wolfram Syndrome Type 2.

    Science.gov (United States)

    Akturk, Halis Kaan; Yasa, Seda

    2017-01-01

    Wolfram syndrome (WFS) is a rare autosomal recessive disease with non-autoimmune childhood onset insulin dependent diabetes and optic atrophy. WFS type 2 (WFS2) differs from WFS type 1 (WFS1) with upper intestinal ulcers, bleeding tendency and the lack ofdiabetes insipidus. Li-fespan is short due to related comorbidities. Only a few familieshave been reported with this syndrome with the CISD2 mutation. Here we report two siblings with a clinical diagnosis of WFS2, previously misdiagnosed with type 1 diabetes mellitus and diabetic retinopathy-related blindness. We report possible additional clinical and laboratory findings that have not been pre-viously reported, such as asymptomatic hypoparathyroidism, osteomalacia, growth hormone (GH) deficiency and hepatomegaly. Even though not a requirement for the diagnosis of WFS2 currently, our case series confirm hypogonadotropic hypogonadism to be also a feature of this syndrome, as reported before. © Polish Society for Pediatric Endocrinology and Diabetology.

  18. Low-dose computed tomography image restoration using previous normal-dose scan

    International Nuclear Information System (INIS)

    Ma, Jianhua; Huang, Jing; Feng, Qianjin; Zhang, Hua; Lu, Hongbing; Liang, Zhengrong; Chen, Wufan

    2011-01-01

    Purpose: In current computed tomography (CT) examinations, the associated x-ray radiation dose is of a significant concern to patients and operators. A simple and cost-effective means to perform the examinations is to lower the milliampere-seconds (mAs) or kVp parameter (or delivering less x-ray energy to the body) as low as reasonably achievable in data acquisition. However, lowering the mAs parameter will unavoidably increase data noise and the noise would propagate into the CT image if no adequate noise control is applied during image reconstruction. Since a normal-dose high diagnostic CT image scanned previously may be available in some clinical applications, such as CT perfusion imaging and CT angiography (CTA), this paper presents an innovative way to utilize the normal-dose scan as a priori information to induce signal restoration of the current low-dose CT image series. Methods: Unlike conventional local operations on neighboring image voxels, nonlocal means (NLM) algorithm utilizes the redundancy of information across the whole image. This paper adapts the NLM to utilize the redundancy of information in the previous normal-dose scan and further exploits ways to optimize the nonlocal weights for low-dose image restoration in the NLM framework. The resulting algorithm is called the previous normal-dose scan induced nonlocal means (ndiNLM). Because of the optimized nature of nonlocal weights calculation, the ndiNLM algorithm does not depend heavily on image registration between the current low-dose and the previous normal-dose CT scans. Furthermore, the smoothing parameter involved in the ndiNLM algorithm can be adaptively estimated based on the image noise relationship between the current low-dose and the previous normal-dose scanning protocols. Results: Qualitative and quantitative evaluations were carried out on a physical phantom as well as clinical abdominal and brain perfusion CT scans in terms of accuracy and resolution properties. The gain by the use

  19. Previous climatic alterations are caused by the sun

    International Nuclear Information System (INIS)

    Groenaas, Sigbjoern

    2003-01-01

    The article surveys the scientific results of previous research into the contribution of the sun to climatic alterations. The author concludes that there is evidence of eight cold periods after the last ice age and that the alterations largely were due to climate effects from the sun. However, these effects are only causing a fraction of the registered global warming. It is assumed that the human activities are contributing to the rest of the greenhouse effect

  20. Influence of previous knowledge in Torrance tests of creative thinking

    OpenAIRE

    Aranguren, María; Consejo Nacional de Investigaciones Científicas y Técnicas CONICET

    2015-01-01

    The aim of this work is to analyze the influence of study field, expertise and recreational activities participation in Torrance Tests of Creative Thinking (TTCT, 1974) performance. Several hypotheses were postulated to explore the possible effects of previous knowledge in TTCT verbal and TTCT figural university students’ outcomes. Participants in this study included 418 students from five study fields: Psychology;Philosophy and Literature, Music; Engineering; and Journalism and Advertisin...

  1. Establishment of Filipino standard man

    International Nuclear Information System (INIS)

    Natera, E.; San Jose, V.; Napenas, D.

    1984-01-01

    The initial data gathered on measurements of total body weight and weights of specific organs from autopsy cases of normal Filipinos are reported. Comparison of the above data with the Reference Man data of ICRP which was based primarily on Caucasians suggests some differences in the average weight and height of whole body and in the weights of some organs. Hence there appears to be a need for the establishment of Filipino standard man which can be used in the estimation of internal dose commitment of the Filipinos. (author)

  2. Hospitals and health care establishments

    International Nuclear Information System (INIS)

    1999-01-01

    These guidelines have been drown up to assist all those involved in the management and maintenance of hospitals and health care establishments. Compliance with this guidance should minimise the risk of pollution occurring. The guidelines are jointly produced by the Environment Agency for England and Wales, the Scottish Environment Protection Agency and the Environment and Heritage Service for Northern Ireland, referred to as the Agency or Agencies. It includes guidelines on site drainage, sewage and waste water disposal, treatment of surface water drainage and waste management

  3. Establishment of Filipino standard man

    Energy Technology Data Exchange (ETDEWEB)

    Natera, E.; San Jose, V.; Napenas, D.

    The initial data gathered on measurements of total body weight and weights of specific organs from autopsy cases of normal Filipinos are reported. Comparison of the above data with the Reference Man data of ICRP which was based primarily on Caucasians suggests some differences in the average weight and height of whole body and in the weights of some organs. Hence there appears to be a need for the establishment of Filipino standard man which can be used in the estimation of internal dose commitment of the Filipinos.

  4. Analysis of previous screening examinations for patients with breast cancer

    International Nuclear Information System (INIS)

    Lee, Eun Hye; Cha, Joo Hee; Han, Dae Hee; Choi, Young Ho; Hwang, Ki Tae; Ryu, Dae Sik; Kwak, Jin Ho; Moon, Woo Kyung

    2007-01-01

    We wanted to improve the quality of subsequent screening by reviewing the previous screening of breast cancer patients. Twenty-four breast cancer patients who underwent previous screening were enrolled. All 24 took mammograms and 15 patients also took sonograms. We reviewed the screening retrospectively according to the BI-RADS criteria and we categorized the results into false negative, true negative, true positive and occult cancers. We also categorized the causes of false negative cancers into misperception, misinterpretation and technical factors and then we analyzed the attributing factors. Review of the previous screening revealed 66.7% (16/24) false negative, 25.0% (6/24) true negative, and 8.3% (2/24) true positive cancers. False negative cancers were caused by the mammogram in 56.3% (9/16) and by the sonogram in 43.7% (7/16). For the false negative cases, all of misperception were related with mammograms and this was attributed to dense breast, a lesion located at the edge of glandular tissue or the image, and findings seen on one view only. Almost all misinterpretations were related with sonograms and attributed to loose application of the final assessment. To improve the quality of breast screening, it is essential to overcome the main causes of false negative examinations, including misperception and misinterpretation. We need systematic education and strict application of final assessment categories of BI-RADS. For effective communication among physicians, it is also necessary to properly educate them about BI-RADS

  5. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  6. Errorless discrimination established by differential autoshaping1

    Science.gov (United States)

    Wilkie, Donald M.; Ramer, Donald G.

    1974-01-01

    In Experiment I, pigeons exposed to a differential autoshaping procedure pecked a key in the presence of the stimulus associated with reinforcement but did not peck, or pecked infrequently, in the presence of the stimulus associated with nonreinforcement. In Experiment II, pigeons were exposed to a differential autoshaping procedure in which one stimulus was associated with reinforcement and two stimuli were associated with nonreinforcement. The birds initially responded in the presence of one stimulus associated with nonreinforcement but never responded in the presence of the second stimulus associated with nonreinforcement. They were subsequently exposed to an autoshaping procedure in which reinforcement followed both these stimuli. The number of stimulus-reinforcement pairings required to establish pecking in the presence of the stimulus during which responses had not previously occurred suggested that such stimuli are inhibitory. These findings have implications for autoshaping, errorless discrimination, inhibition, and theories of discrimination byproducts. PMID:16811797

  7. Errorless discrimination established by differential autoshaping.

    Science.gov (United States)

    Wilkie, D M; Ramer, D G

    1974-09-01

    In Experiment I, pigeons exposed to a differential autoshaping procedure pecked a key in the presence of the stimulus associated with reinforcement but did not peck, or pecked infrequently, in the presence of the stimulus associated with nonreinforcement. In Experiment II, pigeons were exposed to a differential autoshaping procedure in which one stimulus was associated with reinforcement and two stimuli were associated with nonreinforcement. The birds initially responded in the presence of one stimulus associated with nonreinforcement but never responded in the presence of the second stimulus associated with nonreinforcement. They were subsequently exposed to an autoshaping procedure in which reinforcement followed both these stimuli. The number of stimulus-reinforcement pairings required to establish pecking in the presence of the stimulus during which responses had not previously occurred suggested that such stimuli are inhibitory. These findings have implications for autoshaping, errorless discrimination, inhibition, and theories of discrimination byproducts.

  8. Systematic approach to establishing criticality biases

    International Nuclear Information System (INIS)

    Larson, S.L.

    1995-09-01

    A systematic approach has been developed to determine benchmark biases and apply those biases to code results to meet the requirements of DOE Order 5480.24 regarding documenting criticality safety margins. Previously, validation of the code against experimental benchmarks to prove reasonable agreement was sufficient. However, DOE Order 5480.24 requires contractors to adhere to the requirements of ANSI/ANS-8.1 and establish subcritical margins. A method was developed to incorporate biases and uncertainties from benchmark calculations into a k eff value with quantifiable uncertainty. The method produces a 95% confidence level in both the k eff value of the scenario modeled and the distribution of the k eff S calculated by the Monte Carlo code. Application of the method to a group of benchmarks modeled using the KENO-Va code and the SCALE 27 group cross sections is also presented

  9. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  10. Development of a systematic observation protocol of physical exposure of the back: a preliminary study.

    Science.gov (United States)

    Tousignant, M; Tougas, G; Rossignol, M; Goulet, L

    2002-04-01

    At present there is no systematic observation protocol for the assessment of the multi-factorial aspects of physical exposure related to the back used within the constraints of occupational epidemiological research. In this context, a new preliminary systematic observation protocol is proposed to assess exposure to physical loading of the back using nine categories of physical risk factors: the SOPE back protocol. The objective of this study was to investigate whether the new protocol can correctly identify the level of exposure related to measured physical loading of the back. The subjects of this closed cohort study were 451 manual workers at a natural gas distribution company. The assessment of exposure was made with the protocol using groups with different job titles. The workers were followed for a 2 yr period to establish the risk of a new occurrence of complete disability related to the back (NOCD back injury) in each job grouping. Based on the median of the total scores derived from the protocol, two levels of exposure were identified (high and low). Taking into account the limitations of this study, the protocol in development may be a good tool to establish two levels of exposure to physical loading of the back in large epidemiological studies of occupational low back pain. Further research is needed to replicate these results with larger samples and to test the reliability and predictive validity of the protocol.

  11. The incidence of congenital heart disease: Previous findings and perspectives

    Directory of Open Access Journals (Sweden)

    Miranović Vesna

    2014-01-01

    Full Text Available Congenital heart defects (CHD are the most common of all congenital anomalies, and represent a significant global health problem. Involvement of medical professionals of different profiles has led to drastic changes in survival and quality of life of children with CHD. The motivation for the implementation of the first large population studies on this subject was not only to obtain answers to the question on the level of incidence of CHD, but the harmonization of criteria and protocols for monitoring and treatment of certain defects as well as the planning of medical staff dealing with children with CHD. Data on the incidence varies from 4-10/1000 live births. Fetal echocardiography can have potential impact on decrease of CHD incidence. The increase in incidence may be due to the possibility that children with CHD will grow up and have offsprings. Owing to the progress that has been made, an increasing number of patients experiences adulthood, creating an entirely new and growing population of patients: patients with “adult” CHD. Survivors suffer morbidity resulting from their circulatory abnormalities as well as from medical and surgical therapies they have been subjected to. Application of the achievements of human genome projects will in time lead to drastic changes in the approach to the patients with CHD. Until the time when it is possible, the goal will be further improvement of the existing system of service: networking in a unique, multicenter clinical registry of patients with CHD, as well as upgrading of technical and non-technical conditions for the treatment of patients with CHD. We are in an unprecedented time of change, but are actually at the end of the beginning of making pediatric cardiac care a highly reliable institution.

  12. Windfarm design in the light of previous experience

    International Nuclear Information System (INIS)

    Lloyd, A.

    1997-01-01

    Significant impacts to birds have been claimed at both Californian and Spanish windfarms, but in the United Kingdom the current evidence is that avian impact, where it does occur, is minimal. Examination of differences in design and location of wind energy installations worldwide in relation to differences in avian impact is leading towards the establishment of design principles which can help ensure that impacts remain at negligible. These principles are based on locational, technical and ecological factors taken either singly or in combination. (author)

  13. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    majority, in which all players but one are controlled by the adversary. In Chapter 5 we present both the preprocessing and the online phase of [DKL+ 13], while in Chapter 2 we describe only the preprocessing phase of [DPSZ12] since the combination of this preprocessing phase with the online phase of [DKL...... on information-theoretic message authentication codes, requires only a linear amount of data from the preprocessing, and improves on the number of field multiplications needed to perform one secure multiplication (linear, instead of quadratic as in earlier work). The preprocessing phase in Chapter 5 comes...... in an actively secure flavour and in a covertly secure one, both of which compare favourably to previous work in terms of efficiency and provable security. Moreover, the covertly secure solution includes a key generation protocol that allows players to obtain a public key and shares of a corresponding secret key...

  14. A shortened protocol for assessing cognitive bias in rats.

    Science.gov (United States)

    Brydges, Nichola M; Hall, Lynsey

    2017-07-15

    Reliable measurement of affective state in animals is a significant goal of animal welfare. Such measurements would also improve the validity of pre-clinical mental health research which relies on animal models. However, at present, affective states in animals are inaccessible to direct measurement. In humans, changes in cognitive processing can give reliable indications of emotional state. Therefore, similar techniques are increasingly being used to gain proxy measures of affective states in animals. In particular, the 'cognitive bias' assay has gained popularity in recent years. Major disadvantages of this technique include length of time taken for animals to acquire the task (typically several weeks), negative experiences associated with task training, and issues of motivation. Here we present a shortened cognitive bias protocol using only positive reinforcers which must actively be responded to. The protocol took an average of 4days to complete, and produced similar results to previous, longer methods (minimum 30days). Specifically, rats housed in standard laboratory conditions demonstrated negative cognitive biases when presented with ambiguous stimuli, and took longer to make a decision when faced with an ambiguous stimulus. Compared to previous methods, this protocol is significantly shorter (average 4days vs. minimum 30days), utilises only positive reinforcers to avoid inducing negative affective states, and requires active responses to all cues, avoiding potential confounds of motivational state. We have successfully developed a shortened cognitive bias protocol, suitable for use with laboratory rats. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  15. Establishment for Nuclear Equipment -Overview

    International Nuclear Information System (INIS)

    Pracz, J.

    2006-01-01

    Research and development works conducted in the Establishment for Nuclear Equipment (ZdAJ) were focused around 3 subject areas: an accelerator for cancer treatment, therapeutical tables, systems and methods for controlling objects that cross international borders. The new, medium energy accelerator for cancer therapy cases is being designed in the Establishment for several years. In 2005 progress was achieved. A physical part, containing an electron beam has been completed and the parameters of that beam make it useful for therapeutical purposes. Consequently, the work on designing and testing of beam control systems, ensuring its high stability, repetition of irradiation parameters and accuracy of dosage have been started. Results of these tests make it very probable that 2006 will be the final year of scientific works and in 2007 the new apparatus will be ready for sales. Therapeutical tables have become a leading product of ZdAJ IPJ. Their technical parameters, reliability and universality in uses are appreciated by many customers of ZdAJ. In 2005, the table Polkam 16 was registered by the national Office for Registration of Medical Equipment as the first product of ZdAJ that meets all technical and formal requirements of the safety mark CE. This allows sales of the product on the market of the European Union. The research and development part of designing a therapeutical table for uses in the total body irradiation technique was also concluded in 2005. After the September 11 terrorist attacks on WTC a matter of controlling international borders have become a priority for many countries. In 2005 in ZdAJ IPJ, we conducted many preliminary calculations and experiments analyzing systems of irradiation sources, both photon and neutron as well as systems of detection and designing of signals triggered by controlling objects crossing the border. The results so far have enabled us to formulate a research project which has been positively evaluated by experts and found

  16. Moyamoya disease in a child with previous acute necrotizing encephalopathy

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Taik-Kun; Cha, Sang Hoon; Chung, Kyoo Byung; Kim, Jung Hyuck; Kim, Baek Hyun; Chung, Hwan Hoon [Department of Diagnostic Radiology, Korea University College of Medicine, Ansan Hospital, 516 Kojan-Dong, Ansan City, Kyungki-Do 425-020 (Korea); Eun, Baik-Lin [Department of Pediatrics, Korea University College of Medicine, Seoul (Korea)

    2003-09-01

    A previously healthy 24-day-old boy presented with a 2-day history of fever and had a convulsion on the day of admission. MRI showed abnormal signal in the thalami, caudate nuclei and central white matter. Acute necrotising encephalopathy was diagnosed, other causes having been excluded after biochemical and haematological analysis of blood, urine and CSF. He recovered, but with spastic quadriparesis. At the age of 28 months, he suffered sudden deterioration of consciousness and motor weakness of his right limbs. MRI was consistent with an acute cerebrovascular accident. Angiography showed bilateral middle cerebral artery stenosis or frank occlusion with numerous lenticulostriate collateral vessels consistent with moyamoya disease. (orig.)

  17. MCNP HPGe detector benchmark with previously validated Cyltran model.

    Science.gov (United States)

    Hau, I D; Russ, W R; Bronson, F

    2009-05-01

    An exact copy of the detector model generated for Cyltran was reproduced as an MCNP input file and the detection efficiency was calculated similarly with the methodology used in previous experimental measurements and simulation of a 280 cm(3) HPGe detector. Below 1000 keV the MCNP data correlated to the Cyltran results within 0.5% while above this energy the difference between MCNP and Cyltran increased to about 6% at 4800 keV, depending on the electron cut-off energy.

  18. HEART TRANSPLANTATION IN PATIENTS WITH PREVIOUS OPEN HEART SURGERY

    Directory of Open Access Journals (Sweden)

    R. Sh. Saitgareev

    2016-01-01

    Full Text Available Heart Transplantation (HTx to date remains the most effective and radical method of treatment of patients with end-stage heart failure. The defi cit of donor hearts is forcing to resort increasingly to the use of different longterm mechanical circulatory support systems, including as a «bridge» to the follow-up HTx. According to the ISHLT Registry the number of recipients underwent cardiopulmonary bypass surgery increased from 40% in the period from 2004 to 2008 to 49.6% for the period from 2009 to 2015. HTx performed in repeated patients, on the one hand, involves considerable technical diffi culties and high risks; on the other hand, there is often no alternative medical intervention to HTx, and if not dictated by absolute contradictions the denial of the surgery is equivalent to 100% mortality. This review summarizes the results of a number of published studies aimed at understanding the immediate and late results of HTx in patients, previously underwent open heart surgery. The effect of resternotomy during HTx and that of the specifi c features associated with its implementation in recipients previously operated on open heart, and its effects on the immediate and long-term survival were considered in this review. Results of studies analyzing the risk factors for perioperative complications in repeated recipients were also demonstrated. Separately, HTx risks after implantation of prolonged mechanical circulatory support systems were examined. The literature does not allow to clearly defi ning the impact factor of earlier performed open heart surgery on the course of perioperative period and on the prognosis of survival in recipients who underwent HTx. On the other hand, subject to the regular fl ow of HTx and the perioperative period the risks in this clinical situation are justifi ed as a long-term prognosis of recipients previously conducted open heart surgery and are comparable to those of patients who underwent primary HTx. Studies

  19. Establishment of the International Power Institute

    Energy Technology Data Exchange (ETDEWEB)

    Coles, Julius E.

    2000-04-29

    Building on the two previous trips to Central America last year, International Power Institute (IPI) and its partner Tennessee Valley Infrastructure Group (TVIG) have focused their attention this quarter on project sites in Honduras. TVIG's unit--an Integrated Infrastructure Platform or IIP--combines water and electricity production in a single integrated unit, thereby providing both products at a lower cost than could be attained for each one separately. Because of the unmet demand for clean drinking water and electricity in remote towns throughout the developing world, the need for such units is widespread. Previous visits to Honduras have resulted in strong in-country commercial interest, support in the form of memorandums of understanding by key government agencies, and identification of four prospective project sites for IIP installations. From March 5 to March 15 and with IPI support and participation, representatives from the TVIG, Tennessee Valley Authority (TVA), IPI, and market research firm International Business Initiatives (IBI) conducted an intensive survey of project opportunities in the four communities, to establish how IIPs might help these four communities enhance their economic development, A key aspect of the projects examined is the need to make them economically self-supporting so that they will be viable in the private sector. Summary of specific project site studies follow here, and feasibility studies for the four sites are included as attachments.

  20. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  1. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  2. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  3. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  4. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  5. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  6. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  7. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  8. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  9. Establishing an ethanol production business

    International Nuclear Information System (INIS)

    1993-01-01

    Many Saskatchewan communities are interested in the potential benefits of establishing an ethanol production facility. A guide is presented to outline areas that communities should consider when contemplating the development of an ethanol production facility. Political issues affecting the ethanol industry are discussed including environmental impacts, United States legislation, Canadian legislation, and government incentives. Key success factors in starting a business, project management, marketing, financing, production, physical requirements, and licensing and regulation are considered. Factors which must be taken into consideration by the project manager and team include markets for ethanol and co-products, competent business management staff, equity partners for financing, production and co-product utilization technologies, integration with another facility such as a feedlot or gluten plant, use of outside consultants, and feedstock, water, energy, labour, environmental and site size requirements. 2 figs., 2 tabs

  10. AWRE: Atomic Weapons Research Establishment

    International Nuclear Information System (INIS)

    1983-01-01

    This reviews the work of AWRE at Aldermaston and Foulness. The main programme is nuclear and is concerned with the design and development of warheads for strategic and tactical nuclear weapons for the British nuclear deterrent, including those for the Royal Navy's missile carrying submarine fleet. The work is described grouped as design physics, development and materials. Services to these groups and to the whole establishment are provided by Engineering, Safety and Administration. The work ranges from long-term fundamental research, the development of technology, design, prototype development to the environmental testing of engineered products. In materials research the emphasis is on plutonium, uranium and beryllium, on high explosives and a wide range of inorganic and organic materials. The physics of the earth's crust is studied to aid detection of underground nuclear explosions. Reactor research facilities include the two reactors, Herald and Viper. (U.K.)

  11. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  12. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  13. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  14. Incidence of Acneform Lesions in Previously Chemically Damaged Persons-2004

    Directory of Open Access Journals (Sweden)

    N Dabiri

    2008-04-01

    Full Text Available ABSTRACT: Introduction & Objective: Chemical gas weapons especially nitrogen mustard which was used in Iraq-Iran war against Iranian troops have several harmful effects on skin. Some other chemical agents also can cause acne form lesions on skin. The purpose of this study was to compare the incidence of acneform in previously chemically damaged soldiers and non chemically damaged persons. Materials & Methods: In this descriptive and analytical study, 180 chemically damaged soldiers, who have been referred to dermatology clinic between 2000 – 2004, and forty non-chemically damaged people, were chosen randomly and examined for acneform lesions. SPSS software was used for statistic analysis of the data. Results: The mean age of the experimental group was 37.5 ± 5.2 and that of the control group was 38.7 ± 5.9 years. The mean percentage of chemical damage in cases was 31 percent and the time after the chemical damage was 15.2 ± 1.1 years. Ninety seven cases (53.9 percent of the subjects and 19 people (47.5 percent of the control group had some degree of acne. No significant correlation was found in incidence, degree of lesions, site of lesions and age of subjects between two groups. No significant correlation was noted between percentage of chemical damage and incidence and degree of lesions in case group. Conclusion: Incidence of acneform lesions among previously chemically injured peoples was not higher than the normal cases.

  15. Relationship of deer and moose populations to previous winters' snow

    Science.gov (United States)

    Mech, L.D.; McRoberts, R.E.; Peterson, R.O.; Page, R.E.

    1987-01-01

    (1) Linear regression was used to relate snow accumulation during single and consecutive winters with white-tailed deer (Odocoileus virginianus) fawn:doe ratios, mosse (Alces alces) twinning rates and calf:cow ratios, and annual changes in deer and moose populations. Significant relationships were found between snow accumulation during individual winters and these dependent variables during the following year. However, the strongest relationships were between the dependent variables and the sums of the snow accumulations over the previous three winters. The percentage of the variability explained was 36 to 51. (2) Significant relationships were also found between winter vulnerability of moose calves and the sum of the snow accumulations in the current, and up to seven previous, winters, with about 49% of the variability explained. (3) No relationship was found between wolf numbers and the above dependent variables. (4) These relationships imply that winter influences on maternal nutrition can accumulate for several years and that this cumulative effect strongly determines fecundity and/or calf and fawn survivability. Although wolf (Canis lupus L.) predation is the main direct mortality agent on fawns and calves, wolf density itself appears to be secondary to winter weather in influencing the deer and moose populations.

  16. Kidnapping Detection and Recognition in Previous Unknown Environment

    Directory of Open Access Journals (Sweden)

    Yang Tian

    2017-01-01

    Full Text Available An unaware event referred to as kidnapping makes the estimation result of localization incorrect. In a previous unknown environment, incorrect localization result causes incorrect mapping result in Simultaneous Localization and Mapping (SLAM by kidnapping. In this situation, the explored area and unexplored area are divided to make the kidnapping recovery difficult. To provide sufficient information on kidnapping, a framework to judge whether kidnapping has occurred and to identify the type of kidnapping with filter-based SLAM is proposed. The framework is called double kidnapping detection and recognition (DKDR by performing two checks before and after the “update” process with different metrics in real time. To explain one of the principles of DKDR, we describe a property of filter-based SLAM that corrects the mapping result of the environment using the current observations after the “update” process. Two classical filter-based SLAM algorithms, Extend Kalman Filter (EKF SLAM and Particle Filter (PF SLAM, are modified to show that DKDR can be simply and widely applied in existing filter-based SLAM algorithms. Furthermore, a technique to determine the adapted thresholds of metrics in real time without previous data is presented. Both simulated and experimental results demonstrate the validity and accuracy of the proposed method.

  17. [ANTITHROMBOTIC MEDICATION IN PREGNANT WOMEN WITH PREVIOUS INTRAUTERINE GROWTH RESTRICTION].

    Science.gov (United States)

    Neykova, K; Dimitrova, V; Dimitrov, R; Vakrilova, L

    2016-01-01

    To analyze pregnancy outcome in patients who were on antithrombotic medication (AM) because of previous pregnancy with fetal intrauterine growth restriction (IUGR). The studied group (SG) included 21 pregnancies in 15 women with history of previous IUGR. The patients were on low dose aspirin (LDA) and/or low molecular weight heparin (LMWH). Pregnancy outcome was compared to the one in two more groups: 1) primary group (PG) including the previous 15 pregnancies with IUGR of the same women; 2) control group (CG) including 45 pregnancies of women matched for parity with the ones in the SG, with no history of IUGR and without medication. The SG, PG and CG were compared for the following: mean gestational age (g.a.) at birth, mean birth weight (BW), proportion of cases with early preeclampsia (PE), IUGR (total, moderate, and severe), intrauterine fetal death (IUFD), neonatal death (NND), admission to NICU, cesarean section (CS) because of chronic or acute fetal distress (FD) related to IUGR, PE or placental abruption. Student's t-test was applied to assess differences between the groups. P values < 0.05 were considered statistically significant. The differences between the SG and the PG regarding mean g. a. at delivery (33.7 and 29.8 w.g. respectively) and the proportion of babies admitted to NICU (66.7% vs. 71.4%) were not statistically significant. The mean BW in the SG (2114,7 g.) was significantly higher than in the PG (1090.8 g.). In the SG compared with the PG there were significantly less cases of IUFD (14.3% and 53.3% respectively), early PE (9.5% vs. 46.7%) moderate and severe IUGR (10.5% and 36.8% vs. 41.7% and 58.3%). Neonatal mortality in the SG (5.6%) was significantly lower than in the PG (57.1%), The proportion of CS for FD was not significantly different--53.3% in the SG and 57.1% in the PG. On the other hand, comparison between the SG and the CG demonstrated significantly lower g.a. at delivery in the SG (33.7 vs. 38 w.g.) an lower BW (2114 vs. 3094 g

  18. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  19. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  20. Ochratoxin A: Previous risk assessments and issues arising

    DEFF Research Database (Denmark)

    Walker, R.; Larsen, John Christian

    2005-01-01

    and mammalian cells, but produced DNA damage and chromosomal aberrations in mammalian cells in vitro, and in mice in vivo. DNA adducts found in the kidneys of mice and rats dosed with OTA, did not contain fragments of OTA. OTA in food has been evaluated by the Joint FAO/WHO Expert Committee on Food Additives...... (JECFA), and by the EC Scientific Committee on Food (SCF). JECFA established a provisional tolerable weekly intake (PTWI) of 100 ng/kg bw based on the LOEL for renal effects in pigs. Conversely, SCF recommended reducing exposure to OTA as much as possible, e.g. below 5 ng/kg bw per day. Both committees...... recommended further studies to clarify the mechanism by which OTA induces nephrotoxicity and carcinogenicity....

  1. Suicide Risk Protocols: Addressing the Needs of High Risk Youths Identified through Suicide Prevention Efforts and in Clinical Settings

    Science.gov (United States)

    Heilbron, Nicole; Goldston, David; Walrath, Christine; Rodi, Michael; McKeon, Richard

    2013-01-01

    Several agencies have emphasized the importance of establishing clear protocols or procedures to address the needs of youths who are identified as suicidal through suicide prevention programs or in emergency department settings. What constitutes optimal guidelines for developing and implementing such protocols, however, is unclear. At the request…

  2. Validation of a ramp running protocol for determination of the true VO2max in mice

    Directory of Open Access Journals (Sweden)

    Mohamed Ayachi

    2016-08-01

    Full Text Available In the field of comparative physiology, it remains to be established whether the concept of VO2max is valid in the mouse and, if so, how this value can be accurately determined. In humans, VO2max is generally considered to correspond to the plateau observed when VO2 no longer rises with an increase in workload. In contrast, the concept of VO2peak tends to be used in murine studies. The objectives of the present study were to determine whether (i a continuous ramp protocol yielded a higher VO2peak than a stepwise, incremental protocol, and (ii the VO2peak measured in the ramp protocol corresponded to VO2max. The three protocols (based on intensity-controlled treadmill running until exhaustion with eight female FVB/N mice were performed in random order: (a an incremental protocol that begins at 10 m.min-1 speed and increases by 3 m.min-1 every 3 min. (b a ramp protocol with slow acceleration (3 m.min-2, and (c a ramp protocol with fast acceleration (12 m.min-2. Each protocol was performed with two slopes (0° and 25°. Hence, each mouse performed six exercise tests. We found that the value of VO2peak was protocol-dependent (p 8 mmol.l-1 and a respiratory exchange ratio >1. The total duration of the 3 m.min-2 0° ramp protocol was shorter than that of the incremental protocol. Taken as a whole, our results suggest that VO2max in the mouse is best determined by applying a ramp exercise protocol with slow acceleration and no treadmill slope.

  3. Blocking Optimality in Distributed Real-Time Locking Protocols

    Directory of Open Access Journals (Sweden)

    Björn Bernhard Brandenburg

    2014-09-01

    Full Text Available Lower and upper bounds on the maximum priority inversion blocking (pi-blocking that is generally unavoidable in distributed multiprocessor real-time locking protocols (where resources may be accessed only from specific synchronization processors are established. Prior work on suspension-based shared-memory multiprocessor locking protocols (which require resources to be accessible from all processors has established asymptotically tight bounds of Ω(m and Ω(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively, where m denotes the total number of processors and n denotes the number of tasks. In this paper, it is shown that, in the case of distributed semaphore protocols, there exist two different task allocation scenarios that give rise to distinct lower bounds. In the case of co-hosted task allocation, where application tasks may also be assigned to synchronization processors (i.e., processors hosting critical sections, Ω(Φ · n maximum pi-blocking is unavoidable for some tasks under any locking protocol under both suspension-aware and suspension-oblivious schedulability analysis, where Φ denotes the ratio of the maximum response time to the shortest period. In contrast, in the case of disjoint task allocation (i.e., if application tasks may not be assigned to synchronization processors, only Ω(m and Ω(n maximum pi-blocking is fundamentally unavoidable under suspension-oblivious and suspension-aware analysis, respectively, as in the shared-memory case. These bounds are shown to be asymptotically tight with the construction of two new distributed real-time locking protocols that ensure O(m and O(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively.

  4. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  5. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  6. Ovarian responses and pregnancy rate with previously used intravaginal progesterone releasing devices for fixed-time artificial insemination in sheep.

    Science.gov (United States)

    Vilariño, M; Rubianes, E; Menchaca, A

    2013-01-01

    The objective was to determine serum progesterone concentrations, ovarian responses, and pregnancy rate in sheep inseminated following a short-term protocol (6 days of treatment) with a previously used controlled internal drug release-G (CIDR-G) device. In experiment 1, 30 ewes were put on a short-term protocol using a CIDR-G of first use (new devices, N = 10), second use (previously used for 6 days, N = 10), or third use (previously used twice for 6 days, N = 10). All ewes were given prostaglandin F(2α) (10 mg dinoprost) and eCG (300 IU) im at device withdrawal. Mean serum progesterone concentrations were greater for ewes treated with new versus reused devices (P synchronization and ovulation, with lower serum progesterone concentrations for reused devices. Three times used CIDR-G yielded a pregnancy rate >70%, which tended to be lower than that obtained with new devices, adding evidence of the detrimental effect of low serum progesterone concentrations on fertility in sheep. Copyright © 2013 Elsevier Inc. All rights reserved.

  7. Deepwater Gulf of Mexico more profitable than previously thought

    International Nuclear Information System (INIS)

    Craig, M.J.K.; Hyde, S.T.

    1997-01-01

    Economic evaluations and recent experience show that the deepwater Gulf of Mexico (GOM) is much more profitable than previously thought. Four factors contributing to the changed viewpoint are: First, deepwater reservoirs have proved to have excellent productive capacity, distribution, and continuity when compared to correlative-age shelf deltaic sands. Second, improved technologies and lower perceived risks have lowered the cost of floating production systems (FPSs). Third, projects now get on-line quicker. Fourth, a collection of other important factors are: Reduced geologic risk and associated high success rates for deepwater GOM wells due primarily to improved seismic imaging and processing tools (3D, AVO, etc.); absence of any political risk in the deepwater GOM (common overseas, and very significant in some international areas); and positive impact of deepwater federal royalty relief. This article uses hypothetical reserve distributions and price forecasts to illustrate indicative economics of deepwater prospects. Economics of Shell Oil Co.'s three deepwater projects are also discussed

  8. Corneal perforation after conductive keratoplasty with previous refractive surgery.

    Science.gov (United States)

    Kymionis, George D; Titze, Patrik; Markomanolakis, Marinos M; Aslanides, Ioannis M; Pallikaris, Ioannis G

    2003-12-01

    A 56-year-old woman had conductive keratoplasty (CK) for residual hyperopia and astigmatism. Three years before the procedure, the patient had arcuate keratotomy, followed by laser in situ keratomileusis 2 years later for high astigmatism correction in both eyes. During CK, a corneal perforation occurred in the right eye; during the postoperative examination, an iris perforation and anterior subcapsule opacification were seen beneath the perforation site. The perforation was managed with a bandage contact lens and an antibiotic-steroid ointment; it had a negative Seidel sign by the third day. The surgery in the left eye was uneventful. Three months after the procedure, the uncorrected visual acuity was 20/32 and the best corrected visual acuity 20/20 in both eyes with a significant improvement in corneal topography. Care must be taken to prevent CK-treated spots from coinciding with areas in the corneal stroma that might have been altered by previous refractive procedures.

  9. Interference from previous distraction disrupts older adults' memory.

    Science.gov (United States)

    Biss, Renée K; Campbell, Karen L; Hasher, Lynn

    2013-07-01

    Previously relevant information can disrupt the ability of older adults to remember new information. Here, the researchers examined whether prior irrelevant information, or distraction, can also interfere with older adults' memory for new information. Younger and older adults first completed a 1-back task on pictures that were superimposed with distracting words. After a delay, participants learned picture-word paired associates and memory was tested using picture-cued recall. In 1 condition (high interference), some pairs included pictures from the 1-back task now paired with new words. In a low-interference condition, the transfer list used all new items. Older adults had substantially lower cued-recall performance in the high- compared with the low-interference condition. In contrast, younger adults' performance did not vary across conditions. These findings suggest that even never-relevant information from the past can disrupt older adults' memory for new associations.

  10. The long-term consequences of previous hyperthyroidism

    DEFF Research Database (Denmark)

    Hjelm Brandt Kristensen, Frans

    2015-01-01

    Thyroid hormones affect every cell in the human body, and the cardiovascular changes associated with increased levels of thyroid hormones are especially well described. As an example, short-term hyperthyroidism has positive chronotropic and inotropic effects on the heart, leading to a hyperdynamic...... with CVD, LD and DM both before and after the diagnosis of hyperthyroidism. Although the design used does not allow a stringent distinction between cause and effect, the findings indicate a possible direct association between hyperthyroidism and these morbidities, or vice versa....... vascular state. While it is biologically plausible that these changes may induce long-term consequences, the insight into morbidity as well as mortality in patients with previous hyperthyroidism is limited. The reasons for this are a combination of inadequately powered studies, varying definitions...

  11. Is Previous Respiratory Disease a Risk Factor for Lung Cancer?

    Science.gov (United States)

    Denholm, Rachel; Schüz, Joachim; Straif, Kurt; Stücker, Isabelle; Jöckel, Karl-Heinz; Brenner, Darren R.; De Matteis, Sara; Boffetta, Paolo; Guida, Florence; Brüske, Irene; Wichmann, Heinz-Erich; Landi, Maria Teresa; Caporaso, Neil; Siemiatycki, Jack; Ahrens, Wolfgang; Pohlabeln, Hermann; Zaridze, David; Field, John K.; McLaughlin, John; Demers, Paul; Szeszenia-Dabrowska, Neonila; Lissowska, Jolanta; Rudnai, Peter; Fabianova, Eleonora; Dumitru, Rodica Stanescu; Bencko, Vladimir; Foretova, Lenka; Janout, Vladimir; Kendzia, Benjamin; Peters, Susan; Behrens, Thomas; Vermeulen, Roel; Brüning, Thomas; Kromhout, Hans

    2014-01-01

    Rationale: Previous respiratory diseases have been associated with increased risk of lung cancer. Respiratory conditions often co-occur and few studies have investigated multiple conditions simultaneously. Objectives: Investigate lung cancer risk associated with chronic bronchitis, emphysema, tuberculosis, pneumonia, and asthma. Methods: The SYNERGY project pooled information on previous respiratory diseases from 12,739 case subjects and 14,945 control subjects from 7 case–control studies conducted in Europe and Canada. Multivariate logistic regression models were used to investigate the relationship between individual diseases adjusting for co-occurring conditions, and patterns of respiratory disease diagnoses and lung cancer. Analyses were stratified by sex, and adjusted for age, center, ever-employed in a high-risk occupation, education, smoking status, cigarette pack-years, and time since quitting smoking. Measurements and Main Results: Chronic bronchitis and emphysema were positively associated with lung cancer, after accounting for other respiratory diseases and smoking (e.g., in men: odds ratio [OR], 1.33; 95% confidence interval [CI], 1.20–1.48 and OR, 1.50; 95% CI, 1.21–1.87, respectively). A positive relationship was observed between lung cancer and pneumonia diagnosed 2 years or less before lung cancer (OR, 3.31; 95% CI, 2.33–4.70 for men), but not longer. Co-occurrence of chronic bronchitis and emphysema and/or pneumonia had a stronger positive association with lung cancer than chronic bronchitis “only.” Asthma had an inverse association with lung cancer, the association being stronger with an asthma diagnosis 5 years or more before lung cancer compared with shorter. Conclusions: Findings from this large international case–control consortium indicate that after accounting for co-occurring respiratory diseases, chronic bronchitis and emphysema continue to have a positive association with lung cancer. PMID:25054566

  12. Twelve previously unknown phage genera are ubiquitous in global oceans.

    Science.gov (United States)

    Holmfeldt, Karin; Solonenko, Natalie; Shah, Manesh; Corrier, Kristen; Riemann, Lasse; Verberkmoes, Nathan C; Sullivan, Matthew B

    2013-07-30

    Viruses are fundamental to ecosystems ranging from oceans to humans, yet our ability to study them is bottlenecked by the lack of ecologically relevant isolates, resulting in "unknowns" dominating culture-independent surveys. Here we present genomes from 31 phages infecting multiple strains of the aquatic bacterium Cellulophaga baltica (Bacteroidetes) to provide data for an underrepresented and environmentally abundant bacterial lineage. Comparative genomics delineated 12 phage groups that (i) each represent a new genus, and (ii) represent one novel and four well-known viral families. This diversity contrasts the few well-studied marine phage systems, but parallels the diversity of phages infecting human-associated bacteria. Although all 12 Cellulophaga phages represent new genera, the podoviruses and icosahedral, nontailed ssDNA phages were exceptional, with genomes up to twice as large as those previously observed for each phage type. Structural novelty was also substantial, requiring experimental phage proteomics to identify 83% of the structural proteins. The presence of uncommon nucleotide metabolism genes in four genera likely underscores the importance of scavenging nutrient-rich molecules as previously seen for phages in marine environments. Metagenomic recruitment analyses suggest that these particular Cellulophaga phages are rare and may represent a first glimpse into the phage side of the rare biosphere. However, these analyses also revealed that these phage genera are widespread, occurring in 94% of 137 investigated metagenomes. Together, this diverse and novel collection of phages identifies a small but ubiquitous fraction of unknown marine viral diversity and provides numerous environmentally relevant phage-host systems for experimental hypothesis testing.

  13. Urethrotomy has a much lower success rate than previously reported.

    Science.gov (United States)

    Santucci, Richard; Eisenberg, Lauren

    2010-05-01

    We evaluated the success rate of direct vision internal urethrotomy as a treatment for simple male urethral strictures. A retrospective chart review was performed on 136 patients who underwent urethrotomy from January 1994 through March 2009. The Kaplan-Meier method was used to analyze stricture-free probability after the first, second, third, fourth and fifth urethrotomy. Patients with complex strictures (36) were excluded from the study for reasons including previous urethroplasty, neophallus or previous radiation, and 24 patients were lost to followup. Data were available for 76 patients. The stricture-free rate after the first urethrotomy was 8% with a median time to recurrence of 7 months. For the second urethrotomy stricture-free rate was 6% with a median time to recurrence of 9 months. For the third urethrotomy stricture-free rate was 9% with a median time to recurrence of 3 months. For procedures 4 and 5 stricture-free rate was 0% with a median time to recurrence of 20 and 8 months, respectively. Urethrotomy is a popular treatment for male urethral strictures. However, the performance characteristics are poor. Success rates were no higher than 9% in this series for first or subsequent urethrotomy during the observation period. Most of the patients in this series will be expected to experience failure with longer followup and the expected long-term success rate from any (1 through 5) urethrotomy approach is 0%. Urethrotomy should be considered a temporizing measure until definitive curative reconstruction can be planned. 2010 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  14. Is the prefrontal cortex necessary for establishing cognitive sets?

    DEFF Research Database (Denmark)

    Rowe, James B; Sakai, Katsuyuki; Lund, Torben E

    2007-01-01

    first instructed as to whether to perform a spatial or a verbal working memory task and then given spatial and verbal items after a delay of 4-12 s. The patients showed an increase in switch costs, making more errors by repeating what they had done on the previous trial. They were able to establish...

  15. Ecthyma gangrenosum in the periorbital region in a previously healthy immunocompetent woman without bacteremia

    Directory of Open Access Journals (Sweden)

    Somenath Sarkar

    2016-01-01

    Full Text Available Ecthyma gangrenosum (EG is a cutaneous lesion classically associated with potentially fatal Pseudomonas septicemia in immunocompromised patients. Other bacterial and fungal pathogens have also been implicated. Although EG typically occurs in immunocompromised or neutropenic patients, it may occasionally affect a previously healthy person. The cutaneous findings are characteristic with small indurated papulovesicles progressing rapidly to necrotic ulcers with surrounding erythema and a central black Eschar. While lesions can occur at any site, most are commonly found over the buttocks, perineum, limbs, and axillae. We describe a case of EG in periorbital region in a previously healthy woman who responded to appropriate antibiotic treatment for Pseudomonas. It is very important to establish the diagnosis early so that appropriate systemic antibiotic therapy can be initiated to reduce morbidity and potential mortality.

  16. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  17. Guidelines of Decommissioning Schedule Establishment

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Jae Yong; Yun, Taesik; Kim, Younggook; Kim, Hee-Geun [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    Decommissioning has recently become an issue highlighted in Korea due to the Permanent Shutdown (PS) of Kori-1 plant. Since Korea Hydro and Nuclear Power (KHNP) Company decided the PS of Kori-1 instead of further continued operation, Kori-1 will be the first decommissioning plant of the commercial reactors in Korea. Korean regulatory authority demands Initial Decommissioning Plan (IDP) for all the plants in operation and under construction. In addition, decommissioning should be considered for the completion of the life cycle of NPPs. To date, Korea has no experience regarding decommissioning of the commercial reactor and a lot of uncertainties will be expected due to its site-specific factors. However, optimized decommissioning process schedule must be indispensable in the safety and economic efficiency of the project. Differed from USA, Korea has no experience and know-hows of the operation and site management for decommissioning. Hence, in Korea, establishment of decommissioning schedule has to give more weight to safety than precedent cases. More economical and rational schedule will be composed by collecting and analyzing the experience data and site-specific data and information as the decommissioning progresses. In a long-range outlook, KHNP having capability of NPP decommissioning will try to decommissioning business in Korea and foreign countries.

  18. Petten establishment. Annual report 1978

    International Nuclear Information System (INIS)

    1979-01-01

    1978 was the second year in the Joint Research Centre's 1977-1980 multiannual research programme. Since the following exercise is intended to run from 1980 to 1983 with a one year overlap, new proposals will be placed before the Council of Ministers in 1979. To this end, a considerable part of the programme and project management staff activities has been devoted to the peliminary preparation of future plans. In general it is expected that the Establishment's three research activities will continue along the lines already proceeding successfully in the present programme in the materials testing reactor (HFR), high temperature materials and organic chemistry spheres with some updating and refocussing where necessary. Consultation with the appropriate Advisory Committees for Programme Management has been contributed to these processes. Another important development has been the question of site security, following decisions of the European Commission and the Dutch Government to apply International Atomic Agency regulations. The work to apply the necessary measures has had to be executed in the shortest possible time. We have endeavoured to maintain and increase for all three programmes the already intensive contacts with research institutes and industry in the Member States. Important in this connection are the international conferences, 'Alloy 800' held in March and 'Ramping and Load following Behaviour of Reactor Fuel' in December, as well as an international meeting of the 'irradiation Devices Working Party' which took place in May

  19. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Science.gov (United States)

    Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-01-01

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168

  20. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yo-Hsuan Chuang

    2018-04-01

    Full Text Available Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs. Within this kind of Internet of Things (IoT environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  1. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    Science.gov (United States)

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  2. Do attitudes of families concerned influence features of children who claim to remember previous lives?

    Science.gov (United States)

    Pasricha, Satwant K

    2011-01-01

    Reported cases of nearly 2600 children (subjects) who claim to remember previous lives have been investigated in cultures with and without belief in reincarnation. The authenticity in most cases has been established. To study the influence of attitudes of parents of the subjects, families of the deceased person with whom they are identified and attention paid by others on the features of the cases. The study is based on field investigations. Data is derived from analysis of a larger series of an ongoing project. Information on initial and subsequent attitudes of subjects' mothers was available for 292 and 136 cases, respectively; attitudes of 227 families of deceased person (previous personality) with whom he is identified, and the extent of attention received from outsiders for 252 cases. Observations and interviews with multiple firsthand informants on both sides of the case as well as some neutral informants supplemented by examination of objective data were the chief methods of investigation. The initial attitude of mothers varied from encouragement (21%) to neutral or tolerance (51%) to discouragement (28%). However, it changed significantly from neutrality to taking measures to induce amnesia in their children for previous life memories due to various psychosocial pressures and prevalent beliefs. Families of the previous personalities, once convinced, showed complete acceptance in a majority of cases. Outside attention was received in 58% cases. The positive attitude of parents might facilitate expression of memories but subsequently attitudes of persons concerned do not seem to alter features of the cases.

  3. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  4. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  5. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  6. Nuclear Physics in High School: what are the previous knowledge?

    Science.gov (United States)

    Pombo, F. de O.

    2017-11-01

    Nuclear physics is a branch of physics that about a century occupies an important space in the theoretical, experimental and scientific fields. Currently, its relevance in application is concentrated in several areas such as energy production, diagnostic processes and medical treatment and nuclear bombs, high destructive power. Whereas, according to legal regulations, the teaching of physics must make the student competent in the understanding of the world and assuming the perspective of Paulo Freire (2011) that education is not done on the subject, but together with him, in dialogue with his point of departure, his prior knowledge, we established the general objective of raising students prior knowledge of the third year of high School at Nair Ferreira Neves school, in São Sebastião-SP, about nuclear physics. We concluded that the school has not fulfilled its role in relation to nuclear physics, because students have information from other means of information and these knowledge are stereotyped and mistaken, damaging the world's reading and exercising full citizenship.

  7. Diagnosis of Beta-thalassaemia major in previously transfused patients

    International Nuclear Information System (INIS)

    Ahmed, S.; Rehman, Z.; Karamat, K.A.

    2003-01-01

    Objective: The study was conducted to evaluate the effects of blood transfusion(s) on the haematological picture of beta-thalassaemia major. Results: Out of the 280 patients 109 (39%) had received one or more blood transfusions (cases). The remaining 171 patients who did not receive any transfusion served as controls. The mean MCV, MCH and Hb-F in cases were significantly higher than in the controls (p 4 transfusions (17%) (p=0.016). In the occasionally transfused patients Hb-F level was directly related to the time since last transfusion. In 44/109 (40%) transfused patients (Hb-F>30%) the diagnosis of thalassaemia was not difficult. In 54/109 (50%) patients (Hb-:5-30%) the diagnosis was aided by parent's study, while PCR for thalassaemia mutation was required in 11/109 (10%) patients (Hb-F <5%). Conclusion: In most transfused patients of thalassaemia major MCV and MCH were significantly higher while Hb-F was lower than in the un-transfused patients. There was a linear correlation between Hb-F level and time since last transfusion in the occasionally transfused patients. However, the reduction in Hb-F level was more marked and sustained in multipally transfused patients. Parent's study and PCR are useful aids in establishing the correct diagnosis in these patients. (author)

  8. IIIB or not IIIB: a previously unanswered question.

    Science.gov (United States)

    Thibodeau, Jennifer T; Mishkin, Joseph D; Patel, Parag C; Mammen, Pradeep P A; Markham, David W; Drazner, Mark H

    2012-05-01

    The term New York Heart Association (NYHA) class IIIB has been used increasingly in clinical medicine, including as an inclusion criteria for many clinical trials assessing left ventricular assist devices (LVADs). Indeed, NYHA class IIIB is incorporated in the Food and Drug Administration's approved indication for the Heartmate II. However, on review of the medical literature, we found that there is no consensus definition of NYHA class IIIB. Until the ambiguity is resolved, we suggest that this designation not be used in clinical practice or by investigators leading clinical trials assessing therapies which convey substantial risk to patients and therefore require clarity in describing the enrolled patient population. With ongoing improvements in LVADs, this therapy will increasingly be considered in patients less sick than those who require inotropic support, providing urgency to establish a consensus system of classifying such patients who nevertheless fall within the spectrum of advanced heart failure. Herein we propose a modification of the standard NYHA classification system which can be used to fill this void. Copyright © 2012 Elsevier Inc. All rights reserved.

  9. Establishment of peak bone mass.

    Science.gov (United States)

    Mora, Stefano; Gilsanz, Vicente

    2003-03-01

    Among the main areas of progress in osteoporosis research during the last decade or so are the general recognition that this condition, which is the cause of so much pain in the elderly population, has its antecedents in childhood and the identification of the structural basis accounting for much of the differences in bone strength among humans. Nevertheless, current understanding of the bone mineral accrual process is far from complete. The search for genes that regulate bone mass acquisition is ongoing, and current results are not sufficient to identify subjects at risk. However, there is solid evidence that BMD measurements can be helpful for the selection of subjects that presumably would benefit from preventive interventions. The questions regarding the type of preventive interventions, their magnitude, and duration remain unanswered. Carefully designed controlled trials are needed. Nevertheless, previous experience indicates that weight-bearing activity and possibly calcium supplements are beneficial if they are begun during childhood and preferably before the onset of puberty. Modification of unhealthy lifestyles and increments in exercise or calcium assumption are logical interventions that should be implemented to improve bone mass gains in all children and adolescents who are at risk of failing to achieve an optimal peak bone mass.

  10. Heavy vehicle simulator operations: protocol for instrumentation, data collection and data storage - 2nd draft

    CSIR Research Space (South Africa)

    Jones, DJ

    2002-09-01

    Full Text Available The instrumentation used is discussed under the relevant sections. Keywords: Accelerated pavement testing (APT), Heavy Vehicle Simulator (HVS) Proposals for implementation: Follow protocol in all future HVS testing. Update as required... future HVS testing. The protocol discusses staffing, site selection and establishment, and data collection, analysis and storage. 1.2. Accelerated Pavement Testing Accelerated Pavement Testing (APT) can be described as a controlled application...

  11. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  12. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  13. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  14. Oral breathing: new early treatment protocol

    Directory of Open Access Journals (Sweden)

    Gloria Denotti

    2014-01-01

    Full Text Available Oral breathing is a respiratory dysfunction that affects approximately 10-15% of child population. It is responsable of local effects and systemic effects, both immediate and long-term. They affect the growth of the subject and his physical health in many ways: pediatric, psycho-behavioral and cognitive. The etiology is multifactorial. It’s important the establishment of a vicious circle involving more areas and it is essential to stop it as soon as possible. In order to correct this anomaly, the pediatric dentist must be able to make a correct diagnosis to treat early the disfunction and to avoid the onset of cascade mechanisms. Who plays a central role is the pediatrician who first and frequently come into contact with little patients. He can identify the anomalies, and therefore collaborate with other specialists, including the dentist. The key aspect that guides us in the diagnosis, and allows us to identify the oral respirator, is the “adenoid facies”. The purpose of the study is to highlight the importance and benefits of an early and multidisciplinary intervention (pediatric, orthopedic-orthodontic-functional. A sample of 20 patients was selected with the following inclusion criteria: mouth breathing, transverse discrepancy > 4 mm, early mixed dentition, central and lateral permenent incisors, overjet increased, lip and nasal incompetence, snoring and/or sleep apnea episodes. The protocol of intervention includes the use of the following devices and procedures: a maxillary rapid expander (to correct the transverse discrepancy, to increase the amplitude of the upper respiratory airway and to reduce nasal resistances tract in association with myo-functional devices (nasal stimulator and oral obturator. They allow the reconstruction of a physiological balance between the perioral musculature and tongue, the acquisition of nasal and lips competence and the reduction of overjet. This protocol speeds up and stabilizes the results. The

  15. A New Laser Preheat Protocol For Maglif

    Science.gov (United States)

    Weis, M. R.; Harvey-Thompson, A. J.; Geissel, M.; Jennings, C. A.; Peterson, K. J.; Glinsky, M. E.; Awe, T. J.; Bliss, D. E.; Gomez, M. R.; Harding, E. C.; Hansen, S. B.; Kimmel, M. W.; Knapp, P. F.; Lewis, S. M.; Porter, J. L.; Rochau, G. A.; Schollmeier, M.; Schwarz, J.; Shores, J. E.; Slutz, S. A.; Sinars, D. B.; Smith, I. C.; Speas, C. S.

    2017-10-01

    Previous Magnetized Liner Inertial Fusion experiments at Sandia National Labs have preheated the fuel with the unsmoothed 2 ω Z-Beamlet Laser. A new low intensity laser configuration, using phase plate smoothing and a low-power pulse shape, improved laser propagation and reduced stimulated Brillouin scattering in offline laser experiments. This allows for more efficient use of laser energy and better spot reproducibility. The new laser protocol is estimated to couple at least 650 J to the fuel, sufficient to produce comparable neutron yields with the previous unsmoothed configuration. Mid-Z dopants were also fielded on the underside of the window. Observation of these dopants provided evidence of window material mixing into the fuel with both the unsmoothed and smoothed beam, consistent with MHD simulation predictions. Sandia National Laboratories is a multi-mission laboratory managed and operated by NTESS, LLC, a wholly owned subsidiary of Honeywell International, Inc., for the U.S. DOE's NNSA under contract DE-NA0003525.

  16. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  17. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  18. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  19. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  20. Radon anomalies prior to earthquakes (1). Review of previous studies

    International Nuclear Information System (INIS)

    Ishikawa, Tetsuo; Tokonami, Shinji; Yasuoka, Yumi; Shinogi, Masaki; Nagahama, Hiroyuki; Omori, Yasutaka; Kawada, Yusuke

    2008-01-01

    The relationship between radon anomalies and earthquakes has been studied for more than 30 years. However, most of the studies dealt with radon in soil gas or in groundwater. Before the 1995 Hyogoken-Nanbu earthquake, an anomalous increase of atmospheric radon was observed at Kobe Pharmaceutical University. The increase was well fitted with a mathematical model related to earthquake fault dynamics. This paper reports the significance of this observation, reviewing previous studies on radon anomaly before earthquakes. Groundwater/soil radon measurements for earthquake prediction began in 1970's in Japan as well as foreign countries. One of the most famous studies in Japan is groundwater radon anomaly before the 1978 Izu-Oshima-kinkai earthquake. We have recognized the significance of radon in earthquake prediction research, but recently its limitation was also pointed out. Some researchers are looking for a better indicator for precursors; simultaneous measurements of radon and other gases are new trials in recent studies. Contrary to soil/groundwater radon, we have not paid much attention to atmospheric radon before earthquakes. However, it might be possible to detect precursors in atmospheric radon before a large earthquake. In the next issues, we will discuss the details of the anomalous atmospheric radon data observed before the Hyogoken-Nanbu earthquake. (author)

  1. Cerebral Metastasis from a Previously Undiagnosed Appendiceal Adenocarcinoma

    Directory of Open Access Journals (Sweden)

    Antonio Biroli

    2012-01-01

    Full Text Available Brain metastases arise in 10%–40% of all cancer patients. Up to one third of the patients do not have previous cancer history. We report a case of a 67-years-old male patient who presented with confusion, tremor, and apraxia. A brain MRI revealed an isolated right temporal lobe lesion. A thorax-abdomen-pelvis CT scan showed no primary lesion. The patient underwent a craniotomy with gross-total resection. Histopathology revealed an intestinal-type adenocarcinoma. A colonoscopy found no primary lesion, but a PET-CT scan showed elevated FDG uptake in the appendiceal nodule. A right hemicolectomy was performed, and the specimen showed a moderately differentiated mucinous appendiceal adenocarcinoma. Whole brain radiotherapy was administrated. A subsequent thorax-abdomen CT scan revealed multiple lung and hepatic metastasis. Seven months later, the patient died of disease progression. In cases of undiagnosed primary lesions, patients present in better general condition, but overall survival does not change. Eventual identification of the primary tumor does not affect survival. PET/CT might be a helpful tool in detecting lesions of the appendiceal region. To the best of our knowledge, such a case was never reported in the literature, and an appendiceal malignancy should be suspected in patients with brain metastasis from an undiagnosed primary tumor.

  2. Coronary collateral vessels in patients with previous myocardial infarction

    International Nuclear Information System (INIS)

    Nakatsuka, M.; Matsuda, Y.; Ozaki, M.

    1987-01-01

    To assess the degree of collateral vessels after myocardial infarction, coronary angiograms, left ventriculograms, and exercise thallium-201 myocardial scintigrams of 36 patients with previous myocardial infarction were reviewed. All 36 patients had total occlusion of infarct-related coronary artery and no more than 70% stenosis in other coronary arteries. In 19 of 36 patients with transient reduction of thallium-201 uptake in the infarcted area during exercise (Group A), good collaterals were observed in 10 patients, intermediate collaterals in 7 patients, and poor collaterals in 2 patients. In 17 of 36 patients without transient reduction of thallium-201 uptake in the infarcted area during exercise (Group B), good collaterals were seen in 2 patients, intermediate collaterals in 7 patients, and poor collaterals in 8 patients (p less than 0.025). Left ventricular contractions in the infarcted area were normal or hypokinetic in 10 patients and akinetic or dyskinetic in 9 patients in Group A. In Group B, 1 patient had hypokinetic contraction and 16 patients had akinetic or dyskinetic contraction (p less than 0.005). Thus, patients with transient reduction of thallium-201 uptake in the infarcted area during exercise had well developed collaterals and preserved left ventricular contraction, compared to those in patients without transient reduction of thallium-201 uptake in the infarcted area during exercise. These results suggest that the presence of viable myocardium in the infarcted area might be related to the degree of collateral vessels

  3. High-Grade Leiomyosarcoma Arising in a Previously Replanted Limb

    Directory of Open Access Journals (Sweden)

    Tiffany J. Pan

    2015-01-01

    Full Text Available Sarcoma development has been associated with genetics, irradiation, viral infections, and immunodeficiency. Reports of sarcomas arising in the setting of prior trauma, as in burn scars or fracture sites, are rare. We report a case of a leiomyosarcoma arising in an arm that had previously been replanted at the level of the elbow joint following traumatic amputation when the patient was eight years old. He presented twenty-four years later with a 10.8 cm mass in the replanted arm located on the volar forearm. The tumor was completely resected and pathology examination showed a high-grade, subfascial spindle cell sarcoma diagnosed as a grade 3 leiomyosarcoma with stage pT2bNxMx. The patient underwent treatment with brachytherapy, reconstruction with a free flap, and subsequently chemotherapy. To the best of our knowledge, this is the first case report of leiomyosarcoma developing in a replanted extremity. Development of leiomyosarcoma in this case could be related to revascularization, scar formation, or chronic injury after replantation. The patient remains healthy without signs of recurrence at three-year follow-up.

  4. Global functional atlas of Escherichia coli encompassing previously uncharacterized proteins.

    Directory of Open Access Journals (Sweden)

    Pingzhao Hu

    2009-04-01

    Full Text Available One-third of the 4,225 protein-coding genes of Escherichia coli K-12 remain functionally unannotated (orphans. Many map to distant clades such as Archaea, suggesting involvement in basic prokaryotic traits, whereas others appear restricted to E. coli, including pathogenic strains. To elucidate the orphans' biological roles, we performed an extensive proteomic survey using affinity-tagged E. coli strains and generated comprehensive genomic context inferences to derive a high-confidence compendium for virtually the entire proteome consisting of 5,993 putative physical interactions and 74,776 putative functional associations, most of which are novel. Clustering of the respective probabilistic networks revealed putative orphan membership in discrete multiprotein complexes and functional modules together with annotated gene products, whereas a machine-learning strategy based on network integration implicated the orphans in specific biological processes. We provide additional experimental evidence supporting orphan participation in protein synthesis, amino acid metabolism, biofilm formation, motility, and assembly of the bacterial cell envelope. This resource provides a "systems-wide" functional blueprint of a model microbe, with insights into the biological and evolutionary significance of previously uncharacterized proteins.

  5. Global functional atlas of Escherichia coli encompassing previously uncharacterized proteins.

    Science.gov (United States)

    Hu, Pingzhao; Janga, Sarath Chandra; Babu, Mohan; Díaz-Mejía, J Javier; Butland, Gareth; Yang, Wenhong; Pogoutse, Oxana; Guo, Xinghua; Phanse, Sadhna; Wong, Peter; Chandran, Shamanta; Christopoulos, Constantine; Nazarians-Armavil, Anaies; Nasseri, Negin Karimi; Musso, Gabriel; Ali, Mehrab; Nazemof, Nazila; Eroukova, Veronika; Golshani, Ashkan; Paccanaro, Alberto; Greenblatt, Jack F; Moreno-Hagelsieb, Gabriel; Emili, Andrew

    2009-04-28

    One-third of the 4,225 protein-coding genes of Escherichia coli K-12 remain functionally unannotated (orphans). Many map to distant clades such as Archaea, suggesting involvement in basic prokaryotic traits, whereas others appear restricted to E. coli, including pathogenic strains. To elucidate the orphans' biological roles, we performed an extensive proteomic survey using affinity-tagged E. coli strains and generated comprehensive genomic context inferences to derive a high-confidence compendium for virtually the entire proteome consisting of 5,993 putative physical interactions and 74,776 putative functional associations, most of which are novel. Clustering of the respective probabilistic networks revealed putative orphan membership in discrete multiprotein complexes and functional modules together with annotated gene products, whereas a machine-learning strategy based on network integration implicated the orphans in specific biological processes. We provide additional experimental evidence supporting orphan participation in protein synthesis, amino acid metabolism, biofilm formation, motility, and assembly of the bacterial cell envelope. This resource provides a "systems-wide" functional blueprint of a model microbe, with insights into the biological and evolutionary significance of previously uncharacterized proteins.

  6. Influence of Previous Knowledge in Torrance Tests of Creative Thinking

    Directory of Open Access Journals (Sweden)

    María Aranguren

    2015-07-01

    Full Text Available The aim of this work is to analyze the influence of study field, expertise and recreational activities participation in Torrance Tests of Creative Thinking (TTCT, 1974 performance. Several hypotheses were postulated to explore the possible effects of previous knowledge in TTCT verbal and TTCT figural university students’ outcomes. Participants in this study included 418 students from five study fields: Psychology;Philosophy and Literature, Music; Engineering; and Journalism and Advertising (Communication Sciences. Results found in this research seem to indicate that there in none influence of the study field, expertise and recreational activities participation in neither of the TTCT tests. Instead, the findings seem to suggest some kind of interaction between certain skills needed to succeed in specific studies fields and performance on creativity tests, such as the TTCT. These results imply that TTCT is a useful and valid instrument to measure creativity and that some cognitive process involved in innovative thinking can be promoted using different intervention programs in schools and universities regardless the students study field.

  7. Gastrointestinal tolerability with ibandronate after previous weekly bisphosphonate treatment.

    Science.gov (United States)

    Derman, Richard; Kohles, Joseph D; Babbitt, Ann

    2009-01-01

    Data from two open-label trials (PRIOR and CURRENT) of women with postmenopausal osteoporosis or osteopenia were evaluated to assess whether monthly oral and quarterly intravenous (IV) ibandronate dosing improved self-reported gastrointestinal (GI) tolerability for patients who had previously experienced GI irritation with bisphosphonate (BP) use. In PRIOR, women who had discontinued daily or weekly BP treatment due to GI intolerance received monthly oral or quarterly IV ibandronate for 12 months. The CURRENT subanalysis included women receiving weekly BP treatment who switched to monthly oral ibandronate for six months. GI symptom severity and frequency were assessed using the Osteoporosis Patient Satisfaction Questionnaire. In PRIOR, mean GI tolerability scores increased significantly at month 1 from screening for both treatment groups (oral: 79.3 versus 54.1; IV: 84.4 versus 51.0; p 90% at Month 10). In the CURRENT subanalysis >60% of patients reported improvements in heartburn or acid reflux and >70% indicated improvement in other stomach upset at month 6. Postmenopausal women with GI irritability with daily or weekly BPs experienced improvement in symptoms with extended dosing monthly or quarterly ibandronate compared with baseline.

  8. Pertussis-associated persistent cough in previously vaccinated children.

    Science.gov (United States)

    Principi, Nicola; Litt, David; Terranova, Leonardo; Picca, Marina; Malvaso, Concetta; Vitale, Cettina; Fry, Norman K; Esposito, Susanna

    2017-11-01

    To evaluate the role of Bordetella pertussis infection, 96 otherwise healthy 7- to 17-year-old subjects who were suffering from a cough lasting from 2 to 8 weeks were prospectively recruited. At enrolment, a nasopharyngeal swab and an oral fluid sample were obtained to search for pertussis infection by the detection of B. pertussis DNA and/or an elevated titre of anti-pertussis toxin IgG. Evidence of pertussis infection was found in 18 (18.7 %; 95 % confidence interval, 11.5-28.0) cases. In 15 cases, the disease occurred despite booster administration. In two cases, pertussis was diagnosed less than 2 years after the booster injection, whereas in the other cases it was diagnosed between 2 and 9 years after the booster dose. This study used non-invasive testing to show that pertussis is one of the most important causes of long-lasting cough in school-age subjects. Moreover, the protection offered by acellular pertussis vaccines currently wanes more rapidly than previously thought.

  9. Multispecies Coevolution Particle Swarm Optimization Based on Previous Search History

    Directory of Open Access Journals (Sweden)

    Danping Wang

    2017-01-01

    Full Text Available A hybrid coevolution particle swarm optimization algorithm with dynamic multispecies strategy based on K-means clustering and nonrevisit strategy based on Binary Space Partitioning fitness tree (called MCPSO-PSH is proposed. Previous search history memorized into the Binary Space Partitioning fitness tree can effectively restrain the individuals’ revisit phenomenon. The whole population is partitioned into several subspecies and cooperative coevolution is realized by an information communication mechanism between subspecies, which can enhance the global search ability of particles and avoid premature convergence to local optimum. To demonstrate the power of the method, comparisons between the proposed algorithm and state-of-the-art algorithms are grouped into two categories: 10 basic benchmark functions (10-dimensional and 30-dimensional, 10 CEC2005 benchmark functions (30-dimensional, and a real-world problem (multilevel image segmentation problems. Experimental results show that MCPSO-PSH displays a competitive performance compared to the other swarm-based or evolutionary algorithms in terms of solution accuracy and statistical tests.

  10. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  11. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  12. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  13. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  14. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  15. Robotic colorectal surgery: previous laparoscopic colorectal experience is not essential.

    Science.gov (United States)

    Sian, Tanvir Singh; Tierney, G M; Park, H; Lund, J N; Speake, W J; Hurst, N G; Al Chalabi, H; Smith, K J; Tou, S

    2018-06-01

    A background in minimally invasive colorectal surgery (MICS) has been thought to be essential prior to robotic-assisted colorectal surgery (RACS). Our aim was to determine whether MICS is essential prior to starting RACS training based on results from our initial experience with RACS. Two surgeons from our centre received robotic training through the European Academy of Robotic Colorectal Surgery (EARCS). One surgeon had no prior formal MICS training. We reviewed the first 30 consecutive robotic colorectal procedures from a prospectively maintained database between November 2014 and January 2016 at our institution. Fourteen patients were male. Median age was 64.5 years (range 36-82) and BMI was 27.5 (range 20-32.5). Twelve procedures (40%) were performed by the non-MICS-trained surgeon: ten high anterior resections (one conversion), one low anterior resection and one abdomino-perineal resection of rectum (APER). The MICS-trained surgeon performed nine high and four low anterior resections, one APER and in addition three right hemicolectomies and one abdominal suture rectopexy. There were no intra-operative complications and two patients required re-operation. Median post-operative stay was five days (range 1-26). There were two 30-day re-admissions. All oncological resections had clear margins and median node harvest was 18 (range 9-39). Our case series demonstrates that a background in MICS is not essential prior to starting RACS training. Not having prior MICS training should not discourage surgeons from considering applying for a robotic training programme. Safe and successful robotic colorectal services can be established after completing a formal structured robotic training programme.

  16. Typing and compositionality for security protocols: A generalization to the geometric fragment

    DEFF Research Database (Denmark)

    Almousa, Omar; Mödersheim, Sebastian Alexander; Modesti, Paolo

    2015-01-01

    We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that any security protocol that fulfils a number of sufficient conditions has an attack if it has a well-typed attack. The second kind considers the parallel composition of pro...... of protocols, showing that when running two protocols in parallel allows for an attack, then at least one of the protocols has an attack in isolation. The most important generalization over previous work is the support for all security properties of the geometric fragment.......We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that any security protocol that fulfils a number of sufficient conditions has an attack if it has a well-typed attack. The second kind considers the parallel composition...

  17. Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment (Extended Version)

    DEFF Research Database (Denmark)

    Almousa, Omar; Mödersheim, Sebastian Alexander; Modesti, Paolo

    We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that if any security protocol that fulfils a number of sufficient conditions has an attack then it has a well-typed attack. The second kind considers the parallel composition o...... of protocols, showing that when running two protocols in parallel allows for an attack, then at least one of the protocols has an attack in isolation. The most important generalization over previous work is the support for all security properties of the geometric fragment.......We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that if any security protocol that fulfils a number of sufficient conditions has an attack then it has a well-typed attack. The second kind considers the parallel composition...

  18. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  19. Implementation of the AAPM Task Group 21 protocol by the Radiological Physics Center and its implications

    International Nuclear Information System (INIS)

    Gastorf, R.J.; Hanson, W.F.; Shalek, R.J.; Berkley, L.W.

    1984-01-01

    The Radiation Therapy Committee of the American Association of Physicists in Medicine appointed Task Group 21 to write a new protocol for the calibration of high-energy photon and electron therapy beams. This protocol updates the physical parameters used in the calculations and is intended to account for differences in ionization chamber design and some differences between phantom materials that were not considered in previous protocols. This paper discusses how the Radiological Physics Center (RPC) intends to implement the new protocol, the changes required in the RPC calibration techniques, and the magnitude of the change in the RPC calculations of absorbed dose resulting from the implementation of the new protocol. Although the change in the RPC absorbed-dose calculations will be only 0%-2% over the range of photon and electron energies of interest, some institutions using specific dosimetry systems may find their absorbed-dose calculations changing by 4% or more

  20. The Use Of Spikes Protocol In Cancer: An Integrative Review

    Directory of Open Access Journals (Sweden)

    Fernando Henrique de Sousa

    2017-03-01

    Full Text Available This is an integrative review which aimed to evaluate the use of the SPIKES protocol in Oncology. We selected articles published in Medline and CINAHL databases between 2005-2015, in English, with the descriptors defined by the Medical Subject Headings (MeSH:cancer, neoplasms, plus the uncontrolled descriptor: protocol spikes.  Six articles met the inclusion criteria and were analyzed in full, three thematic categories were established: aspects inherent to the health care professional; Aspects related to the patient and aspects related to the protocol. The main effects of the steps of SPIKES protocol can provide the strengthening of ties between health professionals and patients, and ensure the maintenance and quality of this relationship.  The results indicate an important limiting factor for effective doctor-patient relationship, the little training provided to medical professionals communication of bad news, verified by the difficulty reported in this moment through interviews in the analyzed studies.

  1. Sacrococcygeal pilonidal disease: analysis of previously proposed risk factors

    Directory of Open Access Journals (Sweden)

    Ali Harlak

    2010-01-01

    Full Text Available PURPOSE: Sacrococcygeal pilonidal disease is a source of one of the most common surgical problems among young adults. While male gender, obesity, occupations requiring sitting, deep natal clefts, excessive body hair, poor body hygiene and excessive sweating are described as the main risk factors for this disease, most of these need to be verified with a clinical trial. The present study aimed to evaluate the value and effect of these factors on pilonidal disease. METHOD: Previously proposed main risk factors were evaluated in a prospective case control study that included 587 patients with pilonidal disease and 2,780 healthy control patients. RESULTS: Stiffness of body hair, number of baths and time spent seated per day were the three most predictive risk factors. Adjusted odds ratios were 9.23, 6.33 and 4.03, respectively (p<0.001. With an adjusted odds ratio of 1.3 (p<.001, body mass index was another risk factor. Family history was not statistically different between the groups and there was no specific occupation associated with the disease. CONCLUSIONS: Hairy people who sit down for more than six hours a day and those who take a bath two or less times per week are at a 219-fold increased risk for sacrococcygeal pilonidal disease than those without these risk factors. For people with a great deal of hair, there is a greater need for them to clean their intergluteal sulcus. People who engage in work that requires sitting in a seat for long periods of time should choose more comfortable seats and should also try to stand whenever possible.

  2. Impact of Students’ Class Attendance on Recalling Previously Acquired Information

    Directory of Open Access Journals (Sweden)

    Camellia Hemyari

    2018-03-01

    Full Text Available Background: In recent years, availability of class material including typed lectures, the professor’s Power Point slides, sound recordings, and even videos made a group of students feel that it is unnecessary to attend the classes. These students usually read and memorize typed lectures within two or three days prior to the exams and usually pass the tests even with low attendance rate. Thus, the question is how effective is this learning system and how long the one-night memorized lessons may last.Methods: A group of medical students (62 out of 106 students, with their class attendance and educational achievements in the Medical Mycology and Parasitology course being recorded since two years ago, was selected and their knowledge about this course was tested by multiple choice questions (MCQ designed based on the previous lectures.Results: Although the mean re-exam score of the students at the end of the externship was lower than the corresponding final score, a significant association was found between the scores of the students in these two exams (r=0.48, P=0.01. Moreover, a significant negative association was predicted between the number of absences and re-exam scores (r=-0.26, P=0.037.Conclusion: As our findings show, the phenomenon of recalling the acquired lessons is preserved for a long period of time and it is associated with the students’ attendance. Many factors including generation effect (by taking notes and cued-recall (via slide picture might play a significant role in the better recalling of the learned information in students with good class attendance.Keywords: STUDENT, MEMORY, LONG-TERM, RECALL, ABSENTEEISM, LEARNING

  3. Repeat immigration: A previously unobserved source of heterogeneity?

    Science.gov (United States)

    Aradhya, Siddartha; Scott, Kirk; Smith, Christopher D

    2017-07-01

    Register data allow for nuanced analyses of heterogeneities between sub-groups which are not observable in other data sources. One heterogeneity for which register data is particularly useful is in identifying unique migration histories of immigrant populations, a group of interest across disciplines. Years since migration is a commonly used measure of integration in studies seeking to understand the outcomes of immigrants. This study constructs detailed migration histories to test whether misclassified migrations may mask important heterogeneities. In doing so, we identify a previously understudied group of migrants called repeat immigrants, and show that they differ systematically from permanent immigrants. In addition, we quantify the degree to which migration information is misreported in the registers. The analysis is carried out in two steps. First, we estimate income trajectories for repeat immigrants and permanent immigrants to understand the degree to which they differ. Second, we test data validity by cross-referencing migration information with changes in income to determine whether there are inconsistencies indicating misreporting. From the first part of the analysis, the results indicate that repeat immigrants systematically differ from permanent immigrants in terms of income trajectories. Furthermore, income trajectories differ based on the way in which years since migration is calculated. The second part of the analysis suggests that misreported migration events, while present, are negligible. Repeat immigrants differ in terms of income trajectories, and may differ in terms of other outcomes as well. Furthermore, this study underlines that Swedish registers provide a reliable data source to analyze groups which are unidentifiable in other data sources.

  4. Gastrointestinal tolerability with ibandronate after previous weekly bisphosphonate treatment

    Directory of Open Access Journals (Sweden)

    Richard Derman

    2009-09-01

    Full Text Available Richard Derman1, Joseph D Kohles2, Ann Babbitt31Department of Obstetrics and Gynecology, Christiana Hospital, Newark, DE, USA; 2Roche, Nutley, NJ, USA; 3Greater Portland Bone and Joint Specialists, Portland, ME, USAAbstract: Data from two open-label trials (PRIOR and CURRENT of women with postmenopausal osteoporosis or osteopenia were evaluated to assess whether monthly oral and quarterly intravenous (IV ibandronate dosing improved self-reported gastrointestinal (GI tolerability for patients who had previously experienced GI irritation with bisphosphonate (BP use. In PRIOR, women who had discontinued daily or weekly BP treatment due to GI intolerance received monthly oral or quarterly IV ibandronate for 12 months. The CURRENT subanalysis included women receiving weekly BP treatment who switched to monthly oral ibandronate for six months. GI symptom severity and frequency were assessed using the Osteoporosis Patient Satisfaction Questionnaire™. In PRIOR, mean GI tolerability scores increased significantly at month 1 from screening for both treatment groups (oral: 79.3 versus 54.1; IV: 84.4 versus 51.0; p < 0.001 for both. Most patients reported improvement in GI symptom severity and frequency from baseline at all post-screening assessments (>90% at Month 10. In the CURRENT subanalysis >60% of patients reported improvements in heartburn or acid reflux and >70% indicated improvement in other stomach upset at month 6. Postmenopausal women with GI irritability with daily or weekly BPs experienced improvement in symptoms with extended dosing monthly or quarterly ibandronate compared with baseline.Keywords: ibandronate, osteoporosis, bisphosphonate, gastrointestinal

  5. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  6. Effects of a Short Drilling Implant Protocol on Osteotomy Site Temperature and Drill Torque.

    Science.gov (United States)

    Mihali, Sorin G; Canjau, Silvana; Cernescu, Anghel; Bortun, Cristina M; Wang, Hom-Lay; Bratu, Emanuel

    2018-02-01

    To establish a protocol for reducing the drilling sequence during implant site preparation based on temperature and insertion torque. The traditional conventional drilling sequence (used several drills with 0.6-mm increment each time) was compared with the proposed short drilling protocol (only used 2 drills: initial and final drill). One hundred drilling osteotomies were performed in bovine and porcine bones. Sets of 2 osteotomy sites were created in 5 bone densities using 2 types of drilling protocols. Thermographic pictures were captured throughout all drilling procedures and analyzed using ThermaCAM Researcher Professional 2.10. Torque values were determined during drilling by measuring electrical input and drill speed. There were statistically significant differences in bone temperature between the conventional and short drilling protocols during implant site preparation (analysis of variance P = 0.0008). However, there were no significant differences between the 2 types of drilling protocols for both implant diameters. Implant site preparation time was significantly reduced when using the short drilling protocol compared with the conventional drilling protocol (P drilling protocol proposed herein may represent a safe approach for implant site preparation.

  7. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  8. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  9. Establishing an International Soil Modelling Consortium

    Science.gov (United States)

    Vereecken, Harry; Schnepf, Andrea; Vanderborght, Jan

    2015-04-01

    -change-feedback processes, bridge basic soil science research and management, and facilitate the communication between science and society . To meet these challenges an international community effort is required, similar to initiatives in systems biology, hydrology, and climate and crop research. We therefore propose to establish an international soil modelling consortium with the aims of 1) bringing together leading experts in modelling soil processes within all major soil disciplines, 2) addressing major scientific gaps in describing key processes and their long term impacts with respect to the different functions and ecosystem services provided by soil, 3) intercomparing soil model performance based on standardized and harmonized data sets, 4) identifying interactions with other relevant platforms related to common data formats, protocols and ontologies, 5) developing new approaches to inverse modelling, calibration, and validation of soil models, 6) integrating soil modelling expertise and state of the art knowledge on soil processes in climate, land surface, ecological, crop and contaminant models, and 7) linking process models with new observation, measurement and data evaluation technologies for mapping and characterizing soil properties across scales. Our consortium will bring together modelers and experimental soil scientists at the forefront of new technologies and approaches to characterize soils. By addressing these aims, the consortium will contribute to improve the role of soil modeling as a knowledge dissemination instrument in addressing key global issues and stimulate the development of translational research activities. This presentation will provide a compelling case for this much-needed effort, with a focus on tangible benefits to the scientific and food security communities.

  10. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  11. Outcome of trial of scar in patients with previous caesarean section

    International Nuclear Information System (INIS)

    Khan, B.; Bashir, R.; Khan, W.

    2016-01-01

    Medical evidence indicates that 60-80% of women can achieve vaginal delivery after a previous lower segment caesarean section. Proper selection of patients for trial of scar and vigilant monitoring during labour will achieve successful maternal and perinatal outcome. The objective of our study is to establish the fact that vaginal delivery after one caesarean section has a high success rate in patients with previous one caesarean section for non-recurrent cause. Methods: The study was conducted in Ayub Teaching Abbottabad, Gynae-B Unit. All labouring patients, during the study period of five years, with previous one caesarean section and between 37 weeks to 41 weeks of gestation for a non-recurrent cause were included in the study. Data was recorded on special proforma designed for the purpose. Patients who had previous classical caesarean section, more than one caesarean section, and previous caesarean section with severe wound infection, transverse lie and placenta previa in present pregnancy were excluded. Foetal macrosomia (wt>4 kg) and severe IUGR with compromised blood flow on Doppler in present pregnancy were also not considered suitable for the study. Patients who had any absolute contraindication for vaginal delivery were also excluded. Results: There were 12505 deliveries during the study period. Total vaginal deliveries were 8790 and total caesarean sections were 3715. Caesarean section rate was 29.7%. Out of these 8790 patients, 764 patients were given a trial of scar and 535 patients delivered successfully vaginally (70%). Women who presented with spontaneous onset of labour were more likely to deliver vaginally (74.8%) as compared to induction group (27.1%). Conclusion: Trial of vaginal birth after caesarean (VBAC) in selected cases has great importance in the present era of the rising rate of primary caesarean section. (author)

  12. Startup activities of established Finnish companies

    OpenAIRE

    Saalasti, Sini

    2016-01-01

    Established companies have collaborated with startups for decades in order to enhance their capabilities in technology and innovation. However, in the recent years, the changes in the business environment have induced established companies to increase their collaboration with startups. Thus, startup activities of established companies have become a timely phenomenon. This study explores the startup activities of established companies by analyzing all the activity established companies conduct...

  13. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication

    Science.gov (United States)

    2013-11-25

    previously considered this proactive approach to combat unintentional, persistent (non- reactive) interference . In this project, we plan on extending our...channel” (or code ) by chance, through public knowledge of the underlying protocol semantics , or by compromising one of the network devices. An alternative...AFRL-RV-PS- AFRL-RV-PS- TR-2013-0142 TR-2013-0142 RENDEZVOUS PROTOCOLS AND DYNAMIC FREQUENCY HOPPING INTERFERENCE DESIGN FOR ANTI-JAMMING

  14. Enhanced Recovery After Surgery Protocols in Major Urologic Surgery

    Directory of Open Access Journals (Sweden)

    Natalija Vukovic

    2018-04-01

    Full Text Available The purpose of the reviewThe analysis of the components of enhanced recovery after surgery (ERAS protocols in urologic surgery.Recent findingsERAS protocols has been studied for over 20 years in different surgical procedures, mostly in colorectal surgery. The concept of improving patient care and reducing postoperative complications was also applied to major urologic surgery and especially procedure of radical cystectomy. This procedure is technically challenging, due to a major surgical resection and high postoperative complication rate that may reach 65%. Several clinical pathways were introduced to improve perioperative course and reduce the length of hospital stay. These protocols differ from ERAS modalities in other surgeries. The reasons for this are longer operative time, increased risk of perioperative transfusion and infection, and urinary diversion achieved using transposed intestinal segments. Previous studies in this area analyzed the need for mechanical bowel preparation, postoperative nasogastric tube decompression, as well as the duration of urinary drainage. Furthermore, the attention has also been drawn to perioperative fluid optimization, pain management, and bowel function.SummaryNotwithstanding partial resemblance between the pathways in major urologic surgery and other pelvic surgeries, there are still scarce guidelines for ERAS protocols in urology, which is why further studies should assess the importance of preoperative medical optimization, implementation of thoracic epidural anesthesia and analgesia, and perioperative nutritional management.

  15. A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud

    Directory of Open Access Journals (Sweden)

    Lingwei Song

    2015-01-01

    Full Text Available How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.

  16. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  17. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  18. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  19. Establishing a PWR burn-up library

    International Nuclear Information System (INIS)

    Lutz, D.C.

    1981-01-01

    Starting out from data file ENDF/B IV /1/, a cross-section library has been established for the calculation of operating conditions in pressurized water reactors of the type used in BIBLIS B. The library includes macroscopic, homogenized 2-group cross-sections for all types of fuel elements used in this reactor, including those equipped with boron glass rods. For their calculation the previous irradiation of the fuel has been taken into consideration by approximation. Information on fuel consumption from cell burn-up calculations has been stored in a separate data file. It was designed as a base for the determination of cross sections to be used in the calculation of the incident ''main-steam pipe fracture''. For this library the description of cross sections as a function of the moderator status chose the water densities at 300 0 C/155 bar, 190 0 C/140 bar and 100 0 C/100 bar as fixed values. The burn-up library has been tested by a three-dimensional calculation for the 1sup(st) cycle of the BIBLIS B-reactor using program QUABOX /2/. This showed variances with the anticipated course concerning critically, which can be explained almost quantitatively by known deficiencies of the ENDF/b-IV library. (orig.) [de

  20. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  1. Cardiopulmonary transplantation service establishment in the 1990s: Australia--a developing country?

    Science.gov (United States)

    Esmore, D; Williams, T; Bergin, P; Rosenfeldt, F; Cochrane, A; Griffiths, A; Federman, J

    1992-10-01

    1. A National Transplantation Service has been established at the Alfred Hospital performing more than 50 transplants per year. 2. Increased access to transplantation technology has facilitated an improvement in national population servicing from 2.7 to 6.2 transplants per million population per year. National funding of A$4.062 million per year has been secured. 3. Basic research into organ preservation has facilitated transcontinental organ procurement. 4. An active lung transplantation program has been established synchronous with the cardiac transplant service activities. 5. MCS program establishment has paralleled clinical transplantation activities. 6. Budget management and cost containment has been achieved through rationalisation of management protocols.

  2. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  3. EMS Adherence to a Pre-hospital Cervical Spine Clearance Protocol

    Directory of Open Access Journals (Sweden)

    Johnson, David

    2001-10-01

    Full Text Available Purpose: To determine the degree of adherence to a cervical spine (c-spine clearance protocol by pre-hospital Emergency Medical Services (EMS personnel by both self-assessment and receiving hospital assessment, to describe deviations from the protocol, and to determine if the rate of compliance by paramedic self-assessment differed from receiving hospital assessment. Methods: A retrospective sample of pre-hospital (consecutive series and receiving hospital (convenience sample assessments of the compliance with and appropriateness of c-spine immobilization. The c-spine clearance protocol was implemented for Orange County EMS just prior to the April-November 1999 data collection period. Results: We collected 396 pre-hospital and 162 receiving hospital data forms. From the pre-hospital data sheet. the percentage deviation from the protocol was 4.096 (16/396. Only one out of 16 cases that did not comply with the protocol was due to over immobilization (0.2%. The remaining 15 cases were under immobilized, according to protocol. Nine of the under immobilized cases (66% that should have been placed in c-spine precautions met physical assessment criteria in the protocol, while the other five cases met mechanism of injury criteria. The rate of deviations from protocol did not differ over time. The receiving hospital identified 8.0% (13/162; 6/16 over immobilized, 7/16 under immobilized of patients with deviations from the protocol; none was determined to have actual c-spine injury. Conclusion: The implementation of a pre-hospital c-spine clearance protocol in Orange County was associated with a moderate overall adherence rate (96% from the pre-hospital perspective, and 92% from the hospital perspective, p=.08 for the two evaluation methods. Most patients who deviated from protocol were under immobilized, but no c-spine injuries were missed. The rate of over immobilization was better than previously reported, implying a saving of resources.

  4. Influence of previous administration of trans-phenylcyclopropylamine on radioprotective and hypothermic effects of serotonin

    International Nuclear Information System (INIS)

    Misustova, J.; Hosek, B.; Novak, L.; Kautska, J.

    1978-01-01

    The influence of a previous administration of trans-phenylcyclopropylamine (t-PCPA) on radioprotective and hypothermic effects of serotonin was studied in male mice of the H strain, which were given t-PCPA in the dose of 4 mg/kg intraperitoneally 2 or 7 hours before application of serotonin (40 mg/kg, i.p.). The time course of protection was studied for exposures to 800 and 900 R. The results have shown that a previous administration of t-PCPA does not alter the short-time protective effect of serotonin, but that it significantly prolongs the time course of protection. The administration of t-PCPA also affects the starting speed and the duration of the serotonin-induced hypothermic reaction. The established correlation between prolongation of the radioprotective and hypothermic effects of serotonin induced by previous application of t-PCPA supplements the results with the existence of mutual relationship between changes of the energetic exchange and radioresistance of the organism. (author)

  5. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  6. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  7. Implant Rehabilitation Planning Protocol for the Edentulous Patient According to Denture Space, Lip Support, and Smile Line.

    Science.gov (United States)

    Lago, Laura; Rilo, Benito; Fernández-Formoso, Noelia; DaSilva, Luis

    2017-08-01

    Rehabilitation with implants is a challenge. Having previous evaluation criteria is key to establishing the best treatment for the patient. In addition to clinical and radiological aspects, the prosthetic parameters must be taken into account in the initial workup, since they allow discrimination between fixed and removable rehabilitation. We present a study protocol that analyzes three basic prosthetic aspects. First, denture space defines the need to replace teeth, tissue, or both. Second, lip support focuses on whether or not to include a flange. Third, the smile line warns of potential risks in esthetic rehabilitation. Combining these parameters allows us to make a decision as to the most suitable type of prosthesis. The proposed protocol is useful for assessing the prosthetic parameters that influence decision making as to the best-suited type of restoration. From this point of view, we think it is appropriate for the initial approach to the patient. In any case, other considerations of study may amend the proposal. © 2016 by the American College of Prosthodontists.

  8. Protocol for the quantification of greenhouse gas emissions from waste management activities

    International Nuclear Information System (INIS)

    2013-10-01

    The Waste Sector GHG Protocol is intended to provide guidelines for calculating and reporting greenhouse gas (GHG) emissions associated with a waste management service, over a specific time period (usually one year) and based on simple operational data. The Protocol itself has evolved with time, going through 4 version updates. The different versions correspond to evolutions initiated by the original Entreprises pour l'Environnement Working Group (Seche Environnement, Suez Environnement and Veolia Environnement) but also to the suggestions and feedback provided by several waste associations that have reviewed and commented on the Protocol. As a result, several worldwide associations have validated and used the Protocol for their own greenhouse gas inventories. The version 5 of the Waste Sector GHG Protocol has received the 'Built on the GHG Protocol' label. With such label, the Waste Sector Protocol reinforces its desire to be the reference tool for the waste sector by ensuring its users of a total and transparent coherence and conformity with the GHG Protocol Corporate Standard's requirements. The Protocol is also available on the following web page: http://www.ghgprotocol.org/Tools-Built-on-GHG-Protocol. The Waste Sector GHG Protocol aims at: Providing a consistent and transparent approach to quantify, report and verify GHG direct (scope 1), indirect (scope 2) and avoided emissions of waste management actors; Establishing best practice across the waste sector for the implementation of coherent and homogeneous GHG emissions inventories; Explaining waste sector's particularities in terms of GHG emissions (diffuse emission from landfills, GHG avoided emissions, carbon sequestration); Helping companies to take proper commitments and stakeholders to understand and verify those commitments. The Protocol consists of a manual with two additional documents: A 'Frequently Asked Questions' document; A 'Follow-up of modifications

  9. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  10. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  11. Milky Way Past Was More Turbulent Than Previously Known

    Science.gov (United States)

    2004-04-01

    Results of 1001 observing nights shed new light on our Galaxy [1] Summary A team of astronomers from Denmark, Switzerland and Sweden [2] has achieved a major breakthrough in our understanding of the Milky Way, the galaxy in which we live. After more than 1,000 nights of observations spread over 15 years, they have determined the spatial motions of more than 14,000 solar-like stars residing in the neighbourhood of the Sun. For the first time, the changing dynamics of the Milky Way since its birth can now be studied in detail and with a stellar sample sufficiently large to allow a sound analysis. The astronomers find that our home galaxy has led a much more turbulent and chaotic life than previously assumed. PR Photo 10a/04: Distribution on the sky of the observed stars. PR Photo 10b/04: Stars in the solar neigbourhood and the Milky Way galaxy (artist's view). PR Video Clip 04/04: The motions of the observed stars during the past 250 million years. Unknown history Home is the place we know best. But not so in the Milky Way - the galaxy in which we live. Our knowledge of our nearest stellar neighbours has long been seriously incomplete and - worse - skewed by prejudice concerning their behaviour. Stars were generally selected for observation because they were thought to be "interesting" in some sense, not because they were typical. This has resulted in a biased view of the evolution of our Galaxy. The Milky Way started out just after the Big Bang as one or more diffuse blobs of gas of almost pure hydrogen and helium. With time, it assembled into the flattened spiral galaxy which we inhabit today. Meanwhile, generation after generation of stars were formed, including our Sun some 4,700 million years ago. But how did all this really happen? Was it a rapid process? Was it violent or calm? When were all the heavier elements formed? How did the Milky Way change its composition and shape with time? Answers to these and many other questions are 'hot' topics for the

  12. A BIM-Info delivery protocol

    Directory of Open Access Journals (Sweden)

    Martin Hooper

    2015-10-01

    Full Text Available Today, with many of the technological issues of integrated information management resolved (perhaps excluding the matter of interoperability, defining the content and status of BIM information deliveries remains both a practical and a theoretical problem. New BIM tools and new design processes and procedures have led to a certain confusion of what information is needed for particular BIM uses. This paper seeks to explore and enable a method of defining the content of model information deliverables through a review of 2 key primary specific BIM uses: 3d Design Coordination and Early Energy Appraisal through an analysis of practical application. The scope of this study is limited to a review of information flow within residential projects in a Swedish context and looks at two projects with a view to identify and establish a common definition of the key BIM objects and properties necessary for particular tasks. The key deliverable from this study is the BIM-Info Delivery Protocol (IDP which attempts to align consultant BIM-information delivery expectations and represents a tangible solution to assist consultants to manage BIM information. Concluding reflections consider the positioning of the IDP relative to the on-going development of IDMs / MVDs and highlight the key constituent parameters of an Information Delivery Specification (IDS.

  13. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  14. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  15. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  16. Winter climate limits subantarctic low forest growth and establishment.

    Directory of Open Access Journals (Sweden)

    Melanie A Harsch

    Full Text Available Campbell Island, an isolated island 600 km south of New Zealand mainland (52 °S, 169 °E is oceanic (Conrad Index of Continentality  =  -5 with small differences between mean summer and winter temperatures. Previous work established the unexpected result that a mean annual climate warming of c. 0.6 °C since the 1940's has not led to upward movement of the forest limit. Here we explore the relative importance of summer and winter climatic conditions on growth and age-class structure of the treeline forming species, Dracophyllum longifolium and Dracophyllum scoparium over the second half of the 20th century. The relationship between climate and growth and establishment were evaluated using standard dendroecological methods and local climate data from a meteorological station on the island. Growth and establishment were correlated against climate variables and further evaluated within hierarchical regression models to take into account the effect of plot level variables. Winter climatic conditions exerted a greater effect on growth and establishment than summer climatic conditions. Establishment is maximized under warm (mean winter temperatures >7 °C, dry winters (total winter precipitation <400 mm. Growth, on the other hand, is adversely affected by wide winter temperature ranges and increased rainfall. The contrasting effect of winter warmth on growth and establishment suggests that winter temperature affects growth and establishment through differing mechanisms. We propose that milder winters enhance survival of seedlings and, therefore, recruitment, but increases metabolic stress on established plants, resulting in lower growth rates. Future winter warming may therefore have complex effects on plant growth and establishment globally.

  17. Winter Climate Limits Subantarctic Low Forest Growth and Establishment

    Science.gov (United States)

    Harsch, Melanie A.; McGlone, Matt S.; Wilmshurst, Janet M.

    2014-01-01

    Campbell Island, an isolated island 600 km south of New Zealand mainland (52°S, 169°E) is oceanic (Conrad Index of Continentality  = −5) with small differences between mean summer and winter temperatures. Previous work established the unexpected result that a mean annual climate warming of c. 0.6°C since the 1940's has not led to upward movement of the forest limit. Here we explore the relative importance of summer and winter climatic conditions on growth and age-class structure of the treeline forming species, Dracophyllum longifolium and Dracophyllum scoparium over the second half of the 20th century. The relationship between climate and growth and establishment were evaluated using standard dendroecological methods and local climate data from a meteorological station on the island. Growth and establishment were correlated against climate variables and further evaluated within hierarchical regression models to take into account the effect of plot level variables. Winter climatic conditions exerted a greater effect on growth and establishment than summer climatic conditions. Establishment is maximized under warm (mean winter temperatures >7 °C), dry winters (total winter precipitation <400 mm). Growth, on the other hand, is adversely affected by wide winter temperature ranges and increased rainfall. The contrasting effect of winter warmth on growth and establishment suggests that winter temperature affects growth and establishment through differing mechanisms. We propose that milder winters enhance survival of seedlings and, therefore, recruitment, but increases metabolic stress on established plants, resulting in lower growth rates. Future winter warming may therefore have complex effects on plant growth and establishment globally. PMID:24691026

  18. Winter climate limits subantarctic low forest growth and establishment.

    Science.gov (United States)

    Harsch, Melanie A; McGlone, Matt S; Wilmshurst, Janet M

    2014-01-01

    Campbell Island, an isolated island 600 km south of New Zealand mainland (52 °S, 169 °E) is oceanic (Conrad Index of Continentality  =  -5) with small differences between mean summer and winter temperatures. Previous work established the unexpected result that a mean annual climate warming of c. 0.6 °C since the 1940's has not led to upward movement of the forest limit. Here we explore the relative importance of summer and winter climatic conditions on growth and age-class structure of the treeline forming species, Dracophyllum longifolium and Dracophyllum scoparium over the second half of the 20th century. The relationship between climate and growth and establishment were evaluated using standard dendroecological methods and local climate data from a meteorological station on the island. Growth and establishment were correlated against climate variables and further evaluated within hierarchical regression models to take into account the effect of plot level variables. Winter climatic conditions exerted a greater effect on growth and establishment than summer climatic conditions. Establishment is maximized under warm (mean winter temperatures >7 °C), dry winters (total winter precipitation <400 mm). Growth, on the other hand, is adversely affected by wide winter temperature ranges and increased rainfall. The contrasting effect of winter warmth on growth and establishment suggests that winter temperature affects growth and establishment through differing mechanisms. We propose that milder winters enhance survival of seedlings and, therefore, recruitment, but increases metabolic stress on established plants, resulting in lower growth rates. Future winter warming may therefore have complex effects on plant growth and establishment globally.

  19. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per

  20. A novel protocol for dispatcher assisted CPR improves CPR quality and motivation among rescuers-A randomized controlled simulation study.

    Science.gov (United States)

    Rasmussen, Stinne Eika; Nebsbjerg, Mette Amalie; Krogh, Lise Qvirin; Bjørnshave, Katrine; Krogh, Kristian; Povlsen, Jonas Agerlund; Riddervold, Ingunn Skogstad; Grøfte, Thorbjørn; Kirkegaard, Hans; Løfgren, Bo

    2017-01-01

    Emergency dispatchers use protocols to instruct bystanders in cardiopulmonary resuscitation (CPR). Studies changing one element in the dispatcher's protocol report improved CPR quality. Whether several changes interact is unknown and the effect of combining multiple changes previously reported to improve CPR quality into one protocol remains to be investigated. We hypothesize that a novel dispatch protocol, combining multiple beneficial elements improves CPR quality compared with a standard protocol. A novel dispatch protocol was designed including wording on chest compressions, using a metronome, regular encouragements and a 10-s rest each minute. In a simulated cardiac arrest scenario, laypersons were randomized to perform single-rescuer CPR guided with the novel or the standard protocol. a composite endpoint of time to first compression, hand position, compression depth and rate and hands-off time (maximum score: 22 points). Afterwards participants answered a questionnaire evaluating the dispatcher assistance. The novel protocol (n=61) improved CPR quality score compared with the standard protocol (n=64) (mean (SD): 18.6 (1.4)) points vs. 17.5 (1.7) points, pCPR. A novel bundle of care protocol improved CPR quality score and motivation among rescuers. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  2. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  3. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  4. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  5. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  6. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  7. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  8. The impacts of electricity dispatch protocols on the emission reductions due to wind power and carbon tax.

    Science.gov (United States)

    Yu, Yang; Rajagopal, Ram

    2015-02-17

    Two dispatch protocols have been adopted by electricity markets to deal with the uncertainty of wind power but the effects of the selection between the dispatch protocols have not been comprehensively analyzed. We establish a framework to compare the impacts of adopting different dispatch protocols on the efficacy of using wind power and implementing a carbon tax to reduce emissions. We suggest that a market has high potential to achieve greater emission reduction by adopting the stochastic dispatch protocol instead of the static protocol when the wind energy in the market is highly uncertain or the market has enough adjustable generators, such as gas-fired combustion generators. Furthermore, the carbon-tax policy is more cost-efficient for reducing CO2 emission when the market operates according to the stochastic protocol rather than the static protocol. An empirical study, which is calibrated according to the data from the Electric Reliability Council of Texas market, confirms that using wind energy in the Texas market results in a 12% CO2 emission reduction when the market uses the stochastic dispatch protocol instead of the 8% emission reduction associated with the static protocol. In addition, if a 6$/ton carbon tax is implemented in the Texas market operated according to the stochastic protocol, the CO2 emission is similar to the emission level from the same market with a 16$/ton carbon tax operated according to the static protocol. Correspondingly, the 16$/ton carbon tax associated with the static protocol costs 42.6% more than the 6$/ton carbon tax associated with the stochastic protocol.

  9. Options for the second commitment period of the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Hoehne, Niklas; Phylipsen, Dian; Ullrich, Simone; Blok, Kornelis

    2005-02-15

    This study assesses available options for the second commitment period of the Kyoto Protocol. The study includes the following sections: An introduction, an overview of proposals and establishing a network, analysis of interests of countries, selected country case studies, an overview of the issues to be considered, options for adaptation to climate change, a new approach ''Common but Differentiated Convergence'', an update of the Triptych approach, a comprehensive compromise proposal, the comparison of emission allowances under various approaches and a negotiation strategy for the EU and Germany. (orig.)

  10. Canada's nuclear industry, greenhouse gas emissions, and the Kyoto Protocol

    International Nuclear Information System (INIS)

    Pendergast, D.R.; Duffey, R.B.; Tregunno, D.

    1998-01-01

    The Kyoto Protocol of the United Nations Framework Convention on Climate change, dated December 10, 1997 committed Canada to reduce greenhouse gases to 6% below 1990 levels by 2008-2012. Other nations also committed to varying degrees of reduction. The Protocol includes provisions for credit to the 'developed' counties for initiatives which lead to greenhouse gas reduction in the 'developing' countries and for the sharing of credit between 'developed' countries for projects undertaken jointly. The rules and details for implementation of these guidelines remain to be negotiated. We begin our study by establishing the magnitude of greenhouse gas emissions already avoided by the nuclear industry in Canada since the inception of commercial power plants in 1971. We then review projections of energy use in Canada and anticipated increase in electricity use up to the year 2020. These studies have anticipated no (or have 'not permitted') further development of nuclear electricity production in spite of the clear benefit with respect to greenhouse gas emission. The studies also predict a relatively small growth of electricity use. In fact the projections indicate a reversal of a trend toward increased per capita electricity use which is contrary to observations of electricity usage in national economies as they develop. We then provide estimates of the magnitude of greenhouse gas reduction which would result from replacing the projected increase in fossil fuel electricity by nuclear generation through the building of more plants and/or making better use of existing installations. This is followed by an estimate of additional nuclear capacity needed to avoid CO 2 emissions while providing the electricity needed should per capita usage remain constant. Canada's greenhouse gas reduction goal is a small fraction of international commitments. The Kyoto agreement's 'flexibility mechanism' provisions provide some expectation that Canada could obtain some credit for greenhouse gas

  11. Options for the second commitment period of the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Hoehne, Niklas; Phylipsen, Dian; Ullrich, Simone; Blok, Kornelis

    2005-02-15

    This study assesses available options for the second commitment period of the Kyoto Protocol. The study includes the following sections: An introduction, an overview of proposals and establishing a network, analysis of interests of countries, selected country case studies, an overview of the issues to be considered, options for adaptation to climate change, a new approach ''Common but Differentiated Convergence'', an update of the Triptych approach, a comprehensive compromise proposal, the comparison of emission allowances under various approaches and a negotiation strategy for the EU and Germany. (orig.)

  12. A comparison of protocols for external beam radiotherapy beam calibrations

    International Nuclear Information System (INIS)

    Saeed Al-Ahbabi, Salma; Bradley, D.A.; Beyomi, M.; Alkatib, Z.; Adhaheri, S.; Darmaki, M.; Nisbet, A.

    2012-01-01

    A number of codes of practice (CoP) for electron and photon radiotherapy beam dosimetry are currently in use. Comparison is made of the more widely used of these, specifically those of the International Atomic Energy Agency (IAEA TRS-398), the American Association of Physicists in Medicine (AAPM TG-51) and the Institute of Physics and Engineering in Medicine (IPEM 2003). All are based on calibration of ionization chambers in terms of absorbed dose to water, each seeking to reduce uncertainty in delivered dose, providing an even stronger system of primary standards than previous air-kerma based approaches. They also provide a firm, traceable and straight-forward formalism. Included in making dose assessments for the three CoP are calibration coefficients for a range of beam quality indices. Measurements have been performed using clinical photon and electron beams, the absorbed dose to water being obtained following the recommendations given by each code. Electron beam comparisons have been carried out using measurements for electron beams of nominal energies 6, 9, 12, 16 and 20 MeV. Comparisons were also carried out for photon beams of nominal energies 6 and 18 MV. For photon beams use was made of NE2571 cylindrical graphite walled ionization chambers, cross-calibrated against an NE2611 Secondary Standard; for electron beams, PTW Markus and NACP-02 plane-parallel chambers were used. Irradiations were made using Varian 600C/2100C linacs, supported by water tanks and Virtual Water™ phantoms. The absorbed doses for photon and electron beams obtained following these CoP are all in good agreement, with deviations of less than 2%. A number of studies have been carried out by different groups in different countries to examine the consistency of dosimetry codes of practice or protocols. The aim of these studies is to confirm that the goal of those codes is met, namely uniformity in establishment of dosimetry of all radiation beam types used in cancer therapy in the world

  13. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  14. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  15. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  16. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  17. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  18. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  19. Protocol: An updated integrated methodology for analysis of metabolites and enzyme activities of ethylene biosynthesis

    Directory of Open Access Journals (Sweden)

    Geeraerd Annemie H

    2011-06-01

    Full Text Available Abstract Background The foundations for ethylene research were laid many years ago by researchers such as Lizada, Yang and Hoffman. Nowadays, most of the methods developed by them are still being used. Technological developments since then have led to small but significant improvements, contributing to a more efficient workflow. Despite this, many of these improvements have never been properly documented. Results This article provides an updated, integrated set of protocols suitable for the assembly of a complete picture of ethylene biosynthesis, including the measurement of ethylene itself. The original protocols for the metabolites 1-aminocyclopropane-1-carboxylic acid and 1-(malonylaminocyclopropane-1-carboxylic acid have been updated and downscaled, while protocols to determine in vitro activities of the key enzymes 1-aminocyclopropane-1-carboxylate synthase and 1-aminocyclopropane-1-carboxylate oxidase have been optimised for efficiency, repeatability and accuracy. All the protocols described were optimised for apple fruit, but have been proven to be suitable for the analysis of tomato fruit as well. Conclusions This work collates an integrated set of detailed protocols for the measurement of components of the ethylene biosynthetic pathway, starting from well-established methods. These protocols have been optimised for smaller sample volumes, increased efficiency, repeatability and accuracy. The detailed protocol allows other scientists to rapidly implement these methods in their own laboratories in a consistent and efficient way.

  20. Two-party quantum key agreement protocol with four-particle entangled states

    Science.gov (United States)

    He, Yefeng; Ma, Wenping

    2016-09-01

    Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.